Skip to content

mr-satan1/SMAT

Repository files navigation

SMAT - Simple Malware Analysis Tool

SMAT is a simple web application written in Python. It leverages Flask, Yara-Python and the Requests module as well as OSINT sources such as VirusTotal and the Yara-Rules Public repository. SMAT's purpose is simple from a user perspective: Feed it a suspicious file and SMAT will return back data you need for quick triage!

screen shot 2016-05-07 at 6 27 51 pm

Overview

  • What Yara rules were matched against this file.
  • What data VirusTotal has on this file.
  • Name and size of said suspicious file.
  • Logged metadata (Filename, Submission Date, MD5 hash, VirusTotal and Yara results) in 'SMAT.log' in the application root directory.
  • SQLite database ('smat.db') backend.

Built With

This web application requires the following:

  • Python 2.7
  • Yara and Yara-Python (You will need to configure Yara && Yara-Python on your own. Just follow the docs.)
  • Requests
  • Flask
  • SQLite

This is a quick triage for unknown/untrusted files leveraging Yara and VirusTotal. This is designed to run locally and is a proof of concept (BETA) at this time.

Installation & Usage

  • Note: Once again, please ensure you have Yara and Yara-Python installed on the system. git clone https://github.com/mr-satan1/SMAT.git
    cd SMAT
    pip install -r requirements.txt
    python createDB.py
    python app.py

To Do

  • Include auto-update mechanism for Yara Rules.
  • Include Flask-Admin & User Authentication mechanism.
  • Configure Docker container:
    • Alpine Linux
    • Python 2.7 / PIP
    • Nginx load balancer
    • HTTPS

About

SMAT - Simple Malware Analysis Tool

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published