2024-07-24 15:37:11 -05:00
|
|
|
|
import os
|
|
|
|
|
import time
|
|
|
|
|
import psutil
|
|
|
|
|
import subprocess
|
|
|
|
|
import threading
|
2024-07-24 16:11:29 -05:00
|
|
|
|
import win32security
|
2024-07-24 19:55:26 -05:00
|
|
|
|
import win32process
|
2024-07-24 16:11:29 -05:00
|
|
|
|
import winreg
|
2024-07-24 15:37:11 -05:00
|
|
|
|
from watchdog.observers import Observer
|
|
|
|
|
from watchdog.events import FileSystemEventHandler
|
|
|
|
|
from selenium import webdriver
|
2024-07-24 16:57:12 -05:00
|
|
|
|
from selenium.webdriver.chrome.service import Service as ChromeService
|
|
|
|
|
from selenium.webdriver.firefox.service import Service as FirefoxService
|
2024-07-24 17:45:31 -05:00
|
|
|
|
from selenium.webdriver.chrome.service import Service as ChromeService
|
2024-07-24 15:37:11 -05:00
|
|
|
|
from pathlib import Path
|
2024-07-24 16:11:29 -05:00
|
|
|
|
import requests
|
|
|
|
|
import certifi
|
2024-07-24 16:51:31 -05:00
|
|
|
|
import getpass
|
2024-07-24 16:11:29 -05:00
|
|
|
|
import tensorflow as tf # TensorFlow for GPU monitoring
|
2024-07-24 16:18:46 -05:00
|
|
|
|
import re # Regular expressions for address detection
|
2024-07-24 17:45:31 -05:00
|
|
|
|
import yara # YARA for malware scanning
|
|
|
|
|
|
2024-07-25 13:37:37 -05:00
|
|
|
|
critical_processes = [
|
|
|
|
|
"System Idle Process", "System", "smss.exe", "csrss.exe", "wininit.exe",
|
|
|
|
|
"services.exe", "lsass.exe", "svchost.exe", "winlogon.exe", "explorer.exe",
|
2024-07-25 14:00:14 -05:00
|
|
|
|
"dwm.exe", "ntoskrnl.exe", "hal.dll", "kernel32.dll", "user32.dll", "WmiPrvSE.exe"
|
2024-07-25 13:37:37 -05:00
|
|
|
|
"kernel_task", "launchd", "loginwindow", "windowserver", "cfprefsd",
|
|
|
|
|
"usernoted", "hidd", "mds", "kernel", "syslogd", "distnoted", "cloudd",
|
|
|
|
|
"securityd", "init", "systemd", "kthreadd", "rcu_sched", "ksoftirqd/0",
|
|
|
|
|
"migration/0", "watchdog/0", "kworker/0:0H", "kdevtmpfs", "netns",
|
|
|
|
|
"khungtaskd", "khelper", "kworker/u2:1", "kswapd0", "fsnotify_mark",
|
|
|
|
|
"systemd-journald", "systemd-logind", "udevd", "dbus-daemon", "sshd",
|
|
|
|
|
"cron", "atd"
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
|
2024-07-24 17:45:31 -05:00
|
|
|
|
# YARA Rules
|
|
|
|
|
def load_yara_rules():
|
|
|
|
|
yara_rules = []
|
2024-07-25 12:43:35 -05:00
|
|
|
|
yara_dir = Path('yara-ReversingLabs')
|
|
|
|
|
if yara_dir.exists() and yara_dir.is_dir():
|
|
|
|
|
for yara_file in yara_dir.rglob('*.yar'):
|
|
|
|
|
try:
|
|
|
|
|
rule = yara.compile(filepath=str(yara_file))
|
|
|
|
|
yara_rules.append(rule)
|
|
|
|
|
except Exception as e:
|
|
|
|
|
print(f"Error compiling YARA rule {yara_file}: {e}")
|
|
|
|
|
else:
|
|
|
|
|
