Merge branch 'master' into capafmt

This commit is contained in:
Willi Ballenthin
2020-06-25 07:47:25 -06:00
committed by GitHub
27 changed files with 303 additions and 292 deletions

View File

@@ -1,5 +1,4 @@
# capa
[![Build Status](https://drone.oneteamed.net/api/badges/FLARE/capa/status.svg)](https://drone.oneteamed.net/FLARE/capa)
capa detects capabilities in executable files.
You run it against a .exe or .dll and it tells you what it thinks the program can do.
@@ -154,7 +153,7 @@ Here's an example rule used by capa:
Rules are yaml files that follow a certain schema.
The top level element is a dictionary named `rule` with two required children dictionaries:
The top-level element is a dictionary named `rule` with two required children dictionaries:
`meta` and `features`.
@@ -169,7 +168,7 @@ Here are the common fields:
- `rule-category` is required when a rule describes a behavior (as opposed to matching a role or disposition).
The rule category specifies an objective, behavior, and technique matched by this rule,
using a format like `$objective/$behavior/$technique`.
An objective is a high level goal of a program, such as "communication".
An objective is a high-level goal of a program, such as "communication".
A behavior is something that a program may do, such as "communication via socket".
A technique is a way of implementing some behavior, such as "send-data".
@@ -178,7 +177,7 @@ A technique is a way of implementing some behavior, such as "send-data".
- `maec/analysis-conclusion` is required when the rule describes a disposition, such as `benign` or `malicious`.
- `scope` indicates to which feature set this rule applies.
It can takes the following values:
It can take the following values:
- **`basic block`:** limits matches to a basic block.
It is used to achieve locality in rules (for example for parameters of a function).
- **`function`:** identify functions.
@@ -227,6 +226,11 @@ For this to match, the function must:
If only one of these features is found in a function, the rule will not match.
## limitations
### circular rule dependencies
While capa supports [matching on prior rule matches](#matching-prior-rule-matches) users should ensure that their rules do not introduce circular dependencies between rules.
# extracted features
## function features
@@ -249,10 +253,14 @@ though possibly a local function (like `malloc`) extracted via FLIRT.
The parameter is a string describing the function name, specified like `module.functionname` or `functionname`.
Windows API functions that take string arguments come in two API versions. For example, `CreateProcessA` takes ANSI strings and `CreateProcessW` takes Unicode strings. capa extracts these API features both with and without the suffix character `A` or `W`. That means you can write a rule to match on both APIs using the base name. If you want to match a specific API version, you can include the suffix.
Example:
api: kernel32.CreateFileA
api: CreateFileA
api: kernel32.CreateFile # matches both Ansi (CreateFileA) and Unicode (CreateFileW) versions
api: CreateFile
api: GetEnvironmentVariableW # only matches on Unicode version
### number
A number used by the logic of the program.
@@ -342,7 +350,7 @@ Characteristics are features that are extracted by the analysis engine.
They are one-off features that seem interesting to the authors.
For example, the `characteristic(nzxor)` feature describes non-zeroing XOR instructions.
captdet does not support instruction pattern matching,
capa does not support instruction pattern matching,
so a select set of interesting instructions are pulled out as characteristics.
| characteristic | scope | description |
@@ -441,7 +449,7 @@ You can specify a rule match expression like so:
- match: process creation
Rules are uniquely identified by their `rule.meta.name` property;
this is the value that should appear on the right hand side of the `match` expression.
this is the value that should appear on the right-hand side of the `match` expression.
capa will refuse to run if a rule dependency is not present during matching.

View File

@@ -145,22 +145,6 @@ class Some(Statement):
return Result(success, self, results)
class Element(Statement):
'''match if the child is contained in the ctx set.'''
def __init__(self, child):
super(Element, self).__init__()
self.child = child
def __hash__(self):
return hash((self.name, self.child))
def __eq__(self, other):
return self.name == other.name and self.child == other.child
def evaluate(self, ctx):
return Result(self.child in ctx, self, [])
class Range(Statement):
'''match if the child is contained in the ctx set with a count in the given range.'''
def __init__(self, child, min=None, max=None):

View File

@@ -10,7 +10,7 @@ try:
except (ImportError, SyntaxError):
pass
__all__ = ["ida", "viv"]
__all__ = ['ida', 'viv']
class FeatureExtractor(object):

View File

@@ -7,13 +7,13 @@ import re
from collections import namedtuple
ASCII_BYTE = r" !\"#\$%&\'\(\)\*\+,-\./0123456789:;<=>\?@ABCDEFGHIJKLMNOPQRSTUVWXYZ\[\]\^_`abcdefghijklmnopqrstuvwxyz\{\|\}\\\~\t".encode('ascii')
ASCII_RE_4 = re.compile(b"([%s]{%d,})" % (ASCII_BYTE, 4))
UNICODE_RE_4 = re.compile(b"((?:[%s]\x00){%d,})" % (ASCII_BYTE, 4))
REPEATS = [b"A", b"\x00", b"\xfe", b"\xff"]
ASCII_BYTE = r' !\"#\$%&\'\(\)\*\+,-\./0123456789:;<=>\?@ABCDEFGHIJKLMNOPQRSTUVWXYZ\[\]\^_`abcdefghijklmnopqrstuvwxyz\{\|\}\\\~\t'.encode('ascii')
ASCII_RE_4 = re.compile(b'([%s]{%d,})' % (ASCII_BYTE, 4))
UNICODE_RE_4 = re.compile(b'((?:[%s]\x00){%d,})' % (ASCII_BYTE, 4))
REPEATS = [b'A', b'\x00', b'\xfe', b'\xff']
SLICE_SIZE = 4096
String = namedtuple("String", ["s", "offset"])
String = namedtuple('String', ['s', 'offset'])
def buf_filled_with(buf, character):
@@ -46,10 +46,10 @@ def extract_ascii_strings(buf, n=4):
if n == 4:
r = ASCII_RE_4
else:
reg = b"([%s]{%d,})" % (ASCII_BYTE, n)
reg = b'([%s]{%d,})' % (ASCII_BYTE, n)
r = re.compile(reg)
for match in r.finditer(buf):
yield String(match.group().decode("ascii"), match.start())
yield String(match.group().decode('ascii'), match.start())
def extract_unicode_strings(buf, n=4):
@@ -72,11 +72,11 @@ def extract_unicode_strings(buf, n=4):
if n == 4:
r = UNICODE_RE_4
else:
reg = b"((?:[%s]\x00){%d,})" % (ASCII_BYTE, n)
reg = b'((?:[%s]\x00){%d,})' % (ASCII_BYTE, n)
r = re.compile(reg)
for match in r.finditer(buf):
try:
yield String(match.group().decode("utf-16"), match.start())
yield String(match.group().decode('utf-16'), match.start())
except UnicodeDecodeError:
pass

