Secure Malware Analysis Platform
Project Pegasus is a comprehensive malware analysis platform that performs automated static and dynamic analysis in isolated Docker environments. It provides a secure, web-based interface for analysts to examine suspicious files, extract indicators of compromise (IOCs), and observe malicious behavior while ensuring complete host isolation.
- Secure Isolation: All analysis runs in unprivileged, network-isolated Docker containers with resource limits and capability dropping.
- Intelligent Threat Classification: Automatically classifies samples as Malicious, Suspicious, or Clean based on comprehensive analysis indicators including ATT&CK techniques, behavioral patterns, and IOCs.
- Robust Static Analysis:
- PE Header & Import parsing with suspicious API detection
- Intelligent String Ranking: Prioritizes interesting APIs, paths, IPs, and URLs
- CAPA Integration: ATT&CK technique mapping and malware behavior catalog (MBC) detection
- XOR Analysis: XORSearch/XORStrings integration for encoded payload detection
- YARA scanning and Entropy calculation for packer detection
- Advanced Dynamic Analysis:
- Unified Execution Monitoring: Combines
stracesyscall logging withpsutilprocess tracking - Wine & QEMU support for cross-architecture PE analysis
- Behavioral analysis with process injection and command execution detection
- Unified Execution Monitoring: Combines
- Network Traffic Capture:
- INetSim Integration: Provides a simulated internet environment (DNS, HTTP, etc.)
- IPv6 Support: Full capture and parsing of IPv6 traffic and DNS (AAAA)
- Report Management:
- Smart Classification: Real-time threat level assessment with color-coded results
- Hash Search: Look up existing reports by SHA256
- One-Click Re-analysis: Instantly trigger fresh analysis runs for any sample
- Unified Reporting: Clean, real-time Web UI for monitoring progress and viewing comprehensive results
Demo.Project.Pegasus.mov
graph TD
User([User Browser]) --> UI[Web Frontend]
UI --> API[FastAPI Backend]
API --> DB[(PostgreSQL)]
API --> Queue[Redis / Celery]
Queue --> Worker[Celery Worker]
Worker --> Docker[Docker Manager]
Docker --> Static[Static Analysis Container]
Docker --> Dynamic[Dynamic Analysis Container]
Docker --> Gateway[Network Gateway Container]
Gateway <--> Dynamic
- Docker (20.10+) & Docker Compose (V2)
- Python 3.11+ (for test scripts and local development)
- Make (optional, for automation)
./setup.shThis script will verify dependencies, generate secure .env keys, and build the required Docker images.
docker compose up -dAccess the Web UI at: http://localhost:3000 (or open the local file directly).
python3 test_system.pyThis would stop and remove ALL services and data
sudo docker system prune -a --volumes --force
sudo docker-compose down -v --rmi all- Docs:
http://localhost:8000/api/docs - Upload:
POST /api/upload/ - Results:
GET /api/analysis/{sample_id} - Search:
GET /api/analysis/?sha256={hash}
- Project structure & Database models
- Celery & Redis orchestration
- Secure file quarantine (AES-128 encryption)
- Ubuntu-based analyzer with comprehensive toolset
- Intelligent String Ranking
- Robust CAPA integration with ATT&CK mapping
- XORSearch/XORStrings for encoded payload detection
- Suspicious API import detection
- Unified behavior monitoring (strace + psutil)
- Wine/QEMU binary emulation
- Process & File tracking
- Command execution and process injection detection
- INetSim Gateway integration
- IPv6 & AAAA DNS support
- PCAP capture and automated parsing
- Real-time analysis polling
- Hash Search & Re-analysis
- Intelligent Threat Classification: Automated threat level assessment
- Color-coded results (Malicious/Suspicious/Clean)
- Prioritized multi-tab results view
- User Authentication & Multi-Tenancy
- Advanced Memory Forensics integration
- Automated Report Export (PDF/JSON)
- Machine Learning-based classification enhancement
- Custom YARA rule management interface
- This system analyzes LIVE MALWARE.
- Always run on dedicated hardware or within a detached VM.
- Verify network isolation (
test_system.py) before analyzing unknown samples. - Never expose the API to the public internet without proper authentication.
Educational and authorized security research purposes only.
- Didier Stevens for XORSearch/XORStrings and analysis tools
- Mandiant for CAPA capability analysis framework
- INetSim for the simulated network services
- FastAPI & Celery for the backend orchestration
- MITRE ATT&CK framework for threat intelligence mapping