Listen to this Post
When facing a malware threat, quick and efficient analysis is crucial. Malwoverview, an open-source tool created by Alexandre Borges, simplifies initial malware investigations by centralizing data from multiple threat intelligence platforms.
Key Features of Malwoverview:
- Centralized Threat Intelligence: Pulls data from VirusTotal, Hybrid Analysis, Malshare, URLHaus, Polyswarm, AlienVault, Malware Bazaar, and more.
- Multi-Format Analysis: Supports hash, IP, URL, domain, PE files, and APKs.
- Risk Classification: Automatically categorizes files in a directory by threat level.
- Imphash & Overlay Detection: Identifies similar malware samples and hidden payloads.
- Large File Handling: Processes files over 32 MB efficiently.
How to Use Malwoverview
1. Installation:
- Pre-installed in REMnux (a malware analysis Linux distro).
- Download from: https://github.com/alexandreborges/malwoverview
2. Basic Commands:
Analyze a file hash python3 malwoverview/malwoverview.py -H <hash> Scan a directory for malware python3 malwoverview/malwoverview.py -d /path/to/files Check a suspicious URL python3 malwoverview/malwoverview.py -u http://malicious-site.com
3. Generating Reports:
Export results to JSON python3 malwoverview/malwoverview.py -H <hash> --json report.json
You Should Know:
- Linux Malware Analysis Tools:
- YARA: Rule-based malware identification.
yara -r rules.yar suspicious_file
- Capa: Detects malware capabilities.
capa -v malware_sample.exe
- PEframe: PE file analysis.
peframe malware.exe
Windows Command Line Checks:
- Process Analysis:
tasklist /svc wmic process get name,executablepath,processid
- Network Connections:
netstat -ano
What Undercode Say:
Malwoverview is an essential tool for rapid malware triage, especially when time is critical. Combining it with REMnux, YARA, and VirusTotal enhances threat detection. For deeper analysis, use IDA Pro, Ghidra, or x64dbg. Always verify suspicious hashes across multiple platforms before concluding.
Expected Output:
[+] File: malware_sample.exe |-- SHA256: a1b2c3... |-- Detection: 45/70 (VirusTotal) |-- Tags: Trojan, Ransomware |-- Related Samples: 5 (Imphash match)
For more details, visit:
References:
Reported By: Laurent Biagiotti – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