-
Notifications
You must be signed in to change notification settings - Fork 640
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Error Uploading Password Protected ZIP #840
Comments
Hello, can you please run this command
The zip archive that contains protected observables must has a flat structure: no folders in it, just the files to convert as observable. |
Hello, The ZIP does not have a flat structure; I wasn't previously aware of that being a requirement (until the testing above), but that seemed to be the 'issue'/case after the testing. As requested, however, the unzip -vl output:
|
I think that the UI should warn the users when something goes wrong during file observable creation, which is the subject of issue #829. |
Request Type
Bug
Work Environment
Problem Description
Trying to upload a McAfee ENS 10.5 zip file containing a malware sample, ENS automatically ZIPs and adds password 'infected' to it. 7-zip can open the file, but TheHive won't add it as an observable -- no reason given in the UI, just nothing happens when you click Add Observable.
Steps to Reproduce
Fails Under These Conditions:
File Contents (for reference):
Success Under These Conditions:
This has happened in 3.1 and 3.2.1. Affects quarantined app.exe and app.msi. ZIP routine doesn't like the folders in the archive?
I took a look in /var/log/thehive/application.log and there's an error "org.elastic4play.ErrorHandler in application-akka.actor.default-dispatcher-18 - POST /api/case//artifact returned 400 java.lang.IllegalArgumentException: Invalid prefix or suffix"
Complementary Information
Backed up and removed application.log. Restarted TheHive. Tried again. The only entry in the file after 18:32 when next I tried adding the original ZIP was:
Workaround
Created an analyzer for a double password-protected, double zipped collection of files and folders. TheHive strips the password from the Outermost ZIP, then the Analyzer can be run to unzip the Innermost ZIP and add the files within as Observables using TheHive4Py (which of course get the malware password automatically placed on them) allowing other analyzers (e.g. VirusTotal) happily. (Might tinker further to add a toggle between auto-add and artifact/manual-add for files within the ZIP... just happy I've managed this much so far.)
The text was updated successfully, but these errors were encountered: