Skip to content

SecurityArtWork/MEMT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Warning: This project is not maintained so use the code here at your own risk.

 __  __ _____ __  __ _____
|  \/  | ____|  \/  |_   _|
| |\/| |  _| | |\/| | | |
| |  | | |___| |  | | | |
|_|  |_|_____|_|  |_| |_|

MEMT (Massive Early Malware Triage)

What is MEMT?

MEMT is not a simple tool or command line interface, MEMT is a complete whole platform which get focused on Big Data. The main idea behind MEMT is to catch new malware that other tools are not able to identify, like anti-virus, for that purposes MEMT bet for technologies like MongoDB, Celery, Go and Python. Open source technologies that helps MEMT to categorize malware using Big Data techniques and algorithms.

MEMT is able to identify malware, it has a great dashboard which displays in real time from where is the malware been identified around the globe, moreover the platform offers a really good detail of each malware, for example some static analysis is shown as well as a picture of the malware, yes you have read well, the picture of the malware. That picture helps to identify in one sight the binary sections and how it is splitted up internally, actually it is a really nice feature.

RequireMEMTs

MEMT project uses several technologies, some of them are listed in the next table:

Back-end Front-end
Go JavaScript
Python jQuery
Flask Bootstrap
MongoDB SocketIO
Celery AmMap
RabbitMQ
SocketIO
Radare2

Components

As said before, MEMT is a big platform, so MEMT is built upon different modules or applications, following you have the main parts.

  • Web server: It is build using Python and Flask as a web server, moreover it needs to be run by Gunicorn which is a WSGI compatible and allows good performance. On the other hand, there is a Celery and RabbitMQ. RabbitMQ is like a buffer database and it helps Celery to process all the background tasks.

  • Database: We use MongoDB as database. It is well known how good this database performs under high data pressure. MongoDB has such amount of functionalities related to data analysis that makes the developMEMT really easy.

  • Cli: It is a command line interface that is built using Go. The Cli will help the users of MEMT to load malware in a easy way. It can run in two modes, daemon and standalone.

  • Categorizer: This tool helps to whom wants to use the platform for their own purposes to create the first set of data from a set of malware. This initial set is needed to populate the database and be able to interact with the front-end correctly. –The Malware for your initial dataset is not included ;)–

  • Analyzer: It will perform the background task that has been sent by Celery. This tool analyze the binary that has been uploaded into the platform and find for patters among different parameters. Finally it saves update the whole system to be more accurate next time.

Installation

You can find the installation files (README.md) inside the root of each component. The MEMT team suggest the next order to install the whole platform.

  1. Categorizer
  2. Analyzer
  3. Cli
  4. Web server

TODOs

  • Add the daemon option to the (Actually it only supports manual sending of samples) –CLI–.
  • Improve user interface –Web–.
  • Add more accurate catalog algorithms –Analysis tooling–.

NEXT.

Stay tuned for more interesting features comming soon!