Malware sandbox for dynamic analysis and payload extraction
Top 18.7% on sourcepulse
CAPE (Configuration And Payload Extraction) is a sophisticated malware analysis sandbox designed for automated dynamic unpacking, configuration extraction, and behavioral analysis of malicious software on Windows. It targets security researchers, incident responders, and malware analysts seeking deep insights into malware operations. CAPE builds upon the legacy of Cuckoo Sandbox, offering enhanced capabilities for automated unpacking, YARA-based classification, and a programmable debugger for advanced analysis and anti-evasion bypasses.
How It Works
CAPE leverages a combination of API hooking (via Microsoft Detours and Cuckoo-modified's engine) and a novel debugger for precise control and instrumentation of malware execution. This approach allows for the capture of unpacked payloads from various injection techniques (e.g., process hollowing, shellcode injection) and memory regions. The debugger, programmable via YARA signatures, enables dynamic countermeasures against sandbox evasion and facilitates detailed instruction tracing.
Quick Start & Requirements
kvm-qemu.sh
and cape2.sh
scripts (requires root privileges for setup).Highlighted Details
Maintenance & Community
Licensing & Compatibility
Limitations & Caveats
pefile
, can cause installation issues due to version pinning; manual management or forking of dependencies may be necessary.1 day ago
1 day