Attackers continue to use malicious PDF files as part of targeted attacks and mass-scale client-side exploitation. Peepdf, a new tool from Jose Miguel Esparza, is an excellent addition to the PDF analysis toolkit for examining and decoding suspicious PDFs.
For this introductory walk-through, I will take a quick look at the malicious PDF file that I obtained from Contagio Malware Dump. If you’d like to experiment with this file in an isolated laboratory environment, you’re welcome to download the malicious PDF from my server; the password to the zip file is the word “infected”.
Peepdf is written in Python. It doesn’t have a graphical user interface; however, people used to command-line interfaces will feel very comfortable using the tool. This applies especially to its interactive mode, which drops you into the tool’s shell that allows you to navigate through the PDF file’s structure and explore its contents.
Examining a PDF File for Suspicious Characteristics
After installing Peepdf (instructions below), you can simply scan the PDF file by using the “peepdf file.pdf” command to obtain information about the file. When you’re in the tool’s interactive shell, you can view these details using the “info” command.
Examining Suspicious Object Contents in the PDF File
In our example, the variable “large_hahacode” seems to include shellcode that the analyst would want to extract and examine to understand its capabilities.
Installing Peepdf on Linux
I use REMnux for malware analysis tasks that can be performed on Unix, and hope to include Peepdf in the next release of this distro. Installing Peepdf on REMnux was straightforward, and I doubt you’ll run into challenges on other Linux platforms. Once logged into REMnux, assuming that the host is connected to the Internet, type:
sudo apt-get install python-pyrex
svn checkout http://python-spidermonkey.googlecode.com/svn/trunk/ python-spidermonkey
python setup.py build
sudo python setup.py install
cd .. && rm -rf python-spidermonkey
mkdir peepdf && cd peepdf
unzip peepdf-0.1.zip && rm peepdf-0.1.zip
ln -s /usr/local/bin/sctest .
If you like analyzing malicious programs, take a look at the Reverse-Engineering Malware course I teach at SANS. If you’re just getting to know malware, you might also like my Combating Malware course.
- Analyzing Malicious Documents Cheat Sheet
- Analyzing Suspicious PDF Files With PDF Stream Dumper
- 6 Free Local Tools for Analyzing Malicious PDF Files
- 4 Free Online Tools for Examining Suspicious PDFs