print(f"YARA rules directory not found: {yara_dir}")
|
|
|
|
|
time.sleep(1)
|
|
|
|
|
yara_dir = Path('yara-mikesxrs')
|
|
|
|
|
if yara_dir.exists() and yara_dir.is_dir():
|
|
|
|
|
for yara_file in yara_dir.rglob('*.yar'):
|
|
|
|
|
try:
|
|
|
|
|
rule = yara.compile(filepath=str(yara_file))
|
|
|
|
|
yara_rules.append(rule)
|
|
|
|
|
except Exception as e:
|
|
|
|
|
print(f"Error compiling YARA rule {yara_file}: {e}")
|
|
|
|
|
else:
|
|
|
|
|
print(f"YARA rules directory not found: {yara_dir}")
|
|
|
|
|
yara_dir = Path('yara-Neo23x0')
|
2024-07-24 17:45:31 -05:00
|
|
|
|
if yara_dir.exists() and yara_dir.is_dir():
|
|
|
|
|
for yara_file in yara_dir.rglob('*.yar'):
|
|
|
|
|
try:
|
|
|
|
|
rule = yara.compile(filepath=str(yara_file))
|
|
|
|
|
yara_rules.append(rule)
|
|
|
|
|
except Exception as e:
|
|
|
|
|
print(f"Error compiling YARA rule {yara_file}: {e}")
|
|
|
|
|
else:
|
|
|
|
|
print(f"YARA rules directory not found: {yara_dir}")
|
|
|
|
|
return yara_rules
|
|
|
|
|
|
|
|
|
|
yara_rules = load_yara_rules()
|
2024-07-24 16:18:46 -05:00
|
|
|
|
|
|
|
|
|
# Regular expressions for detecting crypto addresses
|
2024-07-24 19:55:26 -05:00
|
|
|
|
# Bitcoin address regex
|
|
|
|
|
bitcoin_regex = re.compile(r"^(bc1|[13])[a-zA-HJ-NP-Z0-9]{25,39}$", re.IGNORECASE)
|
|
|
|
|
# Ethereum address regex
|
|
|
|
|
ethereum_regex = re.compile(r"^0x[a-fA-F0-9]{40}$", re.IGNORECASE)
|
|
|
|
|
# Monero address regex
|
|
|
|
|
monero_regex = re.compile(r"^4[0-9AB][0-9a-f]{93}$", re.IGNORECASE)
|
2024-07-24 15:37:11 -05:00
|
|
|
|
|
|
|
|
|
# Monitored URLs
|
|
|
|
|
monitored_urls = [
|
|
|
|
|
"https://discord.com",
|
|
|
|
|
"https://discordapp.com",
|
|
|
|
|
"https://google.com",
|
|
|
|
|
"https://mail.google.com",
|
|
|
|
|
"https://play.google.com",
|
|
|
|
|
"https://drive.google.com",
|
|
|
|
|
"https://minecraft.net",
|
|
|
|
|
"https://github.com",
|
|
|
|
|
"https://roblox.com",
|
|
|
|
|
"https://microsoft.com",
|
|
|
|
|
"https://hotmail.com"
|
|
|
|
|
]
|
|
|
|
|
|
2024-07-24 16:18:46 -05:00
|
|
|
|
# Updated list of known mining processes
|
2024-07-24 16:11:29 -05:00
|
|
|
|
mining_processes = [
|
|
|
|
|
"xmrig.exe",
|
|
|
|
|
"bfgminer.exe",
|
|
|
|
|
"cgminer.exe",
|
|
|
|
|
"ethminer.exe",
|
|
|
|
|
"nicehash.exe",
|
2024-07-24 16:13:32 -05:00
|
|
|
|
"miner.exe",
|
|
|
|
|
"miner",
|
|
|
|
|
"xmrig",
|
|
|
|
|
"bfgminer",
|
|
|
|
|
"cgminer",
|
|
|
|
|
"ethminer",
|
|
|
|
|
"nicehash"
|
2024-07-24 16:11:29 -05:00
|
|
|
|
]
|
|
|
|
|
|
2024-07-25 13:51:16 -05:00
|
|
|
|
def does_not_contain_critical_process(file_path):
|
|
|
|
|
"""
|
|
|
|
|
Check if the file_path does not contain any of the critical processes in the critical_processes list.
