Manalyzer : free online malware analysis

Manalyzer is a free service which performs static analysis on PE executables to detect undesirable behavior.
Try it online, or check out the underlying software on GitHub!



Browse Submit
Submit


What's new?

  • Wednesday June 8, 2016
    • Executables can now be provided through URLs instead of direct file uploads. Only links to PE files are accepted (i.e. archives cannot be extracted and processed automatically).
    • You can access the JSON report for any uploaded sample from the command line: curl https://manalyzer.org/json/539f8f30c06967919b5d508198b70fbe. There are no restrictions for the time being.
    • Search engine links have been added after each hash.
  • Saturday May 28, 2016
    • Unicode strings contained in the StringTable are now extracted properly and displayed in the "Resources" tab. RT_BITMAP resources are also previewed. This PE is a good example because it has lots of them.
    • You can see the 10 latest uploaded samples on this page. It's a bit crude at the moment, but it'll get better as soon as I have time to work on the search engine.
  • Saturday May 21, 2016
    • The Delay Load Import Tables and the Load Configuration Structure are now parsed. This means that delayed imports are no longer missed! Here's a sample report.
    • A new plugin was added to detect exploit mitigation techniques enabled in a binary (specifically /GS, SafeSEH, DEP and ASLR).
    • Manalyze has reached over 100 on GitHub! Thanks a lot for all your support!
    • I will be discussing Manalyze at RMLL Sec 2016. Tickets are sold out, but the talk will be streamed (videos should be put online afterwards as well). I will also present unrelated stuff at SSTIC 2016. Feel free to get in touch with me if you're attending as well!