Tool and Usage
|Latest release||No release found|
Why this tool?
SSMA is short for Simple Static Malware Analyzer. The tool can perform a set of tests against a malware sample and retrieve metadata from it. SSMA can analyze ELF and PE and analyze its structure. For example, it can retrieve the PE file header information and its sections. Other pieces it can analyze is the usage of packers, anti-debugging techniques, cryptographic algorithms, domains, email addresses, and IP addresses. It can also check if the sample is already detected or blocked by using VirusTotal and the blocklist of malwaredomains.com.
How it works
The tool is modular and depending on the file structures it can find, it leverages the related functions to perform more in-depth analysis.
Usage and audience
SSMA is commonly used for malware analysis, malware detection, malware scanning, or reverse engineering. Target users for this tool are malware analysts and security professionals.
- Command line interface
Example usage and output
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + The source code of this software is available
- - No releases on GitHub available
Supported operating systems
SSMA is known to work on Linux.
Several dependencies are required to use SSMA.
Similar tools to SSMA:
MultiScanner is a modular file scanning and analysis framework. It can be used to scan files and detect malware or other suspicious traces. With the help of the modules, it can be extended to provide more details about a file.
Binary Analysis Next Generation (BANG) or binaryanalysis-ng is a security tool to perform binary analysis by Armijn Hemel. Learn how the tool works.
Malice is a malware analysis that wants to provide a free and open source version of VirusTotal. Read how the framework works in this review.
Found an improvement? Help the community by submitting an update.