|
|
|
|
|
|
|
|
|
|
Parameters:
|
|
|
|
|
- file_path (str): The path of the file to check.
|
|
|
|
|
- critical_processes (list): List of critical process names to check against.
|
|
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
- bool: True if file_path does not contain any critical process names, False otherwise.
|
|
|
|
|
"""
|
|
|
|
|
return all(process not in file_path for process in critical_processes)
|
|
|
|
|
|
2024-07-24 15:37:11 -05:00
|
|
|
|
# Folders to monitor
|
|
|
|
|
def get_folders_to_monitor():
|
|
|
|
|
folders = []
|
|
|
|
|
|
|
|
|
|
# Common user directories
|
|
|
|
|
user_dirs = ['Downloads', 'Documents', 'Pictures', 'Videos']
|
2024-07-24 17:45:31 -05:00
|
|
|
|
user_folder = Path.home()
|
|
|
|
|
for folder in user_folder.iterdir():
|
|
|
|
|
if folder.is_dir() and any(d.lower() in folder.name.lower() for d in user_dirs):
|
|
|
|
|
folders.append(str(folder))
|
2024-07-24 15:37:11 -05:00
|
|
|
|
|
|
|
|
|
# System directories
|
|
|
|
|
if os.name == 'nt': # Windows
|
|
|
|
|
system_dirs = [
|
|
|
|
|
'C:\\Program Files', 'C:\\Windows', 'C:\\Program Files (x86)'
|
|
|
|
|
]
|
|
|
|
|
else: # Unix-like (Linux, macOS)
|
|
|
|
|
system_dirs = [
|
|
|
|
|
'/usr/bin', '/bin', '/usr/sbin'
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
folders.extend(system_dirs)
|
|
|
|
|
return folders
|
|
|
|
|
|
|
|
|
|
# Load bypassed processes
|
|
|
|
|
def load_bypassed_processes():
|
|
|
|
|
bypassed = set()
|
|
|
|
|
if os.path.exists("bypassed.txt"):
|
|
|
|
|
with open("bypassed.txt", "r") as f:
|
|
|
|
|
for line in f:
|
|
|
|
|
bypassed.add(line.strip().lower())
|
2024-07-24 19:55:26 -05:00
|
|
|
|
#print(f"Loaded exception {line.strip().lower()}!") # FOR DEBUGGING
|
2024-07-24 15:37:11 -05:00
|
|
|
|
return bypassed
|
|
|
|
|
|
2024-07-24 16:11:29 -05:00
|
|
|
|
|
2024-07-24 15:37:11 -05:00
|
|
|
|
# File System Monitoring
|
2024-07-24 16:11:29 -05:00
|
|
|
|
class SuspiciousFileHandler(FileSystemEventHandler):
|
|
|
|
|
def on_any_event(self, event):
|
|
|
|
|
if event.event_type in ['created', 'modified', 'deleted']:
|
|
|
|
|
file_owner = get_file_owner(event.src_path)
|
2024-07-24 17:45:31 -05:00
|
|
|
|
current_user = get_current_user()
|
2024-07-24 16:58:57 -05:00
|
|
|
|
if file_owner.lower() not in [current_user.lower(), "trustedinstaller"]:
|
2024-07-24 16:11:29 -05:00
|
|
|
|
print(f"Suspicious file operation: {event.event_type} {event.src_path} by {file_owner}")
