bikasaha/MaLAware: MaLAware v1.0.0
Authors/Creators
Description
🚀 MaLAware v1.0.0
🔍 Overview
Traditional malware analysis tools primarily focus on detection and family classification but fail to provide clear, human-readable insights into a malware's behavior. MaLAware addresses this gap by automatically summarizing the full spectrum of malicious activities exhibited by malware executables.
Leveraging Cuckoo Sandbox analysis and Large Language Models (LLMs), MaLAware transforms raw malware execution data into concise, actionable narratives, enabling:
✅ Faster incident response
✅ Reduced cognitive load for analysts
✅ Non-technical users to understand malware behavior
🛠 Key Features
- ✅ Automated Malware Behavior Summarization – Translates raw sandbox data into structured insights
- ✅ LLM-Powered Analysis – Uses advanced LLMs to correlate and explain malware execution patterns
- ✅ Support for Multiple LLMs – Currently supports Qwen2.5-7B, Llama2-7B, Llama3.1-8B, Mistral-7B, and Falcon-7B
- ✅ Quantization for Resource Efficiency – Optimized for use in constrained environments
- ✅ Extensive Evaluation – Benchmarked against human-written malware behavior descriptions using 11 performance metrics
📢 Contribute & Collaborate
We welcome contributions! Feel free to:
- 📌 Report issues in the Issues tab
- 🚀 Submit enhancements via Pull Requests
📜 License
This project is licensed under the Apache 2.0 License.
🔹 Star this repo ⭐ if you find it useful!
Files
bikasaha/MaLAware-v1.0.0.zip
Files
(4.1 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:1b7f49b355fac2b3cff19b8757d02107
|
4.1 MB | Preview Download |
Additional details
Related works
- Is supplement to
- Software: https://github.com/bikasaha/MaLAware/tree/v1.0.0 (URL)
Software
- Repository URL
- https://github.com/bikasaha/MaLAware