10/12 free views
Tool
Web Service
Malware Analysis

drakvuf-sandbox

by CERT-Polska

1.2Kstars
153forks
32watchers
Updated 5 months ago
About

DRAKVUF Sandbox is an automated hypervisor-level malware analysis system that enables agentless, black-box analysis of suspicious files via a user-friendly web interface.

DRAKVUF Sandbox - automated hypervisor-level malware analysis system

Primary Use Case

Security analysts and incident responders use DRAKVUF Sandbox to automatically analyze potentially malicious files in a controlled virtualized environment without installing agents on the guest OS. It helps determine whether files are malicious by providing detailed analysis results accessible through a web interface, streamlining malware investigation and response workflows.

Key Features
  • Agentless black-box malware analysis using the DRAKVUF engine
  • Automated sandboxing with a web interface for uploading and reviewing analysis
  • Installer app that guides setup with recommended beginner-friendly configurations
  • Supports Windows 7 and Windows 10 (x64) guest systems
  • Compatible with Intel processors supporting VT-x and EPT
  • Nested virtualization support for Xen, KVM, and VMware Workstation Player
  • Open source with active maintenance and community support
  • Detailed analysis results accessible via a friendly web UI

Installation

  • Ensure host system runs Debian 12 Bookworm or Ubuntu 22.04 Jammy with GRUB bootloader
  • Use an Intel processor with VT-x and EPT features enabled
  • Download the installer app from the repository's latest releases
  • Run the installer app to guide through system configuration and sandbox setup
  • Configure guest virtual machines with supported Windows versions (Windows 7 or Windows 10 x64)
  • Enable nested virtualization if using Xen, KVM, or VMware Workstation Player (with Virtualize EPT option)
  • Avoid unsupported platforms such as AWS, GCP, Azure, Hyper-V, and VMware Fusion on Mac

Usage

>_ Upload suspicious files via the web interface

Submit files for automated malware analysis without requiring guest OS agents

>_ Explore analysis results through the web UI

Review detailed insights on file behavior and determine maliciousness

>_ Use the installer app

Guide through installation and configuration steps for the sandbox environment

Security Frameworks
Discovery
Collection
Analysis
Execution
Impact
Usage Insights
  • Integrate DRAKVUF Sandbox with SIEM platforms to automate alert triage and malware analysis workflows.
  • Leverage the agentless nature to analyze malware samples that attempt to detect or evade traditional endpoint agents.
  • Use the sandbox in purple team exercises to validate detection rules and response playbooks against real malware behaviors.
  • Deploy in isolated lab environments with nested virtualization to safely analyze advanced persistent threat (APT) malware samples.
  • Extend the web interface with custom parsers to extract IOC indicators for automated threat intelligence sharing.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about drakvuf-sandbox. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team40%
Blue Team90%
Purple Team70%
Details
LicenseOther
LanguagePython
Open Issues320
Topics
malware
sandbox
reverse-engineering
malware-analysis
malware-research