|
|
|
|
|
|
|
|
|
|
def get_file_owner(file_path):
|
|
|
|
|
try:
|
2024-07-24 17:45:31 -05:00
|
|
|
|
# On Windows, use the current user’s name
|
|
|
|
|
if os.name == 'nt':
|
2024-07-24 16:51:31 -05:00
|
|
|
|
sd = win32security.GetFileSecurity(file_path, win32security.OWNER_SECURITY_INFORMATION)
|
|
|
|
|
owner_sid = sd.GetSecurityDescriptorOwner()
|
|
|
|
|
owner, _ = win32security.LookupAccountSid(None, owner_sid)
|
|
|
|
|
return owner
|
2024-07-24 17:45:31 -05:00
|
|
|
|
else:
|
|
|
|
|
# On Unix-like systems, use the owner of the file
|
2024-07-24 16:51:31 -05:00
|
|
|
|
import pwd
|
|
|
|
|
file_stat = os.stat(file_path)
|
|
|
|
|
return pwd.getpwuid(file_stat.st_uid).pw_name
|
2024-07-24 16:11:29 -05:00
|
|
|
|
except Exception as e:
|
|
|
|
|
print(f"Error getting file owner: {e}")
|
|
|
|
|
return "Unknown"
|
2024-07-24 15:37:11 -05:00
|
|
|
|
|
2024-07-24 17:45:31 -05:00
|
|
|
|
def get_current_user():
|
|
|
|
|
return getpass.getuser()
|
|
|
|
|
|
2024-07-24 15:37:11 -05:00
|
|
|
|
def start_file_system_monitor():
|
|
|
|
|
observer = Observer()
|
2024-07-24 16:11:29 -05:00
|
|
|
|
event_handler = SuspiciousFileHandler()
|
2024-07-24 15:37:11 -05:00
|
|
|
|
for folder in get_folders_to_monitor():
|
|
|
|
|
observer.schedule(event_handler, path=folder, recursive=True)
|
|
|
|
|
observer.start()
|
|
|
|
|
try:
|
|
|
|
|
while True:
|
|
|
|
|
time.sleep(1)
|
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
|
observer.stop()
|
|
|
|
|
observer.join()
|
|
|
|
|
|
2024-07-24 17:45:31 -05:00
|
|
|
|
def scan_for_malware(file_path):
|
|
|
|
|
if yara_rules:
|
|
|
|
|
for rule in yara_rules:
|
|
|
|
|
matches = rule.match(filepath=file_path)
|
2024-07-25 13:51:16 -05:00
|
|
|
|
if matches and does_not_contain_critical_process(file_path):
|
2024-07-24 17:45:31 -05:00
|
|
|
|
return True
|
|
|
|
|
return False
|
|
|
|
|
|
2024-07-24 16:11:29 -05:00
|
|
|
|
# Detect Excessive CPU Workloads
|
|
|
|
|
def monitor_cpu_gpu_usage():
|
2024-07-24 15:37:11 -05:00
|
|
|
|
while True:
|
2024-07-24 16:11:29 -05:00
|
|
|
|
cpu_percent = psutil.cpu_percent(interval=1)
|
|
|
|
|
gpu_usage = get_gpu_usage()
|
|
|
|
|
|
|
|
|
|
if cpu_percent > 80 and gpu_usage < 10:
|
|
|
|
|
print("Warning: High CPU usage detected with low GPU usage.")
|
|
|
|
|
kill_suspicious_processes()
|
|
|
|
|
|
|
|
|
|
if gpu_usage > 80 and cpu_percent < 10:
|
|
|
|
|
print("Warning: High GPU usage detected with low CPU usage.")
