Malcat dev
banner
malcat4ever.bsky.social
Malcat dev
@malcat4ever.bsky.social
Main developer of http://malcat.fr, a hexadecimal editor / disassembler / decompiler for #malware analysis, #DFIR and #SOC.
#Malcat tip:

#Kesakode can be useful even when facing unknown/packed samples. Check "Show UNK" and focus on unique code and strings.

Here a simple downloader:
December 5, 2025 at 9:29 AM
#Malcat tip #10: analysing backdoored clean software can be hard.
A quick win is to pivot around known constants, thanks to Malcat's 400k+ constants DB (here a #Tropidoor dlder):
September 25, 2025 at 9:54 AM
Updated #kesakode to 1.0.38:

Malware signatures:
* New malware entries: 20 new families
* 564116 new unique functions
* 197608 new unique strings
* 27 new unique constant fingerprints
September 12, 2025 at 6:52 AM
Does someone know this #malware, since this is definitely NOT latrodectus. Looks like some Discord-backed infostealer:
bazaar.abuse.ch/sample/85f8c...
June 1, 2025 at 9:36 AM
You can now check your strings in #malcat against an online library of #Malpedia FLOSSed strings. Just copy this plugin:

github.com/malpedia/mal...
May 27, 2025 at 7:52 AM
then how do you quickly confirm the AI assertion without input/output testing? It may be a sha256 variant. You know well malware authors like to modify standard algorithms.
If it's just saying "it looks like sha256", it's also very quick to say without AI:
April 22, 2025 at 9:49 AM
Malcat tip #9: So you have found this nice #malware hash in a report, but no sample?

"File>Download from hash" will retrieve the hash for you from:

● Triage
● MalwareBazaar
● VirusShare
● MWDB
● FileScanIO

NB: some of these sources require (free) API keys.
January 17, 2025 at 2:35 PM
In the next version of #malcat, we will include an _offline_ smaller #kesakode database which will only contain conflict-free malware signatures.

This will be fast and run with every analysis. You can always get the full deal (clean + lib) afterwards with an online query.
January 14, 2025 at 7:13 AM
You'll soon be able to export #Malcat views to files:
● Summary report as HTML+ SVG
● Proximity & call graph views as SVG or PNG
● Struct/hex/disasm views as HTML
● Strings, symbols, intel, kesakode and other views as CSV
December 27, 2024 at 9:20 AM