Saferwall - A Hackable Malware Sandbox For The 21St Century


[![](https://1.bp.blogspot.com/-b5hUBlXFP7E/XwufrJds5sI/AAAAAAAATFw/DhfhbCHnals84O1FYNR7rKbVPEEXp23CwCNcBGAsYHQ/s640/saferwall_1.png)](<https://1.bp.blogspot.com/-b5hUBlXFP7E/XwufrJds5sI/AAAAAAAATFw/DhfhbCHnals84O1FYNR7rKbVPEEXp23CwCNcBGAsYHQ/s1600/saferwall_1.png>) #### Saferwall is an open source [malware analysis](<https://www.kitploit.com/search/label/Malware%20Analysis> "malware analysis" ) platform. It aims for the following goals: * Provide a collaborative platform to share samples among malware researchers. * Acts as a system expert, to help researchers generates an automated malware [analysis](<https://www.kitploit.com/search/label/Analysis> "analysis" ) report. * Hunting platform to find new malwares. * Quality ensurance for signature before releasing. [![](https://1.bp.blogspot.com/-XOdBq5MoH80/XwuflI4js3I/AAAAAAAATFs/5QgywQNheV0gdpDABiqrckL7Hbt4AA-CgCNcBGAsYHQ/s640/saferwall_3.png)](<https://1.bp.blogspot.com/-XOdBq5MoH80/XwuflI4js3I/AAAAAAAATFs/5QgywQNheV0gdpDABiqrckL7Hbt4AA-CgCNcBGAsYHQ/s1600/saferwall_3.png>) **Features** * Static analysis: * Crypto hashes, packer identification * Strings extraction * Portable Executable file parser * Multiple AV scanner which includes major [antivirus](<https://www.kitploit.com/search/label/Antivirus> "antivirus" ) vendors: Vendors | status | Vendors | status ---|---|---|--- Avast | ok | FSecure | ok Avira | ok | Kaspersky | ok Bitdefender | ok | McAfee | ok ClamAV | ok | Sophos | ok Comodo | ok | Symantec | ok ESET | ok | Windows Defender | ok **Installation** Saferwall take advantage of [kubernetes](<https://kubernetes.io/> "kubernetes" ) for its high availability, scalibility and the huge ecosystem behind it. Everything runs inside Kubernetes. You can either deploy it in the cloud or have it self hosted. To make it easy to get a production grade [Kubernetes](<https://www.kitploit.com/search/label/Kubernetes> "Kubernetes" ) cluster up and running, we use [kops](<https://github.com/kubernetes/kops> "kops" ). It automatically provisions a kubernetes cluster hosted on AWS, GCE, DigitalOcean or OpenStack and also on bare metal. For the time being, only AWS is officially supported. Steps to deploy in AWS: (This still needs to be improved) 1. Clone the project: `git clone https://github.com/saferwall/saferwall` 2. Using a debian linux, make sure `build-essential` are installed: `sudo apt-get install build-essential`. 3. Rename the `example.env` to `.env` and fill the secrets according to which AVs you want to have. 4. Install it: `make saferwall`. 5. Edit the deployments/values.yaml to match your needs. 6. Logs are found elasticsearch: [![](https://1.bp.blogspot.com/-mQB4cSa3s3s/XwugE6GeGtI/AAAAAAAATF8/jecEJjpGmdUhgj0x1TESXF3_23Oth9rHwCNcBGAsYHQ/s640/saferwall_4.png)](<https://1.bp.blogspot.com/-mQB4cSa3s3s/XwugE6GeGtI/AAAAAAAATF8/jecEJjpGmdUhgj0x1TESXF3_23Oth9rHwCNcBGAsYHQ/s1600/saferwall_4.png>) **Built with:** * Golang mostly. * Backend: [Echo](<https://echo.labstack.com/> "Echo" ) * Frontend: [VueJS](<https://vuejs.org/> "VueJS" ) \+ [Bulma](<https://bulma.io/> "Bulma" ) * Messaging: [NSQ](<https://nsq.io/> "NSQ" ) * Database: [Couchbase](<https://www.couchbase.com/> "Couchbase" ) * Logging: [FileBeat](<https://www.elastic.co/beats/filebeat> "FileBeat" ) \+ [ElasticSearch](<https://www.elastic.co/> "ElasticSearch" ) \+ [Kibanna](<https://www.elastic.co/> "Kibanna" ) * Minio: [Object storage](<https://min.io/> "Object storage" ) * Deployment: [Helm](<https://helm.sh/> "Helm" ) \+ [Kubernetes](<https://kubernetes.io/> "Kubernetes" ) **Current architecture / Workflow:** [![](https://1.bp.blogspot.com/-1frT3kLnqNw/XwugKfjvPNI/AAAAAAAATGA/2E8f-6CzWjk3Fu5VjZvuTSvH4sBA1FOqQCNcBGAsYHQ/s640/saferwall_5.jpeg)](<https://1.bp.blogspot.com/-1frT3kLnqNw/XwugKfjvPNI/AAAAAAAATGA/2E8f-6CzWjk3Fu5VjZvuTSvH4sBA1FOqQCNcBGAsYHQ/s1600/saferwall_5.jpeg>) Here is a basic workflow which happens during a file scan: * Frontend talks to the the backend via REST APIs. * Backend uploads samples to the object storage. * Backend pushes a message into the [scanning](<https://www.kitploit.com/search/label/Scanning> "scanning" ) queue. * Consumer fetches the file and copy it into to the nfs share avoiding to pull the sample on every container. * Consumer calls asynchronously scanning services (like AV scanners) via gRPC calls and waits for results. **Acknowledgements** * [Fangdun Cai](<https://github.com/fundon> "Fangdun Cai" ) for the awesome vue-admin dashboard. * [horsicq](<https://github.com/horsicq> "horsicq" ) for his tool [Detect It Easy](<https://github.com/horsicq/Detect-It-Easy> "Detect It Easy" ). **Contributing** Please read [docs/CONTRIBUTING.md](<https://github.com/saferwall/saferwall/blob/master/docs/CONTRIBUTING.md> "docs/CONTRIBUTING.md" ) for details on our code of conduct, and the process for submitting pull requests to us. **[Download Saferwall](<https://github.com/saferwall/saferwall> "Download Saferwall" )**