Malware on the Wire: Monitoring Network Traffic with Suricata and ClamAV

Malware on the Wire: Monitoring Network Traffic with Suricata and ClamAV

In my endless quest to essentially create a Cisco Firepower firewall for poor people, I found a bit of a gap in the open source security ecosystem. While we have great tools for detecting malicious network traffic patterns, we don’t have easy ways of detecting malicious files in transit. So, a bit of fiddling around later, and I have a fairly basic system for integrating Suricata’s ‘filestore’ functionality with ClamAV’s real time scanning, thereby producing a log containing the source and destination addresses of any malicious files detected.

Example log outptut:

Jun 20 02:52:00 servername python3[4686]: 2020-06-20T02:52:00.431931+0000 src_ip=213.211.198.58 dest_ip=192.168.122.30 filename=eicar.com scan=/var/log/suricata/filestore/e0/e038b5168d9209267058112d845341cae83d92b1d1af0a10b66830acb7529494: Eicar-Signature FOUND

This system is largely a work in progress at this time. Someday I will build in some neat SIEM integrations, or at the very least some write up some quick-and-dirty OSSEC alert rules.

Setup

First of all, make sure the system has lots of storage available. Since this will catch all plaintext HTTP files, this server could quickly fill up. I would say at a minimum the box should have about 100GB of storage mounted at /var/log/.

Clam AV

First, install the ClamAV software on the system:

sudo apt install clamav clamav-base clamav-freshclam clamdscan clamav-daemon

Then, set the service to always start.

sudo systemctl enable --now clamav-daemon

To test the service, try scanning your favourite file.

sudo clamdscan /usr/games/cowsay --fdpass

Hopefully, the scan will look a little like this. If it’s already finding infected files… There could be some other problems.

/usr/games/cowsay: OK

----------- SCAN SUMMARY -----------
Infected files: 0
Time: 0.009 sec (0 m 0 s)

Suricata

First, install Suricata on the server. In this case, it’s a Ubuntu 18.04 system.

sudo add-apt-repository ppa:oisf/suricata-stable
sudo apt update 
sudo apt install suricata

Then, update the basic rules and reload the service.

sudo suricata-update 
sudo kill -USR2 `pidof suricata`

To catch files, we will be using the ‘filestore’ module of Suricata. This requires some modifications to the main configuration file, /etc/suricata/suricata.yaml:

...
outputs: 
  ...
  - eve-log: 
    enabled:    yes
    filetype:   regular
    filename:   eve.json
    ...
    types: 
      ...
      - files: 
        force-magic: yes
        force-hash: ["sha256"]

After editing the file, restart or reload the Suricata service.

sudo systemctl restart suricata

This enabled the ‘fileinfo’ logger to add information to the eve.json log file. To see it in action, generate a request that will return a plaintext file:

curl http://google.ca

Then, grep for an event:

sudo grep "fileinfo" /var/log/suricata/eve.json | jq 

The result will be similar to this:

{
  "timestamp": "2020-06-14T03:36:07.150550+0000",
  "flow_id": 1495995546812515,
  "in_iface": "enp1s0",
  "event_type": "fileinfo",
  "src_ip": "172.217.10.67",
  "src_port": 80,
  "dest_ip": "192.168.122.30",
  "dest_port": 40998,
  "proto": "TCP",
  "http": {
    "hostname": "google.ca",
    "url": "/",
    "http_user_agent": "curl/7.58.0",
    "http_content_type": "text/html",
    "http_method": "GET",
    "protocol": "HTTP/1.1",
    "status": 301,
    "redirect": "http://www.google.ca/",
    "length": 218
  },
  "app_proto": "http",
  "fileinfo": {
    "filename": "/",
    "sid": [],
    "magic": "HTML document, ASCII text, with CRLF, LF line terminators",
    "gaps": false,
    "state": "CLOSED",
    "sha256": "c2655a9c494461170600f479ed0209ea087088d59f2a237c2e740396142cc2c0",
    "stored": true,
    "file_id": 35,
    "size": 218,
    "tx_id": 0
  }
}

Next, the filestore functionality must be enabled for the system. Once more, edit suricata.yaml

outputs: 
  ...
  - file-store: 
    version:         2
    enabled:         yes 
    write-fileinfo:  yes 
    force-filestore: yes 

After reloading once more, another request can be made. This time, find the sha256 checksum from the fileinfo event, and locate the stored file:

sudo cat /var/log/suricata/filestore/c2/c2655a9c494461170600f479ed0209ea087088d59f2a237c2e740396142cc2c0

<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>301 Moved</TITLE></HEAD><BODY>
<H1>301 Moved</H1>
The document has moved
<A HREF="http://www.google.ca/">here</A>.
</BODY></HTML>

In this case, it’s pretty boring. That’s ok though, there will be plenty of interesting files to inspect later!

Scanning Malware Files

For the rest of this post, I’ll be using the EICAR test file. It’s a completely benign file, but is used as a benchmark for testing antivirus software. For more info, see the Wikipedia article.

