EUREKA!

An Automated
Malware Binary Analysis Service

Download our Technical Report / Visit mtc.sri.com

last updated: 23:00:00 PT: 30 Oct 2014
Contact Us/Feedback

Welcome to the EUREKA Malware Analysis Internet Service:

Eureka is a binary static analysis preparation framework. It implements a novel binary unpacking strategy based on statistical  bigram analysis and coarse-grained execution tracing. Eureka incorporates advanced API deobfuscation capabilities to facilitate the structural analysis of the underlying malware logic.  For each uploaded binary, the Eureka service will attempt to unpack and (for Eureka I, disassemble; for Eureka II (not yet available), decompile) the binary, and will produce an annotated callgraph, subroutine/data index page, strings summary, and a list of embedded DNS entries.
_____________________________________________________________________________

Recent Malware
Binaries
and more...
NoticeThe data on this website is for research purposes only.  It is provided for your personal use only and is supplied AS IS, without warranty of any kind.  Use or reliance on this data is at your own risk.
_____________________________________________________________________________
 Submit a Malware Binary for Analysis:

Thank you for not uploading more than 10 binaries per day.

Upload packed executable (5MB max)     

Attacker source IP (optional)  (where did this binary come from?)

Your email address (optional)       

_____________________________________________________________________________
Development Team
:    Monirul Sharif (Georgia Tech),  Vinod Yegneswaran (SRI), 
                                      Hassen Saidi (SRI), Phillip Porras (SRI), Arvind Naryanan (UTexas Austin)

_____________________________________________________________________________
Acknowledgements:   Special thanks to Cliff Wang at Army Research Office (ARO) and Karl Levitt at the National Science Foundation for their sponsorship of this research.

Cyber-TA Research Project