From: https://github.com/Kart1keya/Hachi
ATT&CK framework has become a benchmark in the security domain. ATT&CK provides data about each technique used across different attack stages. Hachi was created to contribute to the ATT&CK community. Hachi is based on the radare2 framework and uses data provided by ATT&CK to map the symptoms of malware on ATT&CK matrix.
Following modules of Hachi make this tool a great addition to an analyst’s or company’s armaments:
- Multi Platform Support: It supports PE as well as ELF files.
- Threat Intel: Hachi provides threat intelligence data like a possible parent campaign or author of a malware file.
- Malware Behavior Mapping on MITRE Matrix: This tools find out the possible techniques used by malware and maps on MITRE matrix.
- Malware behavior: It uncovers core malware behaviors using automated static analysis coupled with symbolic execution to explore multiple execution paths and maps it on ATT&CK matrix.
- Binary Emulation: Hachi also provides binary emulation using Binee emulator and finds possible arttifacts on the system like file, registry etc.
- Threat Intel Feed Integration: It also uses different threat intel feeds like AlienVault OTX, SPAMHAUS, HpHosts to look for IP, URL and hashes.
- RESTful API: Hachi provides RESTful API which enables this tool to seamlessly integration with malware processing frameworks.
- Visualization: It allows for the creation of detailed visual reports.