# -*- coding: UTF-8 -*- import pickle from func import * from idc import * import os def preprocess(): # E:\BaiduNetdiskDownload\IDA_Pro_v6.8\IDA_Pro_v6.8\idaq.exe -c -S"raw-feature-extractor/preprocessing_ida.py --path C:\Program1\pycharmproject\Genius3\acfgs" hpcenter # print str(sys.argv) #['raw-feature-extractor/preprocessing_ida.py'] # print str(idc.ARGV) #['raw-feature-extractor/preprocessing_ida.py', '--path', 'C:\\Program1\\pycharmproject\\Genius3\\acfgs'] # print idc.ARGV[2] # print type(idc.ARGV[2]) binary_name = idc.GetInputFile() workflow = idc.ARGV[1] # workflow为特定值时分析良性软件,否则分析恶意软件 if workflow == '-1': cfg_path = "D:\\bishe\\dataset\\benign\\refind_cfg\\{}.ida".format(binary_name) gdl_path = "D:\\bishe\\dataset\\benign\\refind_dot\\{}.dot".format(binary_name) asm_path = "D:\\bishe\\dataset\\benign\\refind_asm\\{}.asm".format(binary_name) else: cfg_path = "D:\\bishe\\dataset\\infected\\infected_cfg\\{}.ida".format(binary_name) gdl_path = "D:\\bishe\\dataset\\infected\\infected_dot\\{}.dot".format(binary_name) asm_path = "D:\\bishe\\dataset\\infected\\infected_asm\\{}.asm".format(binary_name) analysis_flags = idc.GetShortPrm(idc.INF_START_AF) analysis_flags &= ~idc.AF_IMMOFF idc.SetShortPrm(idc.INF_START_AF, analysis_flags) idaapi.autoWait() # 生成pe文件的cfg列表 # cfgs = get_func_cfgs_c(FirstSeg()) # 将cfg保存为.ida # pickle.dump(cfgs, open(cfg_path, 'w')) # 生成pe文件的fcg,保存为.dot文件 # idc.GenCallGdl(gdl_path, 'Call Gdl', idc.CHART_GEN_GDL) 这个生成gdl文件,网上几乎找不到gdl这个格式 # idc.GenCallGdl(gdl_path, 'Call Gdl', idaapi.CHART_GEN_DOT) # 生成.asm文件 idc.GenerateFile(idc.OFILE_ASM, asm_path, 0, idc.BADADDR, 0) # 关闭IDA Pro idc.Exit(0) # 通用命令行格式 idaq64 -c -A -S"preprocessing_ida.py arg1 arg2" VirusShare_bca58b12923073 # 此处使用 idaq64 -c -A -S"preprocessing_ida.py workflow" -oF:\iout pe_path,完整命令行如下 # F:\kkk\IDA_6.6\idaq64 -c -A -S"D:\hkn\project_folder\Gencoding3\Genius3\raw-feature-extractor\preprocessing_ida.py 0" -oF:\iout D:\hkn\infected\datasets\virusshare_infected0\VirusShare_bc161e5e792028e8137aa070fda53f82 # D:\IDA_Pro_v6.8\idaq64.exe -c -A -S"D:\bishe\Gencoding_KE\Genius3\raw-feature-extractor\preprocessing_ida.py 0" -oD:\bishe\dataset\out D:\bishe\dataset\train_malware\0ACDbR5M3ZhBJajygTuf if __name__ == '__main__': preprocess()