Malcat

@malcat@infosec.exchange
120 Followers
48 Following
52 Posts

If you need to identify #malware quickly, give #malcat a try: its Kesakode code identification is fast and can even work offline!

More info: https://doc.malcat.fr/analysis/kesakode.html

Does someone know this #malware, since this is definitely NOT latrodectus. Looks like some Discord-backed infostealer:

https://bazaar.abuse.ch/sample/85f8ccf69bed672d92b40c45f9571378a7d00c80b86004a76018d9e120eeaa01/

You can now check your strings in #malcat against an online library of #Malpedia FLOSSed strings. Just copy this plugin:

https://github.com/malpedia/malpedia-flossed?tab=readme-ov-file#plugin-for-malcat

#Malcat 0.9.10 is out! State-of-the-art CFG recovery, MIPS disassembler & decompiler and many UI improvements;

https://malcat.fr/blog/0910-is-out-cfg-recovery-mips-ui-improvements

0.9.10 is out: CFG recovery, MIPS & UI improvements

Malcat version 0.9.10 is out! In this release, we have improved Malcat's CFG recovery algorithm and compared its performances against other reversing software. A new CPU architecture (MIPS) has also been added and multiple improvements to the decompiler interface in Malcat were made. Last but not least, several QoL changes have been made, from a new preview popup in data and code views to new scripts/transform and an more extensive corpus search.

MALCAT

#Malcat 0.9.10 is out! State-of-the-art CFG recovery, MIPS disassembler & decompiler and many UI improvements;

https://malcat.fr/blog/0910-is-out-cfg-recovery-mips-ui-improvements

0.9.10 is out: CFG recovery, MIPS & UI improvements

Malcat version 0.9.10 is out! In this release, we have improved Malcat's CFG recovery algorithm and compared its performances against other reversing software. A new CPU architecture (MIPS) has also been added and multiple improvements to the decompiler interface in Malcat were made. Last but not least, several QoL changes have been made, from a new preview popup in data and code views to new scripts/transform and an more extensive corpus search.

MALCAT

Malcat version 0.9.9 is out! Check out the new offline version of Kesakode for blazing-fast (unpacked) #malware identification across 2000+ families.

Also python 3.13 support (& disassembler), new file parsers & improved UI:

https://malcat.fr/blog/099-is-out-offline-kesakode-python-313-ui

0.9.9 is out: Offline Kesakode, python 3.13 & UI

Malcat version 0.9.9 is out! Say hello to the offline version of Kesakode, which lets you identify malware even faster and without uploading any hash! You will also see several UI improvements, python 3.13 support and a couple of optimisations regarding file parsers. Last but not least, the threat intelligence features are now available in the lite edition!

MALCAT

Malcat tip #9: So you have found this nice #malware hash in a report, but no sample?

"File>Download from hash" will retrieve the hash for you from:

● Triage
● MalwareBazaar
● VirusShare
● MWDB
● FileScanIO

NB: some of these sources require (free) API keys.

In the next version of #malcat, we will include an _offline_ smaller #kesakode database which will only contain conflict-free malware signatures.

This will be fast and run with every analysis. You can always get the full deal (clean + lib) afterwards with an online query.

You'll soon be able to export #malcat's view to files:
● Summary report as HTML+ SVG
● Proximity & call graph views as SVG or PNG
● Struct/hex/disasm views as HTML
● Strings, symbols, intel, kesakode and other views as CSV

Malcat 0.9.8 is out! You'll find a lot of QoL improvements, improved API and more doc. More infos:

https://malcat.fr/blog/098-is-out-scripting-qol-improvements/

0.9.8 is out: Scripting & QoL improvements

Malcat version 0.9.8 is out! You will find many quality-of-life improvements, such as an improved transform dialog, better scripting support, better data preview and many more.

MALCAT