For this blog post, I'm not providing any opinions or reviews. I'm just listing the service, URL, and a basic description as quoted by the provider.
These are the malware analysis services and software that I am currently aware of from the Buster Sandbox link, or via other sources. If you know of any other good malware analysis services, please feel free to drop me an email and I will add it to the list.
Web Services
"We can accept any type of file including executables, documents, spreadsheets, presentations, compiled help files, database packages, PDF, images, emails, or archives. You can also submit a file from a remote web address.""View PDF objects as hex/text, PDF dissector and inspector, scan for known exploits"
"Joe Sandbox is a fully automated analysis system for trojans, viruses and rootkits (malware). It requests malicious executables such as PE, PDF (Acrobat Reader) or DOC (Microsoft Word) files as input and returns highly detailed reports describing the behavior of executables being executed"
Note: Joe Sandbox has an online service with three account types. It is described more fully here: http://www.joesecurity.org/service.php
"Anubis is a service for analyzing malware. Submit your Windows executable and receive an analysis report telling you what it does. Alternatively, submit a suspicious URL and receive a report that shows you all the activities of the Internet Explorer process when visiting this URL"
"Wepawet is a service for detecting and analyzing web-based malware. It currently handles Flash, JavaScript, and PDF files."
"Submit a Suspicious File for a FREE Malware Analysis"
"Due to heavy load, the public site does not support: URL or BHO analysis, zipped files or analysis of infected documents."
"ThreatExpert is an advanced automated threat analysis system designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a fully automated mode."
Accepts:
- Windows executable (exe,dll)
– Adobe PDF (Beta Testing)
– Zip file (with password “panda”)
– RAR compressed file (without password)
– 7zip Compressed file (without password)
– Autovin File Extractor compressed file
- BitBlaze Malware Analysis Service - Currently Offline
"xandora.net is a tool for analyzing the behavior of Windows PE-executables with special focus on the analysis of malware. Execution of xandora.net results in the generation of a report file that contains enough information to give a human user a very good impression about the purpose and the actions of the analyzed binary.
The generated report includes detailed data about modifications made to the Windows registry or the file system or other processes and of course it logs all generated network traffic. The analysis is based on running the binary in an emulated environment and watching."
"Submit your Windows executable(*.exe) and receive an analysis report telling you what it does,
or submit a suspicious URL and receive a report that shows you all the activities of the Internet Explorer process when visiting this URL."
A Generic JavaScript Unpacker. Enter a single URL (or paste JavaScript to decode). Upload a PDF, pcap, HTML, or JavaScript file.
Standalone Malware Sandboxing Software
"An Open Source dynamic malware analysis system which allows you to get informations on suspicious files in a completely automated fashion.
Such results include:
* Relevant Windows API calls tracing of all recursively spawned processes.
* Network traffic dump generated during malware execution.
* Files being downloaded and deleted during execution.
* Screenshots taken during malware the whole analysis process."
"Software and tips to easily build up an automated malware analysis station based on a concept introduced in the paper Mass Malware Analysis: A Do-It-Yourself Kit."
"Zero wine is an open source (GPL v2) research project to dynamically analyze the behavior of malware. Zero wine just runs the malware using WINE in a safe virtual sandbox (in an isolated environment) collecting information about the APIs called by the program. "
"Buster Sandbox Analyzer is a tool that has been designed to analyze the behaviour of processes and the changes made to system and then evaluate if they are malware suspicious.
The changes made to system can be of several types: file system changes, registry changes and port changes."https://vicheck.ca/
"This is a free tool for the analysis of malicious PDF documents. Has specialized tools for dealing with obsfuscated javascript, low level pdf headers and objects, and shellcode."
jsunpack-n emulates browser functionality when visiting a URL. It's purpose is to detect exploits that target browser and browser plug-in vulnerabilities. It accepts many different types of input:
PDF files - samples/sample-pdf.file
Packet Captures - samples/sample-http-exploit.pcap
HTML files
JavaScript files
SWF files
This project contains the source code which runs at the website http://jsunpack.jeek.org/.
7 comments:
http://www.okamalo.com/2008/11/malware-online-database-and-analysis.html
Does anyone know some open source alternatives for sandboxes similar to Anubis, Threatexpert, etcetera, besides ZeroWine, Cucko?
We do not have a self-service portal that is open to the public, but the SpiderLabs team at Trustwave performs a great deal of targeted malware analysis for organizations around the world. Anyone in need of this service can give us a shout.
Well it is my good luck in real, as I was searching something else on internet and I am here to your blog by chance and I must say it is a good site buddy.
The blog article very surprised to me! Your writing is good. In this I learned a lot! Thanks for a well explained topic to share.
You know who I am.
Oregon...
We both need to blog more :)
Cheerios
Hi guys, here is another alternative for your list:
https://www.hybrid-analysis.com
The service is free and focuses on in-depth malware analysis, especially extracting interesting disassembly listings and behavior signatures that can be used to understand malware and find entrypoints for deeper manual analysis. Currently it only supports 32-bit executable Windows files, but we are planning on adding document analysis (PDF/DOC/DOCX/XLS/XLSX) soonishly.
Here are some interesting samples for a start maybe:
http://www.hybrid-analysis.com/sample/552780e466664ff12cc144d4212f332ee0b92ccc10017727a9d5785e1f575911/
We also have an API for automatic submission that can be requested from
us via the contact form.
Best regards,
Jan
Post a Comment