Malcat

binary analysis software

Malcat is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals.
Inspect more than 50 binary file formats, disassemble and decompile different CPU architectures, extract embedded files and scan for Yara signatures or anomalies in a fast and easy-to-use graphical interface.
Don't like what you get? Malcat is also heavily customizable and scriptable using python.

Highlights

Malcat has been designed for malware analysts, SOC operators, incident responders, CTF players or more generally anyone who needs to inspect unknown binary files on a regular basis. Have a look at its list of features to decide if it's the right tool for you:

Rapid analysis

Because Malcat does not run heavy analyses like VSA or type recovery, it can analyze most files under a second. This makes it the perfect tool for quick inspections or malware triage.

Disasm & decompile

Inspect code for architectures used in malware: x86/x64, .NET, python 2 and 3, VB p-code, NSIS vm, AutoIT and Office macros.
Malcat also embedds the Sleigh decompiler for x86 and x64.

Embedded files

Leveraging its 50+ file format parsers, malcat can extract sub-files from archives and identify embedded objects within any file. A very useful feature for incident response and malware analysis.

Smart visualization

Malcat offers many view modes to focus on all aspects of the file. Inspect binary structures, naviguate through the CFG or have a higher-level look at the anomalies, you chose. You can also try our new DNA view!

Compare binaries

Compare two files side by side and inspect their structural differences using Myers algorithm, a powerful diff method used in bioinformatics which produce human-readable results and can realign.

Anomaly scanner

Highlight suspicious patterns using Yara (featuring an embedded editor), Fireeye's Capa or Malcat's own anomaly scanner which scans for more than 200 anomalies using the complete analysis results.

Kesakode database

Leveraging a database of 2000+ malware families and millions of clean + library files, our Kesakode hash lookup service can help you identify malware, write better Yara rules and speed up your RE game.

Advanced editing

Patch your file using the inline structure editor or using python.
Dealing with encrypted or encoded content? Just select the data and chose between dozens of decryption and decoding algorithms.

Known patterns

Malcat recognize and highlight more than 400000 standard strings and numerical constants and support FLIRT signatures. You can also scan a corpus of local files or check online intelligence services.

Extract strings

Malcat features different algorithms to identify both static strings and dynamic strings (e.g. stack strings).
Strings are then weighted and sorted by score to give you the most pertinent results first.

Powerful UI

Enjoy a modern and responsive UI featuring HiDPI and full unicode support (hi .NET obfuscators :).
Want to go fast? You can navigate through the analysis using numerous keyboard shortcuts.

Make it your own

It is quite easy to extend malcat or automate file analysis by using the powerful (headless) python bindings.
You can create new file type parsers, decryption routines or add new anomalies with ease.
Do you want to see malcat in action? Just have a look at our tutorials or the different use cases listed in the blog section. You can also browse our online documentation.

Latest articles

0.9.8 is out: Scripting & QoL improvements
0.9.8 is out: Scripting & QoL improvements
2024/11/30

Malcat version 0.9.8 is out! You will find many quality-of-life improvements, such as an improved transform dialog, better scripting support, better data preview and many more.

Malcat tip: fast unpacking of RTF payloads
Malcat tip: fast unpacking of RTF payloads
2024/08/10

In this short tutorial, we will see how to extract binary payloads from RTF documents using Malcat. We will then proceed to emulate a shellcode for CVE-2017-11882 and extract the download link.

0.9.6 is out: Kesakode malware identification!
0.9.6 is out: Kesakode malware identification!
2024/05/26

Malcat version 0.9.6 is out! We have launched our brand-new online hash lookup service: Kesakode. You'll be able to identify (unpacked) malware, see similarities between malware families, write better Yara rules and speed up your reverse engineering game!

Get the software

Malcat is currently in beta phase. It means that while the core of the software is finished and polished, it has not been tested extensively by its user base and documentation is somewhat sparse. So keep in mind, you may still encounter a few minor bugs. The good news is that during this time, Malcat is on sale. So don't hesitate to pick one of the three editions of Malcat:
  • Malcat Lite is a free (as in free food) edition with some limitations
  • Malcat is the full version of the tool, affordable for hobbyists
  • Malcat Pro is targeted toward computer infosec professionals. It allows commercial use and comes with support

Paid version gives you access to unlimited use of the software on Linux and Windows platforms, and access to product updates for one year. Licenses are user-locked and allow installation on up to 5 different machines. If you are not sure if the software can run on your configuration, please test with the free lite edition first.

