-
**Is your feature request related to a problem? Please describe.**
Currently Raspirus is highly dependant on MD5 signatures. If there is a virus whose signature we don't have, Raspirus has no way to …
-
When I analyse a malware on win7, there is no network activity while when I analyses same sample on winxp it try to access multiple domains (like cerber) and provides network analysis. My cuckoo is be…
-
## Background
The current file scanning pipeline, does not support local file scanning.
## Desired Change
A user should be able to submit a local file or local path to a directory of files to…
-
**The Problem**
Security Analyst are constantly in a need for Fresh Malware Samples.
The fight against malware is largely driven by ML Models that use static, or dynamic analysis. This is a large…
-
I want to install malware in the vm for malware analysis.
```powershell
vagrant upload malware.exe C:\Users\vagrant\desktop\malware.exe
```
raise an error including :
```powershell
Er…
-
Hi, I really don't know why this error occurs, if you could help me please
Windows:
`python3 malware_identifier.py files
Traceback (most recent call last):
File "C:\Users\X\Documents\virustota…
1uc4X updated
2 years ago
-
Current, __HaboMalHunter__ uses `file` command output to check whether target is executable [here](https://github.com/Tencent/HaboMalHunter/blob/master/AnalyzeControl.py#L266). However, `file` command…
-
At the moment at most one parameter settings and clustering results can be stored per clustering algorithm. It should be extended to allow storing results of clustering for multiple parameter settings…
-
I shared this with a community I'm a member of, and they brought up concerns that it was showing as a virus by some online resources.
I did some checking with the windows installer and am showing s…
-
I installed cuckoo on 2 cores and 4 GB RAM machine and analysis machine on XP in esx.
I sent couple of malwares to cuckoo. Cuckoo start analyzing the malwares. But when 2 or 3 analysis go into 'proces…