Logo

A powerful, easily deployable network traffic analysis tool suite

Quick Start

Documentation

Components

Supported Protocols

Configuring

Arkime

Dashboards

Hedgehog Linux

Contribution Guide

Carved file scanners

Similar to the PCAP processing pipeline described above, new tools can plug into Malcolm’s automatic file extraction and scanning to examine file transfers carved from network traffic.

When Zeek extracts a file it observes being transfered in network traffic, the file-monitor container picks up those extracted files and publishes to a ZeroMQ topic that can be subscribed to by any other process that wants to analyze that extracted file. In Malcolm at the time of this writing (as of the v5.0.0 release), currently implemented file scanners include ClamAV, YARA, capa and VirusTotal, all of which are managed by the file-monitor container. The scripts involved in this code are:

Additional file scanners could either be added to the file-monitor service; or to avoid coupling with Malcolm’s code users could simply define a new service as instructed in the Adding a new service section and write custom scripts to subscribe and publish to the topics as described above. While this might be a bit of hand-waving, these general steps take care of the plumbing around extracting the file and notifying a new tool, as well as handling the logging of “hits”: users shouldn’t have to really edit any existing code to add a new carved file scanner.

The EXTRACTED_FILE_PIPELINE_VERBOSITY environment variables in can be set to -v, -vv, etc., to increase the verbosity of debug logging from the output of the Docker containers involved in the carved file processing pipeline.