Malcat Lite Malcat Malcat Pro
Unlimited use + 1 year of updates 79€ 49€* 359€ 199€*
Updates renewal (1 year) 39€* 179€*
Hexadecimal editor
File format parsers
Inspect more than 50 binary file formats
Transforms
Decrypt/decompress data in-place
Signature scanner + editor
Scan for constants + yara signatures and edit Yara rules
Strings and symbols
Powerful strings and symbols (FLIRT) identification
Sub-files extraction
Explore archives and embedded files
Scripting
Automate analysis or run scripts
Disassemblers
Disassemble different CPU architectures
x86/x64 only
Decompiler
View source for x86/x64, AutoIT, MSI and Office
Diff engine
Compare binaries using Myers algorithm
Anomaly scanner
Quickly identify suspicious files
Threat intelligence
Search local and online datasets
Python headless mode
Analyse files directly from python, no GUI needed
Kesakode access
Identify malware based on multiple artifacts
40 queries / month 80 queries / month
Support best effort
Commercial use
Download Buy for 49€ Buy for 199€

*: Additional taxes may be added in some regions and are calculated automatically during checkout by our payment provider.

Frequently Asked Questions

Reverse engineers have a lot of options nowadays when it comes to analysing known software: IDA, Binary Ninja, Ghidra and many more. So one may ask: was another binary analysis software really needed?

IDA-like tools are basically made to answer one big question: how does a given binary software work? And they are really good at it, provided you plan to spend several hours digging in the same binary.

Malware analysts, incident responders and SOC analysts on the other hand have to analyse and triage large amounts of unknown binaries in a short time span. When opening a file, they do not care as much for the how as for the what. They want to know what is the file they are looking at and what it contains. And because malware are tricky, they have to answer this question for a lot of different file types (installers, archives, office documents, programs, ...) and architectures (NSIS, AutoIT, .NET, python, x86/64, ...). And this is a different problematic, different enough to justify the need for another class of tool.

Until now, malware analysts had to rely on either outdated tools (like the excellent Hiew) or on a lot of different utilities, each addressing a small subset of the problem. Malcat tries to combine all the features of these utilities in a single, powerful user interface. So yes, Malcat also embeds a disassembler and a decompiler like IDA, but the similarity ends there: they are two different types of tool which play in different categories.

Yes, Malcat can work offline, although you won't be able to use the intelligence scripts of course. There is a procedure to activate the software offline, see our our manual for more details.

If you purchase a license, you may run the software for an unlimited period of time. You only get updates for one year though. After this period of one year, you may still run the software, but won't be able to get new updates until you renew your license.

You don't have to renew the license every year though, you may chose to renew your license at the time of your choice (even long after the 1 year threshold) and you will always benefit of the low license renewal price (50%). We don't want to milk users every year. It's up to us to convince you that Malcat's improvements are worth it.

The non-pro version of Malcat is targeted towards hobbyists: they will get all features of Malcat for a reasonable price. The main limitation is that you are not able to use Malcat in a commercial/professional context and you get a little less monthly Kesakode quota. Also in order to keep the price low, limited support is available in this version.
Commercial use means use in your daily (paid) job or in any activity that directly or indirectly generates revenues. Here are two examples that may be helpful:
  • Non-commercial usage: You are a network administrator at a commercial organization with discretionary budget and have been practicing CTF on your own time using work resources (approved by work). Your usage qualifies for non-commercial use as you are using Malcat purely for educational, non-commercial purposes.
  • Commercial usage: You are a network administrator at a non-profit or government organization who regularly engages in malware analysis as a part of your job. You plan to use Malcat to analyze malware during paid work-hours. Your use is commercial.
We also apply a "de minimis" standard. If your use (running ads on Youtube videos, for example) makes you less money than 5 times the cost of a pro license, we're happy to have you continue to use a personal license. Once you start making above this amount, we ask that you then upgrade. If you have a doubt, contact us for more information.
On this website, you will only be able to purchase named licensed. If you want to include Malcat into your service / pipeline, contact us and we will work an OEM license out.

If you own a named license, which is the case if you bought it from this website, the license is bound to you and only you. As stipulated in the EULA, it means that you cannot rent or make the software available to other users. This includes the integration of the python module into any user-facing program and/or service. Here are some examples of what you may or may not do with your personal license:

  • OK: You are a SOC analyst. You've made a script to assist you in your job which automatically updates your incident tickets with information coming from Malcat. This fits within the bounds of a named license.
  • Not OK: You are a SOC analyst. You've made a script that automatically updates all incident tickets of your SOC with information coming from Malcat and integrated it in the SOC stack of your company. This is assimilated to sharing the software with other users.
  • OK: You are a security/academical researcher and used Malcat's python module and its CFG reconstruction to analyse large batch of files and do machine-learning detection. You have published the result of your research online. This all fits within the bounds of a named license.
  • Not OK: You are a security/academical researcher and used Malcat's python module and its CFG reconstruction to analyse large batch of files and do machine-learning detection. You have additionally made a online service where users can scan their files online using your technology. This also assimilated to sharing the software with other users.

No trick there, this is merely common sense. If you want to integrate Malcat in a multi-user software and/or online service, you can contact us and we will work a OEM license out. Don't worry, chances are it will be much cheaper than the concurrence.^

Purchase orders and invoices are supported for purchases of 5 or more copies of the Pro license. Contact us for more information.
There is no student discount at this time, simply because verifying student status would cost too much time. Instead, we offer free 1-year licenses for IT-Security classes. Just ask your professor to contact us with a copy of your class curriculum and we will see what we can do.