|
2024-07-25 14:00:14 -05:00
|
|
|
|
kill_suspicious_processes()
|
2024-07-24 16:11:29 -05:00
|
|
|
|
|
|
|
|
|
time.sleep(5)
|
|
|
|
|
|
|
|
|
|
def get_gpu_usage():
|
|
|
|
|
gpus = tf.config.list_physical_devices('GPU')
|
|
|
|
|
if gpus:
|
|
|
|
|
try:
|
|
|
|
|
# Check GPU memory usage
|
|
|
|
|
for gpu in gpus:
|
|
|
|
|
gpu_details = tf.config.experimental.get_memory_info(gpu.name)
|
|
|
|
|
memory_total = gpu_details['total']
|
2024-07-24 17:01:56 -05:00
|
|
|
|
memory_free = gpu_details['free']
|
|
|
|
|
usage = (memory_total - memory_free) / memory_total * 100
|
|
|
|
|
return usage
|
|
|
|
|
except Exception as e:
|
|
|
|
|
print(f"Error getting GPU usage: {e}")
|
|
|
|
|
return 0
|
|
|
|
|
|
|
|
|
|
def kill_suspicious_processes():
|
2024-07-24 19:55:26 -05:00
|
|
|
|
for proc in psutil.process_iter(['pid', 'name']):
|
2024-07-24 17:01:56 -05:00
|
|
|
|
try:
|
|
|
|
|
proc_name = proc.info['name'].lower()
|
2024-07-24 19:55:26 -05:00
|
|
|
|
cmdline = []
|
|
|
|
|
|
|
|
|
|
# Attempt to get command line arguments
|
|
|
|
|
try:
|
|
|
|
|
cmdline = proc.cmdline()
|
|
|
|
|
except psutil.AccessDenied:
|
|
|
|
|
# Fallback for access denied
|
2024-07-24 19:59:35 -05:00
|
|
|
|
print(f"Access denied getting CLI args for process {proc.info['name']} (PID: {proc.info['pid']})")
|
2024-07-24 19:55:26 -05:00
|
|
|
|
continue
|
|
|
|
|
|
|
|
|
|
cmdline_str = " ".join(cmdline).lower()
|
|
|
|
|
bypassed_processes = load_bypassed_processes()
|
2024-07-24 17:01:56 -05:00
|
|
|
|
|
2024-07-25 13:37:37 -05:00
|
|
|
|
if proc_name in mining_processes and proc_name not in bypassed_processes and proc_name not in critical_processes:
|
2024-07-24 17:01:56 -05:00
|
|
|
|
print(f"Terminating suspicious mining process: {proc.info['name']} (PID: {proc.info['pid']})")
|
|
|
|
|
proc.terminate()
|
|
|
|
|
proc.wait()
|
|
|
|
|
|
2024-07-24 17:45:31 -05:00
|
|
|
|
# Check for crypto addresses in command line arguments
|
2024-07-24 19:55:26 -05:00
|
|
|
|
if (bitcoin_regex.search(cmdline_str) or
|
|
|
|
|
ethereum_regex.search(cmdline_str) or
|
2024-07-25 13:37:37 -05:00
|
|
|
|
monero_regex.search(cmdline_str)) and proc_name not in bypassed_processes and proc_name not in critical_processes:
|
2024-07-24 19:55:26 -05:00
|
|
|
|
print(f"Terminating process with crypto address: {proc.info['name']} (PID: {proc.info['pid']}) due to {cmdline_str}.")
|
2024-07-24 17:01:56 -05:00
|
|
|
|
proc.terminate()
|
|
|
|
|
proc.wait()
|
2024-07-24 17:45:31 -05:00
|
|
|
|
|
2024-07-24 18:28:03 -05:00
|
|
|
|
# Scan files for malware as they launch and kill if potentially malicious.
|
2024-07-24 19:55:26 -05:00
|
|
|
|
for file_path in cmdline:
|
2024-07-24 17:45:31 -05:00
|
|
|
|
if os.path.isfile(file_path):
|
2024-07-25 13:37:37 -05:00
|
|
|
|
if scan_for_malware(file_path) and proc_name not in bypassed_processes and proc_name not in critical_processes:
|
2024-07-25 14:00:14 -05:00
|
|
|
|
print(f"Terminating potentially malicious process {proc.info['name']} (PID: {proc.info['pid']}) NOW...")