View File

@@ -13,7 +13,7 @@ import file
import function
import basicblock
import insn
__all__ = ["file", "function", "basicblock", "insn"]
__all__ = ['file', 'function', 'basicblock', 'insn']
def get_va(self):

View File

@@ -237,17 +237,17 @@ def main(argv=None):
]
format_help = ', '.join(['%s: %s' % (f[0], f[1]) for f in formats])
parser = argparse.ArgumentParser(description="save capa features to a file")
parser.add_argument("sample", type=str,
help="Path to sample to analyze")
parser.add_argument("output", type=str,
help="Path to output file")
parser.add_argument("-v", "--verbose", action="store_true",
help="Enable verbose output")
parser.add_argument("-q", "--quiet", action="store_true",
help="Disable all output but errors")
parser.add_argument("-f", "--format", choices=[f[0] for f in formats], default="auto",
help="Select sample format, %s" % format_help)
parser = argparse.ArgumentParser(description='save capa features to a file')
parser.add_argument('sample', type=str,
help='Path to sample to analyze')
parser.add_argument('output', type=str,
help='Path to output file')
parser.add_argument('-v', '--verbose', action='store_true',
help='Enable verbose output')
parser.add_argument('-q', '--quiet', action='store_true',
help='Disable all output but errors')
parser.add_argument('-f', '--format', choices=[f[0] for f in formats], default='auto',
help='Select sample format, %s' % format_help)
args = parser.parse_args(args=argv)
if args.quiet:
@@ -271,6 +271,6 @@ def main(argv=None):
return 0
if __name__ == "__main__":
if __name__ == '__main__':
import sys
sys.exit(main())

View File

@@ -322,7 +322,7 @@ class CapaExplorerDataModel(QtCore.QAbstractItemModel):
parent2 = parent
else:
parent2 = CapaExplorerDefaultItem(parent, '%d or more' % result.statement.count)
elif not isinstance(result.statement, (capa.features.Feature, capa.engine.Element, capa.engine.Range, capa.engine.Regex)):
elif not isinstance(result.statement, (capa.features.Feature, capa.engine.Range, capa.engine.Regex)):
# when rending a structural node (and/or/not) then we only care about the node name.
'''
succs = list(filter(lambda c: bool(c), result.children))

View File

@@ -362,7 +362,7 @@ class CapaExplorerForm(idaapi.PluginForm):
technique = parts[2].replace('-', ' ')
techniques.add(technique)
if len(parts) > 3:
raise capa.rules.InvalidRule(capa.main.RULE_CATEGORY + " tag must have at most three components")
raise capa.rules.InvalidRule(capa.main.RULE_CATEGORY + ' tag must have at most three components')
# set row count to max set size
self._view_summary.setRowCount(max(map(len, (rules, objectives, behaviors, techniques))))

