{"id":19284256,"url":"https://github.com/eset/stadeo","last_synced_at":"2025-04-22T03:31:55.495Z","repository":{"id":44457689,"uuid":"279655130","full_name":"eset/stadeo","owner":"eset","description":"Control-flow-flattening and string deobfuscator","archived":false,"fork":false,"pushed_at":"2021-11-08T11:33:30.000Z","size":2003,"stargazers_count":137,"open_issues_count":1,"forks_count":15,"subscribers_count":6,"default_branch":"master","last_synced_at":"2024-04-09T10:33:36.249Z","etag":null,"topics":["control-flow","deobfuscation","deobfuscator","emotet","ida","ida-pro","idapython","malware","miasm","python","reverse-engineering","stantinko","strings"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/eset.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-07-14T17:49:44.000Z","updated_at":"2024-03-19T16:47:24.000Z","dependencies_parsed_at":"2022-09-04T06:13:09.067Z","dependency_job_id":null,"html_url":"https://github.com/eset/stadeo","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/eset%2Fstadeo","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/eset%2Fstadeo/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/eset%2Fstadeo/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/eset%2Fstadeo/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/eset","download_url":"https://codeload.github.com/eset/stadeo/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":223888520,"owners_count":17220075,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["control-flow","deobfuscation","deobfuscator","emotet","ida","ida-pro","idapython","malware","miasm","python","reverse-engineering","stantinko","strings"],"created_at":"2024-11-09T21:37:34.026Z","updated_at":"2024-11-09T21:37:34.566Z","avatar_url":"https://github.com/eset.png","language":"Python","readme":"Stadeo\n======\n\nStadeo is a set of tools primarily developed to facilitate analysis of\n[Stantinko](https://www.welivesecurity.com/2017/07/20/stantinko-massive-adware-campaign-operating-covertly-since-2012/),\nwhich is a botnet performing click fraud, ad injection, social network\nfraud, password stealing attacks and\n[cryptomining](https://www.welivesecurity.com/2019/11/26/stantinko-botnet-adds-cryptomining-criminal-activities/).\n\nThe scripts, written entirely in Python, deal with Stantinko's unique\ncontrol-flow-flattening (CFF) and string obfuscation techniques\ndescribed in our March 2020\n[blogpost](https://www.welivesecurity.com/2020/03/19/stantinko-new-cryptominer-unique-obfuscation-techniques/).\nAdditionally, they can be utilized for other purposes: for example,\nwe’ve already extended our approach to support deobfuscating the CFF\nfeatured in Emotet – a trojan that steals banking credentials and that\ndownloads additional payloads such as ransomware.\n\nOur deobfuscation methods use\n[IDA](https://www.hex-rays.com/products/ida/), which is a standard tool\nin the industry, and [Miasm](https://github.com/cea-sec/miasm) – an open\nsource framework providing us with various data-flow analyses, a\nsymbolic execution engine, a dynamic symbolic execution engine and the\nmeans to reassemble modified functions.\n","funding_links":[],"categories":["Reverse Engineering"],"sub_categories":["Malware Articles and Sources"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Feset%2Fstadeo","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Feset%2Fstadeo","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Feset%2Fstadeo/lists"}