Strelka is a real-time, container-based file scanning system used for threat hunting, threat detection, and incident response. Originally based on the design established by Lockheed Martin’s Laika BOSS and similar projects (see: related projects), Strelka’s purpose is to perform file extraction and metadata collection at enterprise scale.
Strelka differs from its sibling projects in a few significant ways:
Core codebase is Go and Python3.10+
Server components run in containers for ease and flexibility of deployment
OS-native client applications for Windows, Mac, and Linux
Strelka is a modular data scanning platform, allowing users or systems to submit files for the purpose of analyzing, extracting, and reporting file content and metadata. Coupled with a SIEM, Strelka is able to aggregate, alert, and provide analysts with the capability to better understand their environment without having to perform direct data gathering or time-consuming file analysis.
Quickstart
Running a file through Strelka is simple. In this section, Strelka capabilities of extraction and analysis are demonstrated for a one-off analysis.
Please review the documentation for details on how to properly build and deploy Strelka in an enterprise environment.
If Strelka was deployed and ingesting files in your environment, you might be collecting these events in your SIEM. With this analysis, you could write a rule that looks for events matching the suspicious yara tags, alerting you to a potentially malicious file.
Strelka’s UI is available when you build the provided containers. This web interface allows you to upload files to Strelka and capture the events, which are stored locally.
With over 50 file scanners for the most common file types (e.g., exe, docx, js, zip), Strelka provides users with the ability to gain new insights into files on their host, network, or enterprise. While Strelka is not a detection engine itself (although it does utilize YARA, it can provide enough metadata to identify suspicious or malicious files. Some potential uses for Strelka include:
Additional Documentation
More documentation about Strelka can be found in the README, including:
Users are advised to precompile their YARA rules for optimal performance and to avoid potential issues during runtime.
Using precompiled YARA files helps in reducing load time and resource usage, especially in environments with a large
set of rules. Ensure to use the compiled option in the Strelka configuration
to point to the precompiled rules file.
Releases | Documentation | Pull Requests | Issues
Strelka is a real-time, container-based file scanning system used for threat hunting, threat detection, and incident response. Originally based on the design established by Lockheed Martin’s Laika BOSS and similar projects (see: related projects), Strelka’s purpose is to perform file extraction and metadata collection at enterprise scale.
Strelka differs from its sibling projects in a few significant ways:
Features
Strelka is a modular data scanning platform, allowing users or systems to submit files for the purpose of analyzing, extracting, and reporting file content and metadata. Coupled with a SIEM, Strelka is able to aggregate, alert, and provide analysts with the capability to better understand their environment without having to perform direct data gathering or time-consuming file analysis.
Quickstart
Running a file through Strelka is simple. In this section, Strelka capabilities of extraction and analysis are demonstrated for a one-off analysis.
Please review the documentation for details on how to properly build and deploy Strelka in an enterprise environment.
Step 1: Install prerequisites
Step 2: Download Strelka
Step 3: Download and install preferred yara rules (optional)
Step 4a: Pull precompiled images and start Strelka
Note: You can skip the
go buildprocess and use theStrelka UIathttp://0.0.0.0:9980to analyze files.Step 4b: Build and start Strelka
Note: You can skip the
go buildprocess and use theStrelka UIathttp://0.0.0.0:9980to analyze files.Step 5: Prepare a file to analyze
Use any malware sample, or other file you’d like Strelka to analyze.
Step 6: Analyze the file with Strelka using the dockerized oneshot
What’s happening here?
The following output has been edited for brevity.
What’s next?
If Strelka was deployed and ingesting files in your environment, you might be collecting these events in your SIEM. With this analysis, you could write a rule that looks for events matching the suspicious yara tags, alerting you to a potentially malicious file.
Fileshot UI
Strelka’s UI is available when you build the provided containers. This web interface allows you to upload files to Strelka and capture the events, which are stored locally.
Navigate to http://localhost:9980/ and use the login strelka/strelka.
Potential Uses
With over 50 file scanners for the most common file types (e.g., exe, docx, js, zip), Strelka provides users with the ability to gain new insights into files on their host, network, or enterprise. While Strelka is not a detection engine itself (although it does utilize YARA, it can provide enough metadata to identify suspicious or malicious files. Some potential uses for Strelka include:
Additional Documentation
More documentation about Strelka can be found in the README, including:
Contribute
Guidelines for contributing can be found here.
Known Issues
Issues with Loading YARA Rules
Users are advised to precompile their YARA rules for optimal performance and to avoid potential issues during runtime. Using precompiled YARA files helps in reducing load time and resource usage, especially in environments with a large set of rules. Ensure to use the compiled option in the Strelka configuration to point to the precompiled rules file.
Other Issues
See issues labeled
bugin the tracker for any additional issues.Related Projects
Licensing
Strelka and its associated code is released under the terms of the Apache 2.0 License.