View File

@@ -221,7 +221,7 @@ def render_capabilities_default(ruleset, results):
technique = parts[2].replace('-', ' ')
techniques.add(technique)
if len(parts) > 3:
raise capa.rules.InvalidRule(RULE_CATEGORY + " tag must have at most three components")
raise capa.rules.InvalidRule(RULE_CATEGORY + ' tag must have at most three components')
if technique:
o[objective][behavior][technique][rule.name] = rule
@@ -349,8 +349,8 @@ def render_result(res, indent=''):
if sum(map(lambda c: c.success, res.children)) > 0:
print('%soptional:' % indent)
else:
print("%s%d or more" % (indent, res.statement.count))
elif not isinstance(res.statement, (capa.features.Feature, capa.engine.Element, capa.engine.Range, capa.engine.Regex)):
print('%s%d or more' % (indent, res.statement.count))
elif not isinstance(res.statement, (capa.features.Feature, capa.engine.Range, capa.engine.Regex)):
# when rending a structural node (and/or/not),
# then we only care about the node name.
#
@@ -517,7 +517,7 @@ def get_rules(rule_path):
with open(rule_path, 'rb') as f:
rule = capa.rules.Rule.from_yaml(f.read().decode('utf-8'))
if is_nursery_rule_path(root):
if is_nursery_rule_path(rule_path):
rule.meta['nursery'] = True
rules.append(rule)
@@ -637,35 +637,35 @@ def main(argv=None):
try:
extractor = get_extractor(args.sample, args.format)
except UnsupportedFormatError:
logger.error("-" * 80)
logger.error(" Input file does not appear to be a PE file.")
logger.error(" ")
logger.error(" Today, capa currently only supports analyzing PE files (or shellcode, when using --format sc32|sc64).")
logger.error(" If you don't know the input file type, you can try using the `file` utility to guess it.")
logger.error("-" * 80)
logger.error('-' * 80)
logger.error(' Input file does not appear to be a PE file.')
logger.error(' ')
logger.error(' capa currently only supports analyzing PE files (or shellcode, when using --format sc32|sc64).')
logger.error(' If you don\'t know the input file type, you can try using the `file` utility to guess it.')
logger.error('-' * 80)
return -1
except UnsupportedRuntimeError:
logger.error("-" * 80)
logger.error(" Unsupported runtime or Python interpreter.")
logger.error(" ")
logger.error(" Today, capa supports running under Python 2.7 using Vivisect for binary analysis.")
logger.error(" It can also run within IDA Pro, using either Python 2.7 or 3.5+.")
logger.error(" ")
logger.error(" If you're seeing this message on the command line, please ensure you're running Python 2.7.")
logger.error("-" * 80)
logger.error('-' * 80)
logger.error(' Unsupported runtime or Python interpreter.')
logger.error(' ')
logger.error(' capa supports running under Python 2.7 using Vivisect for binary analysis.')
logger.error(' It can also run within IDA Pro, using either Python 2.7 or 3.5+.')
logger.error(' ')
logger.error(' If you\'re seeing this message on the command line, please ensure you\'re running Python 2.7.')
logger.error('-' * 80)
return -1
capabilities = find_capabilities(rules, extractor)
if appears_rule_cat(rules, capabilities, 'other-features/installer/'):
logger.warning("-" * 80)
logger.warning(" This sample appears to be an installer.")
logger.warning(" ")
logger.warning(" capa cannot handle installers well. This means the results may be misleading or incomplete.")
logger.warning(" You should try to understand the install mechanism and analyze created files with capa.")
logger.warning(" ")
logger.warning(" Use -v or -vv if you really want to see the capabilities identified by capa.")
logger.warning("-" * 80)
logger.warning('-' * 80)
logger.warning(' This sample appears to be an installer.')
logger.warning(' ')
logger.warning(' capa cannot handle installers well. This means the results may be misleading or incomplete.')
logger.warning(' You should try to understand the install mechanism and analyze created files with capa.')
logger.warning(' ')
logger.warning(' Use -v or -vv if you really want to see the capabilities identified by capa.')
logger.warning('-' * 80)
# capa will likely detect installer specific functionality.
# this is probably not what the user wants.
#
@@ -674,16 +674,17 @@ def main(argv=None):
return -1
if appears_rule_cat(rules, capabilities, 'other-features/compiled-to-dot-net'):
logger.warning("-" * 80)
logger.warning(" This sample appears to be a .NET module.")
logger.warning(" ")
logger.warning(" .NET is a cross-platform framework for running managed applications.")
logger.warning('-' * 80)
logger.warning(' This sample appears to be a .NET module.')
logger.warning(' ')
logger.warning(' .NET is a cross-platform framework for running managed applications.')
logger.warning(
" Today, capa cannot handle non-native files. This means that the results may be misleading or incomplete.")
logger.warning(" You may have to analyze the file manually, using a tool like the .NET decompiler dnSpy.")
logger.warning(" ")
logger.warning(" Use -v or -vv if you really want to see the capabilities identified by capa.")
logger.warning("-" * 80)
' capa cannot handle non-native files. This means that the results may be misleading or incomplete.')
logger.warning(' You may have to analyze the file manually, using a tool like the .NET decompiler dnSpy.')
logger.warning(' ')
logger.warning(' Use -v or -vv if you really want to see the capabilities identified by capa.')
logger.warning('-' * 80)
# capa won't detect much in .NET samples.
# it might match some file-level things.
# for consistency, bail on things that we don't support.
@@ -693,16 +694,16 @@ def main(argv=None):
return -1
if appears_rule_cat(rules, capabilities, 'other-features/compiled-with-autoit'):
logger.warning("-" * 80)
logger.warning(" This sample appears to be compiled with AutoIt.")
logger.warning(" ")
logger.warning(" AutoIt is a freeware BASIC-like scripting language designed for automating the Windows GUI.")
logger.warning('-' * 80)
logger.warning(' This sample appears to be compiled with AutoIt.')
logger.warning(' ')
logger.warning(' AutoIt is a freeware BASIC-like scripting language designed for automating the Windows GUI.')
logger.warning(
" Today, capa cannot handle AutoIt scripts. This means that the results will be misleading or incomplete.")
logger.warning(" You may have to analyze the file manually, using a tool like the AutoIt decompiler MyAut2Exe.")
logger.warning(" ")
logger.warning(" Use -v or -vv if you really want to see the capabilities identified by capa.")
logger.warning("-" * 80)
' capa cannot handle AutoIt scripts. This means that the results will be misleading or incomplete.')
logger.warning(' You may have to analyze the file manually, using a tool like the AutoIt decompiler MyAut2Exe.')
logger.warning(' ')
logger.warning(' Use -v or -vv if you really want to see the capabilities identified by capa.')
logger.warning('-' * 80)
# capa will detect dozens of capabilities for AutoIt samples,
# but these are due to the AutoIt runtime, not the payload script.
# so, don't confuse the user with FP matches - bail instead
@@ -712,13 +713,13 @@ def main(argv=None):
return -1
if appears_rule_cat(rules, capabilities, 'anti-analysis/packing/'):
logger.warning("-" * 80)
logger.warning(" This sample appears packed.")
logger.warning(" ")
logger.warning(" Packed samples have often been obfuscated to hide their logic.")
logger.warning(" capa cannot handle obfuscation well. This means the results may be misleading or incomplete.")
logger.warning(" If possible, you should try to unpack this input file before analyzing it with capa.")
logger.warning("-" * 80)
logger.warning('-' * 80)
logger.warning(' This sample appears packed.')
logger.warning(' ')
logger.warning(' Packed samples have often been obfuscated to hide their logic.')
logger.warning(' capa cannot handle obfuscation well. This means the results may be misleading or incomplete.')
logger.warning(' If possible, you should try to unpack this input file before analyzing it with capa.')
logger.warning('-' * 80)
if args.vverbose:
render_capabilities_vverbose(capabilities)
@@ -770,7 +771,7 @@ def is_runtime_ida():
return True
if __name__ == "__main__":
if __name__ == '__main__':
if is_runtime_ida():
ida_main()
else:

View File

@@ -27,7 +27,6 @@ BASIC_BLOCK_SCOPE = 'basic block'
SUPPORTED_FEATURES = {
FILE_SCOPE: set([
capa.engine.Element,
capa.features.MatchedRule,
capa.features.file.Export,
capa.features.file.Import,
@@ -36,7 +35,6 @@ SUPPORTED_FEATURES = {
capa.features.String,
]),
FUNCTION_SCOPE: set([
capa.engine.Element,
capa.features.MatchedRule,
capa.features.insn.API,
capa.features.insn.Number,
@@ -59,7 +57,6 @@ SUPPORTED_FEATURES = {
capa.features.Characteristic('recursive call')
]),
BASIC_BLOCK_SCOPE: set([
capa.engine.Element,
capa.features.MatchedRule,
capa.features.insn.API,
capa.features.insn.Number,
@@ -183,8 +180,6 @@ def parse_feature(key):
return capa.features.insn.Mnemonic
elif key == 'basic blocks':
return capa.features.basicblock.BasicBlock
elif key == 'element':
return Element
elif key.startswith('characteristic(') and key.endswith(')'):
characteristic = key[len('characteristic('):-len(')')]
return lambda v: capa.features.Characteristic(characteristic, v)
@@ -314,9 +309,6 @@ def build_statements(d, scope):
if term in ('number', 'offset', 'bytes'):
value, symbol = parse_symbol(arg, term)
feature = Feature(value, symbol)
elif term in ('element'):
arg = parse_int(arg)
feature = Feature(arg)
else:
# arg is string, like:
#

