Skip to content

malfav/MalAPI-Hunter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

MalAPI Hunter

MalAPI Hunter is an IDA Pro plugin designed for advanced static malware analysis. It automatically identifies, classifies, and highlights suspicious Windows API calls across categories such as process injection, evasion, anti-debugging, networking, and cryptography. The plugin integrates a curated database of Win32, Native NT, and DLL-specific APIs, enabling fast understanding of malicious behavior patterns and improving reverse engineering accuracy. It provides instruction-level highlighting inside IDA and a structured GUI panel for navigation, filtering, and analysis of API usage, significantly improving static analysis workflow and detection efficiency. The plugin is accessed via the hotkey Ctrl + Shift + A after installation.

image_alt

API's Database

image_alt

Features

  • Automatic detection of suspicious API calls
  • Categorization (Injection, Evasion, Anti-Debugging, Networking, Cryptography, etc.)
  • Large API database (Win32, Native NT, DLL-specific APIs)
  • Instruction-level highlighting inside IDA
  • GUI panel for navigation and filtering
  • Fast static behavioral overview
  • Reverse engineering workflow optimization

Installation & Usage

  • mal_api_hunter.py must be copied into: C:\Users\your_username\AppData\Roaming\Hex-Rays\IDA Pro\plugins

Note :

  • After placing the file, restart IDA Pro. Open a binary, press Ctrl + Shift + A, and use the GUI panel to browse detected APIs, navigate to code locations, and analyze categorized behavior for faster triage.

image_alt

Use Cases

  • Malware triage, static behavior analysis, reverse engineering acceleration, and detection of injection, evasion, anti-debugging, and other malicious techniques.

Requirements

  • IDA Pro with Python support.

Demonstration

Watch demo

About

MalAPI Hunter is an IDA Pro plugin for static malware analysis that detects, classifies, and highlights suspicious Windows API calls. It uses a large curated database to map APIs to behaviors like injection, evasion, and networking, and provides a GUI panel for efficient navigation and analysis.

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages