Skip to content

KicomAV v0.29

Compare
Choose a tag to compare
@hanul93 hanul93 released this 08 Jan 00:39
· 160 commits to master since this release

The following changes have been made to KicomAV v0.29.

  • Engine :

    • k2engine: Handling the callback function call if the plugin module fails to load
    • k2engine: Processing to render the result of recompression in detail after malicious code in the compressed file is processed
    • k2engine: Fixed the problem that the extension can not be removed properly if the kmd file path name has a period (.)
    • k2engine: Fixed an infinite loop problem in case of malfunction code failure
    • k2engine: Process temporary folders by process
    • k2file: Add a class to process temporary folders by process
  • Plugins Modules :

    • adware: new support
    • attach: process to add size information of an attached image to newly extract an attached image
    • bz: New support
    • carch: New support
    • dde: New support
    • egg: new support
    • elf: verbose processing on ELF 64bit
    • emalware: Handle MD5 calculations if section size is 0
    • emalware: Handle malicious code in addition to .text area
    • gz: New support
    • kavutil: MD5 pattern is compressed so that it is decompressed and then loaded
    • ole: Added malicious code remedy to infected ole file
    • ole: Correct the processing for bad access and the PPS length to be 0x40 max.
    • ole: Eliminate unnecessary logic
    • ole: Exploit.OLE.CVE-2003-0347 Add inspection logic
    • ole: Opening ole file in write mode to handle failure to delete stream
    • olenative: Added malicious code remediation to Ole10Native files
    • pdf: Add malware PDF signature test signature
    • pdf: Added Trojan.PDF.Generic inspection logic
    • pdf: Improved inspection speed by avoiding unnecessary stream extraction
    • pe: Do not calculate MD5 if section size is 0
    • pe: Error handling to divide by 0 in converting RAV to Offset
    • pe: If there is a digital signature, the position and size of the attached image are newly processed
    • pe: Processing parsing failure if there is not enough data in the .rsrc area
    • pyz: Added pyc type malicious code
    • pyz: Improved error by checking TOC type
    • pyz: New support
    • tar: New support
    • unpack: Exceptions when zlib is not a compressed object
    • unpack: Process zlib and embed_ole simultaneously to recognize format
    • unpack: add infected malicious code remedy to embed ole file
    • upx: Add exception handling for uncompressed sizes
    • upx: Fixed an issue where execution compression was not released
    • xz: New support
    • yaraex: Engine initialization failure processing when there is no yara module
  • Command Line Interface :

    • k2: engine initialization failure processing when there is no yara module
    • k2: Processing to prevent the same malicious code inspection result from being output
    • k2: Easily recognizable by adding a comma (,) to the number of malicious code patterns loaded
    • k2: Outputs error message after processing residual printout when nonexistent Paht check
    • k2: Output the plug-in module that failed to load as an error message
    • k2: Processing to render the result of recompression in detail after malicious code in the compressed file is processed
    • k2: Processing to prevent redundant output when expressing the result of re-compression in detail
    • k2: Change the update file to a gz file and process the update itself
    • k2: Change update path
      • Related Issue: #4
    • k2: Fixed error when scrolling while printing Windows 10 legacy console
      • Related Issue: #7
  • Tools :

    • sigtool_md5: Reduce capacity by compressing MD5 pattern
    • sigtool_md5: Prevent duplicate malware name generation
    • sigtool_yar: New support