View File

@@ -1,8 +1,8 @@
# Installation
You can install capa in a few different ways. First, if you simply want to use capa, just download the [standalone binary](https://github.com/fireeye/capa/releases). If you want to use capa as a Python library, you can install the package directly from Github using `pip`. If you'd like to contribute patches or features to capa, you can work with a local copy of the source code.
You can install capa in a few different ways. First, if you simply want to use capa, just download the [standalone binary](https://github.com/fireeye/capa/releases). If you want to use capa as a Python library, you can install the package directly from GitHub using `pip`. If you'd like to contribute patches or features to capa, you can work with a local copy of the source code.
## Method 1: Standalone installation
If you simply want to use capa, use the standalone binaries we host on Github: https://github.com/fireeye/capa/releases. These binary executable files contain all the source code, Python interpreter, and associated resources needed to make capa run. This means you can run it without any installation! Just invoke the file using your terminal shell to see the help documentation.
If you simply want to use capa, use the standalone binaries we host on GitHub: https://github.com/fireeye/capa/releases. These binary executable files contain all the source code, Python interpreter, and associated resources needed to make capa run. This means you can run it without any installation! Just invoke the file using your terminal shell to see the help documentation.
We used PyInstaller to create these packages.
@@ -14,14 +14,14 @@ First, install the requirements.
`$ pip install https://github.com/williballenthin/vivisect/zipball/master`
### 2. Install capa module
Second, use `pip` to install the capa module to your local Python environment. This fetches the library code to your computer, but does not keep editable source files around for you to hack on. If you'd like to edit the source files, see below.
Second, use `pip` to install the capa module to your local Python environment. This fetches the library code to your computer but does not keep editable source files around for you to hack on. If you'd like to edit the source files, see below.
`$ pip install https://github.com/fireeye/capa/archive/master.zip`
### 3. Use capa
You can now import the `capa` module from a Python script or use the IDA Pro plugins from the `capa/ida` directory. For more information please see the [usage](usage.md) documentation.
## Method 3: Inspecting the capa source code
If you'd like to review and modify the capa source code, you'll need to check it out from Github and install it locally. By following these instructions, you'll maintain a local directory of source code that you can modify and run easily.
If you'd like to review and modify the capa source code, you'll need to check it out from GitHub and install it locally. By following these instructions, you'll maintain a local directory of source code that you can modify and run easily.
### 1. Install requirements
First, install the requirements.
@@ -53,4 +53,4 @@ If you plan to contribute to capa, you may want to setup the hooks.
Run `scripts/setup-hooks.sh` to set the following hooks up:
- The `post-commit` hook runs the linter after every `git commit`, letting you know if there are code style or rule linter offenses you need to fix.
- The `pre-push` hook runs the linter and the tests and block the `git push` if they do not succeed.
This way you realise if everything is alright without the need of sending a PR.
This way you realize if everything is alright without the need of sending a PR.

View File

@@ -1,5 +1,7 @@
# Usage
## Command line
# capa usage
# command line
After you have downloaded the standalone version of capa or installed it via `pip` (see the [installation](installation.md) documentation) you can run capa directly from your terminal shell.
- `$ capa -h`
@@ -7,14 +9,21 @@ After you have downloaded the standalone version of capa or installed it via `pi
In this mode capa relies on vivisect which only runs under Python 2.
## IDA Pro
## only run selected rules
Use the `-t` option to only run selected rules. This is the preferred method over specifying a rule path which fails if dependent rules reside in other directories.
```
$ capa -t communication malware.exe
```
# IDA Pro
capa runs from within IDA Pro. Run `capa/main.py` via File - Script file... (ALT + F7).
When running in IDA, capa uses IDA's disassembly and file analysis as its backend. These results may vary from the standalone version that uses vivisect.
In IDA, capa supports Python 2 and Python 3. If you encounter issues with your specific setup please open a new [Issue](https://github.com/fireeye/capa/issues).
In IDA, capa supports Python 2 and Python 3. If you encounter issues with your specific setup, please open a new [Issue](https://github.com/fireeye/capa/issues).
## IDA plugins
## IDA Pro plugins
capa comes with two IDA Pro plugins located in the `capa/ida` directory.
### capa explorer
@@ -22,5 +31,5 @@ The capa explorer allows you to interactively display and browse capabilities ca
![capa explorer](capa_explorer.png)
### Rule generator
### rule generator
The rule generator helps you to easily write new rules based on the function you are currently analyzing in your IDA disassembly view.

2
rules

Submodule rules updated: eaae0e89a7...4b8de6324e

View File

@@ -1,4 +1,8 @@
#!/bin/sh
#!/usr/bin/env bash
set -e
set -u
set -o pipefail
GIT_DIR=`git rev-parse --show-toplevel`
cd $GIT_DIR
@@ -8,9 +12,9 @@ cd $GIT_DIR
# After that append `scripts/hooks/$arg` and ensure they can be run
create_hook() {
if [[ ! -e .git/hooks/$1 ]]; then
echo '#!/bin/sh' > .git/hooks/$1
echo "#!/bin/sh" > ".git/hooks/$1"
fi
cat scripts/hooks/$1 >> .git/hooks/$1
cat scripts/hooks/$1 >> ".git/hooks/$1"
chmod +x .git/hooks/$1
}
@@ -19,7 +23,6 @@ create_hook 'post-commit'
create_hook 'pre-push'
echo '\n#### Installing linter/test dependencies\n'
pip install pycodestyle
pytest-sugar
pip install pycodestyle pytest-sugar
pip install https://github.com/williballenthin/vivisect/zipball/master
python setup.py develop

View File

@@ -28,13 +28,13 @@ def main(argv=None):
]
format_help = ', '.join(['%s: %s' % (f[0], f[1]) for f in formats])
parser = argparse.ArgumentParser(description="detect capabilities in programs.")
parser.add_argument("sample", type=str,
help="Path to sample to analyze")
parser.add_argument("-f", "--format", choices=[f[0] for f in formats], default="auto",
help="Select sample format, %s" % format_help)
parser.add_argument("-F", "--function", type=lambda x: int(x, 0),
help="Show features for specific function")
parser = argparse.ArgumentParser(description='detect capabilities in programs.')
parser.add_argument('sample', type=str,
help='Path to sample to analyze')
parser.add_argument('-f', '--format', choices=[f[0] for f in formats], default='auto',
help='Select sample format, %s' % format_help)
parser.add_argument('-F', '--function', type=lambda x: int(x, 0),
help='Show features for specific function')
args = parser.parse_args(args=argv)
logging.basicConfig(level=logging.INFO)
@@ -77,5 +77,5 @@ def main(argv=None):
return 0
if __name__ == "__main__":
if __name__ == '__main__':
sys.exit(main())