|
2024-07-24 17:45:31 -05:00
|
|
|
|
proc.terminate()
|
|
|
|
|
proc.wait()
|
2024-07-24 17:01:56 -05:00
|
|
|
|
except (psutil.NoSuchProcess, psutil.AccessDenied) as e:
|
|
|
|
|
print(f"Error terminating process: {e}")
|
|
|
|
|
|
|
|
|
|
# Monitor Registry Changes (Windows)
|
|
|
|
|
def monitor_registry_changes():
|
|
|
|
|
reg_path = r"Software\Microsoft\Windows\CurrentVersion"
|
|
|
|
|
try:
|
|
|
|
|
registry_key = winreg.OpenKey(winreg.HKEY_CURRENT_USER, reg_path, 0, winreg.KEY_READ)
|
|
|
|
|
while True:
|
|
|
|
|
try:
|
|
|
|
|
for i in range(winreg.QueryInfoKey(registry_key)[1]): # Number of subkeys
|
|
|
|
|
subkey_name = winreg.EnumKey(registry_key, i)
|
|
|
|
|
print(f"Registry subkey detected: {subkey_name}")
|
2024-07-24 17:45:31 -05:00
|
|
|
|
|
2024-07-24 17:01:56 -05:00
|
|
|
|
time.sleep(10)
|
|
|
|
|
except WindowsError as e:
|
|
|
|
|
print(f"Registry monitoring error: {e}")
|
2024-07-24 17:45:31 -05:00
|
|
|
|
|
2024-07-24 17:01:56 -05:00
|
|
|
|
finally:
|
|
|
|
|
winreg.CloseKey(registry_key)
|
|
|
|
|
|
|
|
|
|
# Verify TLS Certificates
|
|
|
|
|
def verify_tls_cert(url):
|
2024-07-24 18:29:31 -05:00
|
|
|
|
try:
|
|
|
|
|
response = requests.get(url, verify=certifi.where())
|
|
|
|
|
print(f"TLS certificate valid for {url}")
|
|
|
|
|
except requests.exceptions.SSLError as e:
|
|
|
|
|
print(f"TLS certificate error for {url}: {e}")
|
2024-07-24 17:01:56 -05:00
|
|
|
|
|
2024-07-24 18:52:27 -05:00
|
|
|
|
def monitor_tls_certificates():
|
2024-07-24 17:45:31 -05:00
|
|
|
|
urls = monitored_urls
|
2024-07-24 17:01:56 -05:00
|
|
|
|
while True:
|
2024-07-24 17:45:31 -05:00
|
|
|
|
for url in urls:
|
2024-07-24 17:01:56 -05:00
|
|
|
|
verify_tls_cert(url)
|
2024-07-24 18:52:27 -05:00
|
|
|
|
time.sleep(60) # Check every minute
|
2024-07-24 17:01:56 -05:00
|
|
|
|
|
|
|
|
|
# Detecting Suspicious Browser Activity
|
|
|
|
|
def monitor_browser(browser='chrome'):
|
|
|
|
|
if browser == 'chrome':
|
|
|
|
|
driver = setup_chrome_driver()
|
|
|
|
|
elif browser == 'firefox':
|
|
|
|
|
driver = setup_firefox_driver()
|
|
|
|
|
else:
|
|
|
|
|
raise ValueError("Unsupported browser!")
|
2024-07-25 14:07:34 -05:00
|
|
|
|
bypassed_processes = load_bypassed_processes() # Load bypassed processes
|
|
|
|
|
|
2024-07-24 17:45:31 -05:00
|
|
|
|
while True:
|
2024-07-25 13:29:25 -05:00
|
|
|
|
try:
|
|
|
|
|
logs = driver.get_log('performance')
|
|
|
|
|
for entry in logs:
|
|
|
|
|
for url in monitored_urls:
|
|
|
|
|
if url in entry['message']:
|
|
|
|
|
print(f'Alert: Potential cookie or token theft attempt detected on {url}!')
