AmCache-EvilHunter is a command-line tool to parse and analyze Windows Amcache.hve registry hives, identify evidence of execution, suspicious executables, and integrate VirusTotal/OpenTIP lookups for enhanced threat intelligence.
demo.mp4
- Parse offline
Amcache.hveregistry hives. - Filter records by date range (
--start,--end). - Search records using keywords (
--search). - Identify known suspicious executables (
--find-suspicious). - Identify executables without a publisher (
--missing-publisher). - Kaspersky OpenTIP integration for hash lookups (
--opentip,--only-detections). - VirusTotal integration for hash lookups (
--vt,--only-detections). - Export results to JSON (
--json) or CSV (--csv).
- Python 3.7 or higher
- requests
- python-registry
- rich
Install dependencies via pip:
pip3 install -r requirements.txtgit clone https://github.com/cristianzsh/amcache-evilhunter.git
cd amcache-evilhunter
pip3 install -r requirements.txtpython3 amcache_evilhunter.py -i path/to/Amcache.hve [OPTIONS]| Flag | Description |
|---|---|
-i, --input PATH |
Path to Amcache.hve (required) |
--start YYYY-MM-DD |
Only include records on or after this date |
--end YYYY-MM-DD |
Only include records on or before this date |
--search TERMS |
Comma-separated, case-insensitive search terms |
--find-suspicious |
Filter only records matching known suspicious patterns |
--missing-publisher |
Filter only records with missing Publisher |
--exclude-os |
Only include non-OS-component files |
--opentip |
Enable Kaspersky OpenTIP lookups (requires OPENTIP_API_KEY env variable) |
-v, --vt |
Enable VirusTotal lookups (requires VT_API_KEY env variable) |
--only-detections |
Show/save only files with ≥1 VT detection |
--json PATH |
Path to write full JSON output |
--csv PATH |
Path to write full CSV output |
-V, --version |
Show version information |
-
Parse and display all records:
python3 amcache_evilhunter.py -i Amcache.hve
-
Filter by date range and search for "notepad":
python3 amcache_evilhunter.py -i Amcache.hve --start 2021-01-01 --end 2021-12-31 --search notepad
-
Identify suspicious executables and query VirusTotal:
python3 amcache_evilhunter.py -i Amcache.hve --find-suspicious -v
-
Export VirusTotal detections to JSON:
export VT_API_KEY=YOUR_API_KEY python3 amcache_evilhunter.py -i Amcache.hve -v --only-detections --json detections.json
VT_API_KEY: Your VirusTotal API key used for file hash lookups.OPENTIP_API_KEY: Your OpenTIP API key used for file hash lookups.
A build.sh script is provided to generate standalone binaries for both Linux and Windows (via Wine).
chmod +x build.sh
./build.shThis project is licensed under the MIT License. See LICENSE for details.