View File

@@ -26,7 +26,7 @@ def main():
fnames = {}
for f in idautils.Functions():
fname = idc.get_name(f)
if fname.startswith("sub_"):
if fname.startswith('sub_'):
continue
name_demangled = idc.demangle_name(fname, INF_SHORT_DN_ATTR)
@@ -35,12 +35,12 @@ def main():
fnames[f] = fname
with open(idc.ARGV[1], "w") as f:
with open(idc.ARGV[1], 'w') as f:
json.dump(fnames, f)
# exit IDA
idc.qexit(0)
if __name__ == "__main__":
if __name__ == '__main__':
main()

View File

@@ -40,5 +40,5 @@ def main():
idc.qexit(0)
if __name__ == "__main__":
if __name__ == '__main__':
main()

View File

@@ -66,15 +66,15 @@ def main(argv=None):
if argv is None:
argv = sys.argv[1:]
parser = argparse.ArgumentParser(description="Freeze capa features of a file or of files in a directory")
parser.add_argument("file_path", type=str,
help="Path to file or directory to analyze")
parser.add_argument("-r", "--reprocess", action="store_true", default=False,
help="Overwrite existing analysis")
parser.add_argument("-v", "--verbose", action="store_true",
help="Enable verbose output")
parser.add_argument("-q", "--quiet", action="store_true",
help="Disable all output but errors")
parser = argparse.ArgumentParser(description='Freeze capa features of a file or of files in a directory')
parser.add_argument('file_path', type=str,
help='Path to file or directory to analyze')
parser.add_argument('-r', '--reprocess', action='store_true', default=False,
help='Overwrite existing analysis')
parser.add_argument('-v', '--verbose', action='store_true',
help='Enable verbose output')
parser.add_argument('-q', '--quiet', action='store_true',
help='Disable all output but errors')
args = parser.parse_args(args=argv)
if args.quiet:
@@ -98,5 +98,5 @@ def main(argv=None):
return 0
if __name__ == "__main__":
if __name__ == '__main__':
sys.exit(main())

View File

@@ -217,23 +217,23 @@ def main(argv=None):
if argv is None:
argv = sys.argv[1:]
parser = argparse.ArgumentParser(description="Run capa rule file against frozen features in a directory")
parser.add_argument("rules", type=str,
help="Path to directory containing rules")
parser.add_argument("rule_name", type=str,
help="Name of rule to test")
parser.add_argument("frozen_path", type=str,
help="Path to frozen feature file or directory")
parser.add_argument("-f", "--fast", action="store_true",
help="Don't test slow files")
parser.add_argument("-o", "--only_matching", action="store_true",
help="Print only if rule matches")
parser.add_argument("-s", "--save_image", action="store",
help="Directory to save exported images of function graphs")
parser.add_argument("-v", "--verbose", action="count", default=0,
help="Increase output verbosity")
parser.add_argument("-q", "--quiet", action="store_true",
help="Disable all output but errors")
parser = argparse.ArgumentParser(description='Run capa rule file against frozen features in a directory')
parser.add_argument('rules', type=str,
help='Path to directory containing rules')
parser.add_argument('rule_name', type=str,
help='Name of rule to test')
parser.add_argument('frozen_path', type=str,
help='Path to frozen feature file or directory')
parser.add_argument('-f', '--fast', action='store_true',
help='Don't test slow files')
parser.add_argument('-o', '--only_matching', action='store_true',
help='Print only if rule matches')
parser.add_argument('-s', '--save_image', action='store',
help='Directory to save exported images of function graphs')
parser.add_argument('-v', '--verbose', action='count', default=0,
help='Increase output verbosity')
parser.add_argument('-q', '--quiet', action='store_true',
help='Disable all output but errors')
args = parser.parse_args(args=argv)
if args.quiet:
@@ -293,5 +293,5 @@ def main(argv=None):
print_summary(args.verbose, time0)
if __name__ == "__main__":
if __name__ == '__main__':
sys.exit(main())

View File

@@ -85,13 +85,13 @@ def get_function_names(fnames_file):
def main():
parser = argparse.ArgumentParser(
description="Launch IDA Pro in autonomous mode to dump function names of a file or of files in a directory")
parser.add_argument("file_path", type=str,
help="File or directory path to analyze")
parser.add_argument("-r", "--reprocess", action="store_true", default=False,
help="Overwrite existing analysis")
parser.add_argument("-v", "--verbose", action="store_true",
help="Enable verbose output")
description='Launch IDA Pro in autonomous mode to dump function names of a file or of files in a directory')
parser.add_argument('file_path', type=str,
help='File or directory path to analyze')
parser.add_argument('-r', '--reprocess', action='store_true', default=False,
help='Overwrite existing analysis')
parser.add_argument('-v', '--verbose', action='store_true',
help='Enable verbose output')
args = parser.parse_args(args=sys.argv[1:])
if args.verbose:
@@ -127,5 +127,5 @@ def main():
return 0
if __name__ == "__main__":
if __name__ == '__main__':
sys.exit(main())

View File

@@ -101,17 +101,17 @@ def get_md5_hexdigest(sample_path):
def main():
parser = argparse.ArgumentParser(
description="Launch IDA Pro in autonomous mode to export images of function graphs")
parser.add_argument("file_path", type=str,
help="File to export from")
parser.add_argument("out_dir", type=str,
help="Export target directory")
parser.add_argument("-f", "--functions", action="store",
help="Comma separated list of functions to export")
parser.add_argument("-m", "--manual", action="store_true",
help="Manual mode: show IDA dialog boxes")
parser.add_argument("-v", "--verbose", action="store_true",
help="Enable verbose output")
description='Launch IDA Pro in autonomous mode to export images of function graphs')
parser.add_argument('file_path', type=str,
help='File to export from')
parser.add_argument('out_dir', type=str,
help='Export target directory')
parser.add_argument('-f', '--functions', action='store',
help='Comma separated list of functions to export')
parser.add_argument('-m', '--manual', action='store_true',
help='Manual mode: show IDA dialog boxes')
parser.add_argument('-v', '--verbose', action='store_true',
help='Enable verbose output')
args = parser.parse_args(args=sys.argv[1:])
if args.verbose:
@@ -131,5 +131,5 @@ def main():
return 0
if __name__ == "__main__":
if __name__ == '__main__':
sys.exit(main())

