Skip to content

A tool to retrieve malware directly from the source for security researchers.

License

Notifications You must be signed in to change notification settings

detrojones/maltrieve

 
 

Repository files navigation

 _______ _______        _______  ______ _____ _______ _    _ _______
 |  |  | |_____| |         |    |_____/   |   |______  \  /  |______
 |  |  | |     | |_____    |    |    \_ __|__ |______   \/   |______

Maltrieve

Maltrieve originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites, including:

These lists will be implemented if/when they return to activity.

Other improvements include:

  • Proxy support
  • Multithreading for improved performance
  • Logging of source URLs
  • Multiple user agent support
  • Better error handling
  • VxCage and Cuckoo Sandbox support

Installation

Maltrieve requires the following dependencies:

These can all be found in requirements.txt. These can be installed locally using pip install -r requirements.txt. You may need to prepend that with sudo if not running in a virtual environment.

Usage

Basic execution: python maltrieve.py

Options

usage: maltrieve.py [-h] [-p PROXY] [-d DUMPDIR] [-l LOGFILE] [-x] [-c]

optional arguments:
  -h, --help            show this help message and exit
  -p PROXY, --proxy PROXY
                        Define HTTP proxy as address:port
  -d DUMPDIR, --dumpdir DUMPDIR
                        Define dump directory for retrieved files
  -l LOGFILE, --logfile LOGFILE
                        Define file for logging progress
  -x, --vxcage          Dump the file to a VxCage instance running on the
                        localhost
  -c, --cuckoo          Enable cuckoo analysis

Configuration File

Many of Maltrieve's command line options can be specified in maltrieve.cfg.

License

Released under GPL version 3. See the LICENSE file for full details.

Known bugs

We list all the bugs we know about (plus some things we know we need to add) at the Github issues page.

How you can help

Aside from pull requests, non-developers can open issues on Github. Things we'd really appreciate:

  • Bug reports, preferably with error logs
  • Suggestions of additional sources for malware lists
  • Descriptions of how you use it and ways we can improve it for you

Check the contributing guide for details. If you'd prefer not to open an issue, you can contact me on Twitter or email.

About

A tool to retrieve malware directly from the source for security researchers.

Resources

License

Stars

Watchers

Forks

Packages

No packages published