Jump to content
Nytro

Malcom - Malware Communication Analyzer

Recommended Posts

Posted

[h=1]Malcom - Malware Communication Analyzer[/h] Malcom is a tool designed to analyze a system's network communication using graphical representations of network traffic. This comes handy when analyzing how certain malware species try to communicate with the outside world.

Malcom can help you:

  • detect central command and control (C&C) servers
  • understand peer-to-peer networks
  • observe DNS fast-flux infrastructures
  • quickly determine if a network artifact is 'known-bad'

The aim of Malcom is to make malware analysis and intel gathering faster by providing a human-readable version of network traffic originating from a given host or network. Convert network traffic information to actionable intelligence faster.

Check the wiki for a Quickstart with some nice screenshots and a tutorial on how to add your own feeds.

687474703a2f2f6469726563742e746f6d63686f702e6d652f6d616c636f6d2f6e6f6465732d746f6d63686f702e706e67 Graph for the host tomchop.me.

[h=2]Quick how-to[/h]

  • Install
  • Elevate your privileges to root (yeah, I know, see disclaimer)
  • Start the webserver with ./malcom.py (or see options with ./malcom.py --help) ** Default port is 8080
  • To have a dedicated process for analytics, run ./malcom.py --analytics
  • To have a process dedicated to feeding, run ./malcom.py --feeds ** Alternatively, run the feeds from celery. See the feeds section for details on how to to this.

Sursa: https://github.com/tomchop/malcom

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...