View File

@@ -14,18 +14,18 @@ requirements = [
if sys.version_info >= (3, 0):
# py3
requirements.append("networkx")
requirements.append('networkx')
else:
# py2
requirements.append("enum34")
requirements.append("vivisect")
requirements.append("viv-utils")
requirements.append("networkx==2.2") # v2.2 is last version supported by Python 2.7
requirements.append('enum34')
requirements.append('vivisect')
requirements.append('viv-utils')
requirements.append('networkx==2.2') # v2.2 is last version supported by Python 2.7
# this sets __version__
# via: http://stackoverflow.com/a/7071358/87207
# and: http://stackoverflow.com/a/2073599/87207
with open(os.path.join("capa", "version.py"), "rb") as f:
with open(os.path.join('capa', 'version.py'), 'rb') as f:
exec(f.read())
@@ -36,17 +36,17 @@ def get_rule_paths():
setuptools.setup(
name='capa',
version=__version__,
description="",
long_description="",
author="Willi Ballenthin, Moritz Raabe",
description='',
long_description='',
author='Willi Ballenthin, Moritz Raabe',
author_email='william.ballenthin@mandiant.com, moritz.raabe@mandiant.com',
url='https://www.github.com/fireeye/capa',
packages=setuptools.find_packages(exclude=['tests', 'testbed']),
package_dir={'capa': 'capa'},
package_data={'capa': get_rule_paths()},
entry_points={
"console_scripts": [
"capa=capa.main:main",
'console_scripts': [
'capa=capa.main:main',
]
},
include_package_data=True,
@@ -57,7 +57,7 @@ setuptools.setup(
'Development Status :: 3 - Alpha',
'Intended Audience :: Developers',
'Natural Language :: English',
"Programming Language :: Python :: 2",
"Programming Language :: Python :: 3",
'Programming Language :: Python :: 2',
'Programming Language :: Python :: 3',
],
)

