Introducing “IoC Finder” - A Simple, Interactive Script to Find Files Matching IoC Values
Available as a PowerShell or Bash script.
An IoC is esentially an attribute of a file (such as a hash, file name or string) that matches a known malicious file.
IoC Finder isn't just useful for threat hunting though! When you search for ‘strings’, you extract readable text within files and binaries. If, for example, you have a file containing the word “password” lost somewhere in a folder, this tool can help you locate the file.
You might know how to recursively search a directory for a file hash and print matching files to the terminal, but what if you need to search for a different attribute? The interactive nature of this tool saves you time by elimating the need to retype commands, and allowing you to easily return to any part of the search logic.
Tools such as YARA are typically used for proactive threat hunting, where you don’t know the exact indicators you're looking for. Instead, you compare directories against predefined YARA rule sets containing IoCs. In contrast, IoC Finder can work great when you need to perform quick reactive threat hunting, and you already know the specific attribute you’re looking for.
Hashes:
- MD5 Hash
- SHA-1 Hash
- SHA-256 Hash
File Data:
- File Name
- File Extension Search
- File Size (in bytes)
- Strings search
- Files Recently Created/Accessed/Modified
Executable Files:
- Metadata Search (Executable Files only)
- Authenticode Signature Check (Unsigned Executables - WINDOWS ONLY)
