Heya Michael,
No worries, it's all good. I'll use 2.0 stable for the malware plugins
and 2.1 alpha for all else. Thanks for the clarification!
Andre'
Andre' M. DiMino
Deep End Research
"Make sure that nobody pays back wrong for wrong, but always try to be
kind to each other and to everyone else" - 1 Thess 5:15 (NIV)
On 02/02/2012 05:31 PM, Michael Hale Ligh wrote:
Hey Andre'
If you're using malware.py from
http://code.google.com/p/malwarecookbook/source/browse/trunk/malware.py,
its only going to work with one of the 2.0 stable downloads from
http://code.google.com/p/volatility/downloads/list. It sounds like
you're using malware.py or malware2.1_alpha.py from the above link but
with the Volatility 2.1 alpha branch from svn trunk. You'd think
malware2.1_alpha.py is compatible with the 2.1 alpha branch of
Volatility but current its just my template for where the malware
plugins will go once 2.1 is released and stable.
So in short, if you want to use malware plugins, use malware.py with
the 2.0 stable release. If you want to use the 2.1 alpha trunk with
x64 support, there are currently no malware plugins. But by the time
2.1 is released, there will be.
Sorry for the confusion!
MHL
On Thu, Feb 2, 2012 at 5:19 PM, Andre' M. DiMino
<adimino(a)sempersecurus.org> wrote:
> Greetings,
>
> I'm seeing the following errors when attempting to run volatility with
> 'malfind' and referencing yara. This used to work fine on yara 1.4, but
> now fails on 1.6. I'm wondering what might have happened and how to
> resolve it.
>
> ~/vol.py -f purple.vmem --profile=WinXPSP3x86 malfind -D
> /home/apollo/workspace/dump_dir/ --yara-rules="http://" -p 1004
>
> Volatile Systems Volatility Framework 2.1_alpha
> Name Pid Start End Tag Hits Protect
> Traceback (most recent call last):
> File "/home/apollo/vol.py", line 135, in <module>
> main()
> File "/home/apollo/vol.py", line 126, in main
> command.execute()
> File "/home/sportivo/tools/Volatility/volatility/commands.py", line
> 101, in execute
> func(outfd, data)
> File "/home/sportivo/tools/Volatility/volatility/plugins/malware.py",
> line 1042, in render_text
> for (name,pid,start,end,tag,prx,fname,hits,chunk) in data:
> File "/home/sportivo/tools/Volatility/volatility/plugins/malware.py",
> line 992, in calculate
> for ps_ad, start, end, tag, prx, data in self.get_vads(proc):
> File "/home/sportivo/tools/Volatility/volatility/plugins/malware.py",
> line 923, in get_vads
> yield (ps_ad, start, end, vad.Tag, vad.Flags.Protection >> 24, data)
> File "/home/sportivo/tools/Volatility/volatility/obj.py", line 777, in
> __getattr__
> return self.m(attr)
> File "/home/sportivo/tools/Volatility/volatility/obj.py", line 762, in m
> raise AttributeError("Struct {0} has no member
> {1}".format(self.obj_name, attr))
> AttributeError: Struct VadRoot has no member Flags
>
>
> Any thoughts or ideas are welcome. Thanks!
>
> Andre'
>
>
> --
> Andre' M. DiMino
> DeepEnd REsearch
>
http://deependresearch.org
>
http://sempersecurus.org
>
> "Make sure that nobody pays back wrong for wrong, but always try to be
> kind to each other and to everyone else" - 1 Thess 5:15 (NIV)
> _______________________________________________
> Vol-users mailing list
> Vol-users(a)volatilityfoundation.org
>
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users