View File

@@ -3,96 +3,95 @@ import textwrap
import capa.rules
import capa.engine
from capa.engine import *
import capa.features
from capa.features import *
from capa.features.insn import *
def test_element():
assert Element(1).evaluate(set([0])) == False
assert Element(1).evaluate(set([1])) == True
assert Element(1).evaluate(set([None])) == False
assert Element(1).evaluate(set([''])) == False
assert Element(1).evaluate(set([False])) == False
def test_number():
assert Number(1).evaluate({Number(0): {1}}) == False
assert Number(1).evaluate({Number(1): {1}}) == True
assert Number(1).evaluate({Number(2): {1, 2}}) == False
def test_and():
assert And(Element(1)).evaluate(set([0])) == False
assert And(Element(1)).evaluate(set([1])) == True
assert And(Element(1), Element(2)).evaluate(set([0])) == False
assert And(Element(1), Element(2)).evaluate(set([1])) == False
assert And(Element(1), Element(2)).evaluate(set([2])) == False
assert And(Element(1), Element(2)).evaluate(set([1, 2])) == True
assert And(Number(1)).evaluate({Number(0): {1}}) == False
assert And(Number(1)).evaluate({Number(1): {1}}) == True
assert And(Number(1), Number(2)).evaluate({Number(0): {1}}) == False
assert And(Number(1), Number(2)).evaluate({Number(1): {1}}) == False
assert And(Number(1), Number(2)).evaluate({Number(2): {1}}) == False
assert And(Number(1), Number(2)).evaluate({Number(1): {1}, Number(2): {2}}) == True
def test_or():
assert Or(Element(1)).evaluate(set([0])) == False
assert Or(Element(1)).evaluate(set([1])) == True
assert Or(Element(1), Element(2)).evaluate(set([0])) == False
assert Or(Element(1), Element(2)).evaluate(set([1])) == True
assert Or(Element(1), Element(2)).evaluate(set([2])) == True
assert Or(Element(1), Element(2)).evaluate(set([1, 2])) == True
assert Or(Number(1)).evaluate({Number(0): {1}}) == False
assert Or(Number(1)).evaluate({Number(1): {1}}) == True
assert Or(Number(1), Number(2)).evaluate({Number(0): {1}}) == False
assert Or(Number(1), Number(2)).evaluate({Number(1): {1}}) == True
assert Or(Number(1), Number(2)).evaluate({Number(2): {1}}) == True
assert Or(Number(1), Number(2)).evaluate({Number(1): {1}, Number(2): {2}}) == True
def test_not():
assert Not(Element(1)).evaluate(set([0])) == True
assert Not(Element(1)).evaluate(set([1])) == False
assert Not(Number(1)).evaluate({Number(0): {1}}) == True
assert Not(Number(1)).evaluate({Number(1): {1}}) == False
def test_some():
assert Some(0, Element(1)).evaluate(set([0])) == True
assert Some(1, Element(1)).evaluate(set([0])) == False
assert Some(0, Number(1)).evaluate({Number(0): {1}}) == True
assert Some(1, Number(1)).evaluate({Number(0): {1}}) == False
assert Some(2, Element(1), Element(2), Element(3)).evaluate(set([0])) == False
assert Some(2, Element(1), Element(2), Element(3)).evaluate(set([0, 1])) == False
assert Some(2, Element(1), Element(2), Element(3)).evaluate(set([0, 1, 2])) == True
assert Some(2, Element(1), Element(2), Element(3)).evaluate(set([0, 1, 2, 3])) == True
assert Some(2, Element(1), Element(2), Element(3)).evaluate(set([0, 1, 2, 3, 4])) == True
assert Some(2, Number(1), Number(2), Number(3)).evaluate({Number(0): {1}}) == False
assert Some(2, Number(1), Number(2), Number(3)).evaluate({Number(0): {1}, Number(1): {1}}) == False
assert Some(2, Number(1), Number(2), Number(3)).evaluate({Number(0): {1}, Number(1): {1}, Number(2): {1}}) == True
assert Some(2, Number(1), Number(2), Number(3)).evaluate({Number(0): {1}, Number(1): {1}, Number(2): {1}, Number(3): {1}}) == True
assert Some(2, Number(1), Number(2), Number(3)).evaluate({Number(0): {1}, Number(1): {1}, Number(2): {1}, Number(3): {1}, Number(4): {1}}) == True
def test_complex():
assert True == Or(
And(Element(1), Element(2)),
Or(Element(3),
Some(2, Element(4), Element(5), Element(6)))
).evaluate(set([5, 6, 7, 8]))
And(Number(1), Number(2)),
Or(Number(3),
Some(2, Number(4), Number(5), Number(6)))
).evaluate({Number(5): {1}, Number(6): {1}, Number(7): {1}, Number(8): {1}})
assert False == Or(
And(Element(1), Element(2)),
Or(Element(3),
Some(2, Element(4), Element(5)))
).evaluate(set([5, 6, 7, 8]))
And(Number(1), Number(2)),
Or(Number(3),
Some(2, Number(4), Number(5)))
).evaluate({Number(5): {1}, Number(6): {1}, Number(7): {1}, Number(8): {1}})
def test_range():
# unbounded range, but no matching feature
assert Range(Element(1)).evaluate({Element(2): {}}) == False
assert Range(Number(1)).evaluate({Number(2): {}}) == False
# unbounded range with matching feature should always match
assert Range(Element(1)).evaluate({Element(1): {}}) == True
assert Range(Element(1)).evaluate({Element(1): {0}}) == True
assert Range(Number(1)).evaluate({Number(1): {}}) == True
assert Range(Number(1)).evaluate({Number(1): {0}}) == True
# unbounded max
assert Range(Element(1), min=1).evaluate({Element(1): {0}}) == True
assert Range(Element(1), min=2).evaluate({Element(1): {0}}) == False
assert Range(Element(1), min=2).evaluate({Element(1): {0, 1}}) == True
assert Range(Number(1), min=1).evaluate({Number(1): {0}}) == True
assert Range(Number(1), min=2).evaluate({Number(1): {0}}) == False
assert Range(Number(1), min=2).evaluate({Number(1): {0, 1}}) == True
# unbounded min
assert Range(Element(1), max=0).evaluate({Element(1): {0}}) == False
assert Range(Element(1), max=1).evaluate({Element(1): {0}}) == True
assert Range(Element(1), max=2).evaluate({Element(1): {0}}) == True
assert Range(Element(1), max=2).evaluate({Element(1): {0, 1}}) == True
assert Range(Element(1), max=2).evaluate({Element(1): {0, 1, 3}}) == False
assert Range(Number(1), max=0).evaluate({Number(1): {0}}) == False
assert Range(Number(1), max=1).evaluate({Number(1): {0}}) == True
assert Range(Number(1), max=2).evaluate({Number(1): {0}}) == True
assert Range(Number(1), max=2).evaluate({Number(1): {0, 1}}) == True
assert Range(Number(1), max=2).evaluate({Number(1): {0, 1, 3}}) == False
# we can do an exact match by setting min==max
assert Range(Element(1), min=1, max=1).evaluate({Element(1): {}}) == False
assert Range(Element(1), min=1, max=1).evaluate({Element(1): {1}}) == True
assert Range(Element(1), min=1, max=1).evaluate({Element(1): {1, 2}}) == False
assert Range(Number(1), min=1, max=1).evaluate({Number(1): {}}) == False
assert Range(Number(1), min=1, max=1).evaluate({Number(1): {1}}) == True
assert Range(Number(1), min=1, max=1).evaluate({Number(1): {1, 2}}) == False
# bounded range
assert Range(Element(1), min=1, max=3).evaluate({Element(1): {}}) == False
assert Range(Element(1), min=1, max=3).evaluate({Element(1): {1}}) == True
assert Range(Element(1), min=1, max=3).evaluate({Element(1): {1, 2}}) == True
assert Range(Element(1), min=1, max=3).evaluate({Element(1): {1, 2, 3}}) == True
assert Range(Element(1), min=1, max=3).evaluate({Element(1): {1, 2, 3, 4}}) == False
assert Range(Number(1), min=1, max=3).evaluate({Number(1): {}}) == False
assert Range(Number(1), min=1, max=3).evaluate({Number(1): {1}}) == True
assert Range(Number(1), min=1, max=3).evaluate({Number(1): {1, 2}}) == True
assert Range(Number(1), min=1, max=3).evaluate({Number(1): {1, 2, 3}}) == True
assert Range(Number(1), min=1, max=3).evaluate({Number(1): {1, 2, 3, 4}}) == False
def test_match_adds_matched_rule_feature():

View File

@@ -159,12 +159,12 @@ def test_serialize_features():
def test_freeze_sample(tmpdir, sample_9324d1a8ae37a36ae560c37448c9705a):
# tmpdir fixture handles cleanup
o = tmpdir.mkdir("capa").join("test.frz").strpath
o = tmpdir.mkdir('capa').join('test.frz').strpath
assert capa.features.freeze.main([sample_9324d1a8ae37a36ae560c37448c9705a.path, o, '-v']) == 0
def test_freeze_load_sample(tmpdir, sample_9324d1a8ae37a36ae560c37448c9705a):
o = tmpdir.mkdir("capa").join("test.frz")
o = tmpdir.mkdir('capa').join('test.frz')
viv_extractor = capa.features.extractors.viv.VivisectFeatureExtractor(sample_9324d1a8ae37a36ae560c37448c9705a.vw,
sample_9324d1a8ae37a36ae560c37448c9705a.path)
with open(o.strpath, 'wb') as f:

View File

@@ -15,6 +15,21 @@ def test_main(sample_9324d1a8ae37a36ae560c37448c9705a):
assert capa.main.main([sample_9324d1a8ae37a36ae560c37448c9705a.path, '-v']) == 0
def test_main_single_rule(sample_9324d1a8ae37a36ae560c37448c9705a, tmpdir):
# tests a single rule can be loaded successfully
RULE_CONTENT = textwrap.dedent('''
rule:
meta:
name: test rule
scope: file
features:
- string: test
''')
rule_file = tmpdir.mkdir('capa').join('rule.yml')
rule_file.write(RULE_CONTENT)
assert capa.main.main([sample_9324d1a8ae37a36ae560c37448c9705a.path, '-v', '-r', rule_file.strpath]) == 0
def test_main_shellcode(sample_499c2a85f6e8142c3f48d4251c9c7cd6_raw32):
assert capa.main.main([sample_499c2a85f6e8142c3f48d4251c9c7cd6_raw32.path, '-v', '-f', 'sc32']) == 0
@@ -25,7 +40,7 @@ def test_ruleset():
rule:
meta:
name: file rule
scope: file
scope: file
features:
- characteristic(embedded pe): y
''')),
@@ -33,7 +48,7 @@ def test_ruleset():
rule:
meta:
name: function rule
scope: function
scope: function
features:
- characteristic(switch): y
''')),