To test what’s set up so far, go ahead and download the test file:

wget http://2016.eicar.org/download/eicar.com

Then, grep for the fileinfo event:

sudo grep "fileinfo" /var/log/suricata/eve.json | jq

There should be an entry similar to this:

{
  "timestamp": "2020-06-20T01:35:44.824301+0000",
  "flow_id": 966165374470776,
  "in_iface": "enp1s0",
  "event_type": "fileinfo",
  "src_ip": "213.211.198.58",
  "src_port": 80,
  "dest_ip": "192.168.122.30",
  "dest_port": 42134,
  "proto": "TCP",
  "http": {
    "hostname": "2016.eicar.org",
    "url": "/download/eicar.com",
    "http_user_agent": "Wget/1.19.4 (linux-gnu)",
    "http_content_type": "application/octet-stream",
    "http_method": "GET",
    "protocol": "HTTP/1.1",
    "status": 200,
    "length": 70
  },
  "app_proto": "http",
  "fileinfo": {
    "filename": "eicar.com",
    "sid": [],
    "magic": "EICAR virus test files",
    "gaps": false,
    "state": "CLOSED",
    "sha256": "e038b5168d9209267058112d845341cae83d92b1d1af0a10b66830acb7529494",
    "stored": true,
    "file_id": 3,
    "size": 70,
    "tx_id": 0
  }
}

Then, using the sha256 sum, we can inspect the file that Suricata intercepted:

sudo clamdscan --fdpass /var/log/suricata/filestore/e0/e038b5168d9209267058112d845341cae83d92b1d1af0a10b66830acb7529494
/var/log/suricata/filestore/e0/e038b5168d9209267058112d845341cae83d92b1d1af0a10b66830acb7529494: Eicar-Signature FOUND

----------- SCAN SUMMARY -----------
Infected files: 1
Time: 0.009 sec (0 m 0 s)

Neat! The system was able to extract a file from data flowing across it, then analyze it to check for malicious software!

Now it’s time to put all the pieces together.

Automating the scan with Python

This is a quick scanner script I threw together to extract information from the eve log and run it through clamav:

#!/usr/bin/env python3

import os 
import json 
import subprocess

filestore_base_path="/var/log/suricata/filestore/"

f = subprocess.Popen(['tail','-F','/var/log/suricata/eve.json'],\
        stdout=subprocess.PIPE,stderr=subprocess.PIPE)

while True:
    line = f.stdout.readline()
    eve  = json.loads(line)

    if eve['event_type'] == "fileinfo": 

        shasum   = eve['fileinfo']['sha256']
        filename = eve['fileinfo']['filename']

        captured_file = filestore_base_path + shasum[:2] + "/" + shasum
        scan_result   = subprocess.run(\
            ['clamdscan', '--no-summary', '--stdout', '--stream', captured_file],\
            stdout=subprocess.PIPE).stdout.decode('utf-8').rstrip()

        logLine = str(eve['timestamp']) + \
            " src_ip=" +   eve['src_ip'] + \
            " dest_ip=" +  eve['dest_ip'] + \
            " filename=" + eve['fileinfo']['filename'] + \
            " scan=" + scan_result
        print(logLine)
        

When run, it will follow the logs until stopped. If any ‘infected’ files are found, the output will look somewhat like this:

2020-06-20T01:35:44.824301+0000 src_ip=213.211.198.58 dest_ip=192.168.122.30 filename=eicar.com scan=/var/log/suricata/filestore/e0/e038b5168d9209267058112d845341cae83d92b1d1af0a10b66830acb7529494: Eicar-Signature FOUND

Then, with some finesse this script can be loaded as a systemd service and run in the background.

The unit file is created at /etc/systemd/system/filestore-scanner.service

[Unit]
Description=Suricata malware detector
After=network.target

[Service]
Type=simple
User=root
Group=root
ExecStart=/usr/bin/python3 -u /opt/scripts/suricata/scanner.py
Restart=always
ProtectSystem=full
ProtectHome=yes
PrivateDevices=yes
NoNewPrivileges=yes
PrivateTmp=yes

[Install]
WantedBy=multi-user.target

Then, the filestore scanner service can be enabled.

sudo systemctl daemon-reload
sudo systemctl enable --now filestore-scanner

Once it’s up and running, we can create some network traffic to generate some log events. In this case, I upgraded some packages on the system.

sudo journalctl -xe -u filestore-scanner 
Jun 20 02:48:59 servername python3[4686]: 2020-06-20T02:48:59.342957+0000 src_ip=91.189.91.39 dest_ip=192.168.122.30 filename=/ubuntu/pool/main/libd/libdrm/libdrm2_2.4.101-2~18.04.1_amd64.deb scan=/var/log/suricata/filestore/b2/b2c2c28c86ae2e0499f918f4566ed9e6d7a20552cf4bf66355daea7bceb1f120: OK

And, of course, we can generate some alerts the same way:

Jun 20 02:52:00 servername python3[4686]: 2020-06-20T02:52:00.431931+0000 src_ip=213.211.198.58 dest_ip=192.168.122.30 filename=eicar.com scan=/var/log/suricata/filestore/e0/e038b5168d9209267058112d845341cae83d92b1d1af0a10b66830acb7529494: Eicar-Signature FOUND

So, there it is. A basic integration to make a slightly more ‘aware’ security monitoring system. At this point, it’s still very much a Proof-of-Concept system, but with some more time behind the console it could become a very interesting addition to an existing threat protection device.