Real-world scenarios demonstrating Rikune's analysis capabilities. 展示 Rikune 分析能力的实际场景。
Quick risk evaluation of an unknown PE binary — headers, imports, entropy, packer detection, and initial threat scoring. 快速评估未知 PE 二进制文件的风险 — 头信息、导入表、熵值、加壳检测和初始威胁评分。
sample.ingest
pe.headers
pe.imports
detect.compiler
Classify a sample against known families using behavioral signatures, YARA rules, and capa capabilities. 使用行为签名、YARA 规则和 capa 能力检测将样本与已知家族进行分类。
yara.scan
capa.analyze
intel.family.classify
Identify packers/protectors (UPX, Themida, VMProtect) and unpack samples for further analysis. 识别加壳器/保护器(UPX、Themida、VMProtect)并脱壳进行深入分析。
detect.compiler
pe.sections
upx.unpack
Extract CLR metadata, type definitions, method signatures, and resources from managed assemblies. 从托管程序集中提取 CLR 元数据、类型定义、方法签名和资源。
sample.ingest
dotnet.metadata
dotnet.resources
Extract C2 servers, URLs, IPs, domains, mutexes, and file artifacts for threat intelligence sharing. 提取 C2 服务器、URL、IP、域名、互斥体和文件特征,用于威胁情报共享。
intel.c2.extract
intel.ioc.export
pe.strings
Screen a directory of samples using the staged pipeline — fast triage, then deep analysis on flagged items. 使用分阶段流水线筛查目录下的样本 — 先快速分诊,然后对标记项进行深度分析。
sample.ingest
workflow.analyze.start
workflow.summarize
Map API usage patterns — identify suspicious imports (crypto, network, process injection), DLL dependencies. 映射 API 使用模式 — 识别可疑导入(加密、网络、进程注入)、DLL 依赖关系。
pe.imports
pe.exports
ghidra.xrefs
Extract obfuscated strings with FLOSS, detect cryptographic constants, and find encryption routines. 使用 FLOSS 提取混淆字符串,检测密码学常量,查找加密例程。
floss.strings
pe.strings
capa.analyze
Generate and deploy Frida scripts for runtime API hooking, string decryption, and anti-debug bypass. 生成和部署 Frida 脚本进行运行时 API Hook、字符串解密和反调试绕过。
frida.hook
frida.trace
Here's a complete workflow for assessing an unknown sample: 以下是评估未知样本的完整工作流:
{
"name": "sample.ingest",
"arguments": {
"path": "C:\\samples\\suspicious.exe"
}
}
{
"name": "workflow.analyze.start",
"arguments": {
"sample_id": "sha256:a1b2c3...",
"goal": "threat_assessment"
}
}
{
"name": "workflow.summarize",
"arguments": {
"sample_id": "sha256:a1b2c3..."
}
}
{
"name": "intel.ioc.export",
"arguments": {
"sample_id": "sha256:a1b2c3...",
"format": "stix"
}
}