View File

@@ -3,14 +3,13 @@ import textwrap
import pytest
import capa.rules
from capa.engine import Element
from capa.features.insn import Number, Offset
def test_rule_ctor():
r = capa.rules.Rule('test rule', capa.rules.FUNCTION_SCOPE, Element(1), {})
assert r.evaluate(set([0])) == False
assert r.evaluate(set([1])) == True
r = capa.rules.Rule('test rule', capa.rules.FUNCTION_SCOPE, Number(1), {})
assert r.evaluate({Number(0): {1}}) == False
assert r.evaluate({Number(1): {1}}) == True
def test_rule_yaml():
@@ -25,14 +24,14 @@ def test_rule_yaml():
- bar5678
features:
- and:
- element: 1
- element: 2
- number: 1
- number: 2
''')
r = capa.rules.Rule.from_yaml(rule)
assert r.evaluate(set([0])) == False
assert r.evaluate(set([0, 1])) == False
assert r.evaluate(set([0, 1, 2])) == True
assert r.evaluate(set([0, 1, 2, 3])) == True
assert r.evaluate({Number(0): {1}}) == False
assert r.evaluate({Number(0): {1}, Number(1): {1}}) == False
assert r.evaluate({Number(0): {1}, Number(1): {1}, Number(2): {1}}) == True
assert r.evaluate({Number(0): {1}, Number(1): {1}, Number(2): {1}, Number(3): {1}}) == True
def test_rule_yaml_complex():
@@ -43,18 +42,18 @@ def test_rule_yaml_complex():
features:
- or:
- and:
- element: 1
- element: 2
- number: 1
- number: 2
- or:
- element: 3
- number: 3
- 2 or more:
- element: 4
- element: 5
- element: 6
- number: 4
- number: 5
- number: 6
''')
r = capa.rules.Rule.from_yaml(rule)
assert r.evaluate(set([5, 6, 7, 8])) == True
assert r.evaluate(set([6, 7, 8])) == False
assert r.evaluate({Number(5): {1}, Number(6): {1}, Number(7): {1}, Number(8): {1}}) == True
assert r.evaluate({Number(6): {1}, Number(7): {1}, Number(8): {1}}) == False
def test_rule_yaml_not():
@@ -64,13 +63,13 @@ def test_rule_yaml_not():
name: test rule
features:
- and:
- element: 1
- number: 1
- not:
- element: 2
- number: 2
''')
r = capa.rules.Rule.from_yaml(rule)
assert r.evaluate(set([1])) == True
assert r.evaluate(set([1, 2])) == False
assert r.evaluate({Number(1): {1}}) == True
assert r.evaluate({Number(1): {1}, Number(2): {1}}) == False
def test_rule_yaml_count():
@@ -79,12 +78,12 @@ def test_rule_yaml_count():
meta:
name: test rule
features:
- count(element(100)): 1
- count(number(100)): 1
''')
r = capa.rules.Rule.from_yaml(rule)
assert r.evaluate({Element(100): {}}) == False
assert r.evaluate({Element(100): {1}}) == True
assert r.evaluate({Element(100): {1, 2}}) == False
assert r.evaluate({Number(100): {}}) == False
assert r.evaluate({Number(100): {1}}) == True
assert r.evaluate({Number(100): {1, 2}}) == False
def test_rule_yaml_count_range():
@@ -93,13 +92,13 @@ def test_rule_yaml_count_range():
meta:
name: test rule
features:
- count(element(100)): (1, 2)
- count(number(100)): (1, 2)
''')
r = capa.rules.Rule.from_yaml(rule)
assert r.evaluate({Element(100): {}}) == False
assert r.evaluate({Element(100): {1}}) == True
assert r.evaluate({Element(100): {1, 2}}) == True
assert r.evaluate({Element(100): {1, 2, 3}}) == False
assert r.evaluate({Number(100): {}}) == False
assert r.evaluate({Number(100): {1}}) == True
assert r.evaluate({Number(100): {1, 2}}) == True
assert r.evaluate({Number(100): {1, 2, 3}}) == False
def test_invalid_rule_feature():
@@ -239,7 +238,7 @@ def test_invalid_rules():
meta:
name: test rule
features:
- characteristic(count(element(100))): True
- characteristic(count(number(100))): True
'''))

View File

@@ -62,6 +62,7 @@ def test_api_features(mimikatz):
def test_api_features_64_bit(sample_a198216798ca38f280dc413f8c57f2c2):
features = extract_function_features(viv_utils.Function(sample_a198216798ca38f280dc413f8c57f2c2.vw, 0x4011B0))
assert capa.features.insn.API('kernel32.GetStringTypeA') in features
assert capa.features.insn.API('kernel32.GetStringTypeW') not in features
assert capa.features.insn.API('kernel32.GetStringType') in features
assert capa.features.insn.API('GetStringTypeA') in features
assert capa.features.insn.API('GetStringType') in features
@@ -82,14 +83,14 @@ def test_string_features(mimikatz):
def test_byte_features(sample_9324d1a8ae37a36ae560c37448c9705a):
features = extract_function_features(viv_utils.Function(sample_9324d1a8ae37a36ae560c37448c9705a.vw, 0x406F60))
wanted = capa.features.Bytes(b"\xED\x24\x9E\xF4\x52\xA9\x07\x47\x55\x8E\xE1\xAB\x30\x8E\x23\x61")
wanted = capa.features.Bytes(b'\xED\x24\x9E\xF4\x52\xA9\x07\x47\x55\x8E\xE1\xAB\x30\x8E\x23\x61')
# use `==` rather than `is` because the result is not `True` but a truthy value.
assert wanted.evaluate(features) == True
def test_byte_features64(sample_lab21_01):
features = extract_function_features(viv_utils.Function(sample_lab21_01.vw, 0x1400010C0))
wanted = capa.features.Bytes(b"\x32\xA2\xDF\x2D\x99\x2B\x00\x00")
wanted = capa.features.Bytes(b'\x32\xA2\xDF\x2D\x99\x2B\x00\x00')
# use `==` rather than `is` because the result is not `True` but a truthy value.
assert wanted.evaluate(features) == True