mirror of
https://github.com/ytisf/theZoo.git
synced 2026-02-21 11:18:08 +00:00
118 lines
4.0 KiB
Python
118 lines
4.0 KiB
Python
#!/usr/bin/env python
|
|
|
|
# Malware DB - the most awesome free malware database on the air
|
|
# Copyright (C) 2014, Yuval Nativ, Lahad Ludar, 5Fingers
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
#(at your option) any later version.
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
import sys
|
|
from os import remove, rename
|
|
import urllib2
|
|
from imports import globals
|
|
from imports import db_handler
|
|
|
|
|
|
class Updater:
|
|
|
|
def __init__(self):
|
|
self.db = db_handler.DBHandler()
|
|
|
|
def get_maldb_ver(self):
|
|
'''
|
|
Get current malwareDB version and see if we need an update
|
|
'''
|
|
try:
|
|
with file(globals.vars.maldb_ver_file) as f:
|
|
return f.read()
|
|
except IOError:
|
|
print(
|
|
"No malware DB version file found.\nPlease try to git clone the repository again.\n")
|
|
return 0
|
|
|
|
def update_db(self, curr_db_version):
|
|
'''
|
|
Just update the database from GitHub
|
|
:return:
|
|
'''
|
|
if globals.vars.DEBUG_LEVEL is 1:
|
|
print locals()
|
|
response = urllib2.urlopen(
|
|
globals.vars.giturl_dl + globals.vars.maldb_ver_file)
|
|
new_maldb_ver = response.read()
|
|
if new_maldb_ver == curr_db_version:
|
|
print globals.bcolors.GREEN + '[+]' + globals.bcolors.WHITE + " theZoo is up to date :)\n" + globals.bcolors.GREEN + '[+]' + globals.bcolors.WHITE + " You are at " + new_maldb_ver + " which is the latest version."
|
|
return
|
|
|
|
print globals.bcolors.RED + '[+]' + globals.bcolors.WHITE + " A newer version is available: " + new_maldb_ver + "!"
|
|
print globals.bcolors.RED + '[+]' + globals.bcolors.WHITE + " Updating..."
|
|
|
|
# Get the new DB and update it
|
|
|
|
self.download_from_repo(globals.vars.db_path)
|
|
self.db.close_connection()
|
|
remove(globals.vars.db_path)
|
|
rename("maldb.db", globals.vars.db_path)
|
|
self.db.renew_connection()
|
|
|
|
# Write the new DB version into the file
|
|
|
|
f = open(globals.vars.maldb_ver_file, 'w')
|
|
f.write(new_maldb_ver)
|
|
f.close()
|
|
return
|
|
|
|
def get_malware(self, id):
|
|
|
|
# get mal location
|
|
|
|
loc = self.db.query("SELECT LOCATION FROM MALWARES WHERE ID=?", id)[0][0]
|
|
|
|
# get from git
|
|
|
|
self.download_from_repo(loc, '.zip')
|
|
self.download_from_repo(loc, '.pass')
|
|
self.download_from_repo(loc, '.md5')
|
|
self.download_from_repo(loc, '.sha256')
|
|
|
|
def download_from_repo(self, filepath, suffix=''):
|
|
if globals.vars.DEBUG_LEVEL is 1:
|
|
print locals()
|
|
file_name = filepath.rsplit('/')[-1] + suffix
|
|
|
|
# Dirty way to check if we're downloading a malware
|
|
|
|
if suffix is not '':
|
|
url = globals.vars.giturl_dl + filepath + '/' + file_name
|
|
else:
|
|
url = globals.vars.giturl_dl + filepath
|
|
u = urllib2.urlopen(url)
|
|
f = open(file_name, 'wb')
|
|
meta = u.info()
|
|
file_size = int(meta.getheaders("Content-Length")[0])
|
|
print "Downloading: %s Bytes: %s" % (file_name, file_size)
|
|
file_size_dl = 0
|
|
block_sz = 8192
|
|
while True:
|
|
buffer = u.read(block_sz)
|
|
if not buffer:
|
|
break
|
|
file_size_dl += len(buffer)
|
|
f.write(buffer)
|
|
status = r"%10d [%3.2f%%]" % (
|
|
file_size_dl, file_size_dl * 100. / file_size)
|
|
status = status + chr(8) * (len(status) + 1)
|
|
sys.stdout.write('\r' + status)
|
|
f.close()
|
|
print "\n"
|