ExeScan is a console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and detect all kind of anomalies in its PE header fields including checksum verification’s, size of various header fields, improper size of raw data, non-ascii/empty section names etc.
Various packers/protectors modify PE header to make reversing harder. Sometimes anomalies in PE header may crash Debugging tools thereby blocking your attempt to reversing. Such anomalies can also make some of the GUI based PE analysis tools to fail to parse PE headers.
In such cases ExeScan can come handy by helping you to quickly detect such anomalies. Then you can fix them and proceed to further analysis of malware.
In addition to finding various anomalies, it can also detect packer/compiler used to pack/build the target executable file. Being console based tool, you can easily integrate it with your malware automation suite.
Here are the main feature highlights
- Quickly detect all kind of Anomalies in EXE/PE file.
- Console tool makes it easy for automation.
- Compiler and Packer signatures detection
- Scan for commonly used malware APIs
- PE header and Import table structure dispaly
- Native support for report generation
ExeScan requires following components
ExeScan is very simple and easy to use.
Here are the brief usage details
- Before you launch – make sure you have installed all the above mentioned requirements.
- Next launch command prompt (start=>Run=>cmd.exe) and move to directory where you have extracted ExeScan file
- Then type ‘exescan.py -a <path to exe file>’ and instantly it will show all the anomalies along with other PE information as shown in the screenshot below.