|
|
|
|
|
|
|
|
|
|
# Kill process involved in suspicious browser activity
|
|
|
|
|
for proc in psutil.process_iter(['pid', 'name', 'connections']):
|
2024-07-25 14:07:34 -05:00
|
|
|
|
try:
|
|
|
|
|
if any(url in conn.raddr for conn in proc.info['connections']):
|
|
|
|
|
if proc.info['name'].lower() not in bypassed_processes and proc.info['name'].lower() not in critical_processes:
|
|
|
|
|
print(f'Alert: Killing suspicious process {proc.info["name"]} (PID: {proc.info["pid"]})')
|
|
|
|
|
proc.terminate()
|
|
|
|
|
proc.wait()
|
|
|
|
|
except (psutil.NoSuchProcess, psutil.AccessDenied, psutil.ZombieProcess):
|
|
|
|
|
# Handle the case where process info is not accessible
|
|
|
|
|
continue
|
|
|
|
|
except Exception as e:
|
|
|
|
|
print(f"Exception while monitoring browser behavior - {e}")
|
2024-07-24 17:45:31 -05:00
|
|
|
|
time.sleep(1)
|
2024-07-25 14:07:34 -05:00
|
|
|
|
|
2024-07-24 17:45:31 -05:00
|
|
|
|
driver.quit()
|
|
|
|
|
|
|
|
|
|
# Setup Chrome and Firefox Drivers
|
|
|
|
|
def setup_chrome_driver():
|
|
|
|
|
options = webdriver.ChromeOptions()
|
|
|
|
|
options.add_argument("--headless") # Run in headless mode
|
2024-07-25 14:07:34 -05:00
|
|
|
|
chrome_options.add_argument("--enable-logging") # Enable logging
|
|
|
|
|
chrome_options.add_argument("--v=1") # Adjust verbosity level if needed
|
|
|
|
|
chrome_options.add_argument("--auto-open-devtools-for-tabs") # Open Dev Tools
|
2024-07-24 17:45:31 -05:00
|
|
|
|
service = ChromeService()
|
|
|
|
|
return webdriver.Chrome(service=service, options=options)
|
|
|
|
|
|
|
|
|
|
def setup_firefox_driver():
|
|
|
|
|
options = webdriver.FirefoxOptions()
|
|
|
|
|
options.add_argument("--headless") # Run in headless mode
|
|
|
|
|
service = FirefoxService()
|
|
|
|
|
return webdriver.Firefox(service=service, options=options)
|
2024-07-24 17:01:56 -05:00
|
|
|
|
|
2024-07-24 19:55:26 -05:00
|
|
|
|
def realtimeAV():
|
2024-07-24 19:19:20 -05:00
|
|
|
|
while True:
|
2024-07-24 19:55:26 -05:00
|
|
|
|
print(f"Realtime AntiMalware active")
|
2024-07-25 14:07:34 -05:00
|
|
|
|
try:
|
|
|
|
|
kill_suspicious_processes()
|
|
|
|
|
except:
|
|
|
|
|
print("Realtime AntiMalware error. :()")
|
2024-07-24 19:55:26 -05:00
|
|
|
|
time.sleep(1) # check for malware every second
|
2024-07-24 19:19:20 -05:00
|
|
|
|
|
2024-07-25 13:12:20 -05:00
|
|
|
|
def threadCounter():
|
|
|
|
|
previous_count = 0
|
|
|
|
|
current_count = 0
|
|
|
|
|
while True:
|
|
|
|
|
previous_count = threading.active_count()
|
|
|
|
|
print(f"Active AntiMalware Threads: {current_count}")
|
2024-07-25 13:29:25 -05:00
|
|
|
|
if current_count > previous_count and current_count - previous_count > -1:
|
2024-07-25 13:12:20 -05:00
|
|
|
|
print("WARNING: THREAD KILL DETECTED!")
|
|
|
|
|
time.sleep(3) # check for malware every second
|
|
|
|
|
current_count = threading.active_count()
|
|
|
|
|
|
2024-07-24 17:01:56 -05:00
|
|
|
|
# Start Monitoring in Threads
|
|
|
|
|
threads = [
|
|
|
|
|
threading.Thread(target=start_file_system_monitor),
|
|
|
|
|
threading.Thread(target=monitor_cpu_gpu_usage),
|
|
|
|
|
threading.Thread(target=monitor_registry_changes),
|
2024-07-24 19:55:26 -05:00
|
|
|
|
threading.Thread(target=realtimeAV),
|
2024-07-25 13:12:20 -05:00
|
|
|
|
threading.Thread(target=threadCounter),
|
2024-07-24 18:52:27 -05:00
|
|
|
|
threading.Thread(target=monitor_tls_certificates),
|
2024-07-24 17:01:56 -05:00
|
|
|
|
threading.Thread(target=monitor_browser, args=('chrome',)),
|
2024-07-24 19:55:26 -05:00
|
|
|
|
threading.Thread(target=monitor_browser, args=('firefox',))
|
2024-07-24 17:01:56 -05:00
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
for thread in threads:
|
|
|
|
|
thread.start()
|
|
|
|
|
|
|
|
|
|
for thread in threads:
|
|
|
|
|
thread.join()
|