Fenrir is a bash script-based IOC (Indicators of Compromise) scanner designed for Linux, Unix, and macOS systems. The tool performs scanning operations without requiring installation or agent deployment, utilizing common system utilities to extract and analyze file attributes. The scanner supports multiple IOC detection methods including hash-based detection for MD5, SHA1, and SHA256 values using standard system tools like md5sum, sha1sum, and sha commands. It performs filename matching by checking for substring matches within full file paths and conducts string-based searches using grep to identify suspicious content within files. Fenrir includes C2 server detection capabilities by analyzing output from lsof commands to identify potential command and control communications. The tool features a Hot Time Frame function that uses stat commands to identify files created within specified epoch timestamp ranges. The scanner implements smart exclusions based on file size, extensions, and directory paths to optimize scan performance and reduce processing time. It operates with a low system footprint and can be deployed using Ansible playbooks with RAM drive solutions for enhanced performance. The tool is positioned as the third iteration in a series that includes THOR (commercial APT scanner) and LOKI (YARA-based IOC scanner), designed to address limitations found in its predecessors while maintaining simplicity and broad system compatibility.
FEATURES
SIMILAR TOOLS
Code to prevent a managed .NET debugger/profiler from working.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
A sandbox for quickly sandboxing known or unknown families of Android Malware
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
A program to manage yara ruleset in a database with support for different databases and configuration options.