The Perl Toolchain Summit needs more sponsors. If your company depends on Perl, please support this very important event.
NAME
    Malware - Perl extension for storing and manipulation malware and it's
    attributes

SYNOPSIS
    See Constructor new()

DESCRIPTION
    The idea of this module is to allow authors to parse different inputs
    that perform malware analysis and build objects that describe a piece of
    malware's behaviour. From here we can write detection or blocking rules
    based on that behavior.

    For now, the parsers will live within this class as they are directly
    connected to the API, this may change in the future.

OBJECT METHODS
  new()
    Object Constructor

      my $m = Malware->new(
            -platform => 'win32',
            -filesize => $size,
            -filesizeUnits => $units,
            -filename => $name,
            -classification => $class,
            -md5sum => $md5,
            -source => $src,
            -sourceLoc => $srcLoc,
            -rawReport => $rawTextReport,
            -dt_found => $dt, # [see Time::Timestamp]
            -connections => $cons, # [see Net::Connection::Simple]
            -securityIssues => $si,
            -antiEmulation => $ae,
            -backdoors => $bd, # [see Net::Protocol::Simple]
            -malwareFiles => $mw # [hashref],
      );

    By setting the -platform, the module will try to re-bless itself as that
    module (ie: Malware::Win32 for -platform => win32). This allows you to
    scale into specific OS's and their properties (registry for win32).

    See OBJECT ACCESSORS for the i/o of these properties

  blurb()
    Returns a blurb of the raw report in a nicer Text::Table'ish form. If
    you subclass (Malware::$platform) this module, you can tag into this
    method by creating a 'sub _blurb' function that returns a HASHREF in the
    form:

      sub _blurb {
            my $self = shift;
            my $hr = {};
            $hr->{Registry} = $self->registry();
            return $hr;
      }

  returnConnectionsByLayer_array()
    Diggs into the connections property and returns the type of connection
    you are looking for.

    Example: We want all the url connections the malware made

      my @http = $m->returnConnectionsByLayer(
            -type => 'url',
            -layer => 7,
            -protocol => 'http')
      );

    Example: We want all the irc connections the malware made via dns

      my @irc_dns = $m->returnConnectionsByLayer(
            -type => 'dns',
            -layer => 7,
            -protocol => 'IRC')
      );

    Example: We want all the irc connections the malware made via direct IP

      my @irc_dip = $m->returnConnectionsByLayer(
            -type => 'dip',
            -layer => 7,
            -protocol => 'IRC')
      );

    All three params are required or it will return:

      ("Invalid parameters...",undef)

    On success it returns an @rray of strings

ACCESSORS / MODIFIERS
  filesize()
    Sets and returns the filesize

  filesizeUnits()
    Sets and returns the filesizeUnits

  filename()
    Sets and returns the filename()

  classification()
    Sets and returns the malware classification

  md5sum()
    Sets and returns the md5sum

  dt_found()
    Sets and returns the date found, return is a Time::Timestamp object

      $m->dt_found($timestamp,$timezone);

    Timezone is optional, but the timing could get screwed up if you don't
    set it

  source()
    Sets and returns the malware report source (where did you get it?)

  sourceLoc()
    Sets and returns the source location (what medium did you get it from
    (email, website, etc...)

  connections()
    Sets and returns the connection behaviour of the malware.

      my $c = Net::Connection::Simple->new(...);
      $m->connections($c);

      my @cons = @{$m->connections()};

    Accepts: Net::Connection::Simple or returns ($errstr,undef)

    Returns: a ref to an array of Net::Connection::Simple objects

  backdoors()
    Sets and returns the malwares backdoor behavior.

      my $p = Net::Protocol::Simple->new(...);
      $m->backdoors($p);

      my @bds = @{$m->backdoors};

    Accepts: Net::Protocol::Simple or returns ($errstr,undef)

    Returns: a ref to an array of Net::Protocol::Simple objects

  processInfo()
    Sets and returns the processInfo behavior.

    Accepts: string

    Returns: a ref to an array of strings

  filesystem()
    Sets and returns the filesystem behavior.

    Accepts: string

    Returns: a ref to an array of strings

  rawReport()
    Sets and returns the raw report string

    Accepts: string

    Returns: string

  malwareFiles()
    Sets and returns a list of other files that are found to be created or
    associated with this malware

    Accepts: HASHREF or returns ($errstr,undef)

      $m->malwareFiles({
            $f1 => $md5,
            $f2 => $virus_sig,
      });

    OR

      $m->malwareFiles({
            $f1->{md5} = $md5,
            $f1->{vsig} = $virus_sig,
            $f1->{snortSig} = $snort_sig,
      });

    Returns: HASHREF

  antiEmulation()
    Sets and returns the antiEmulation behavior.

    Accepts: int [undef|1|0]

    Returns: whatever you put in

    **Note: the blurb will translate [undef] as unknown

  securityIssues()
    Sets and returns other security issues that are caused.

    Accepts: string

    Returns: a ref to an array of strings

SEE ALSO
    Time::Timestamp,Net::Connection::Simple,Net::Protocol::Simple

AUTHOR
    Wes Young, <saxguard9-cpan@yahoo.com>

COPYRIGHT AND LICENSE
    Copyright (C) 2006 by Wes Young

    This library is free software; you can redistribute it and/or modify it
    under the same terms as Perl itself, either Perl version 5.8.7 or, at
    your option, any later version of Perl 5 you may have available.