WASMShark — WebAssembly Malware Analyzer
WASMShark is a university project. It’s a WebAssembly malware analyzer combining static analysis, dynamic instrumentation, and eBPF kernel-level runtime monitoring — the first tool of its kind for WASM binary analysis.
██╗ ██╗ █████╗ ███████╗███╗ ███╗███████╗██╗ ██╗ █████╗ ██████╗ ██╗ ██╗
██║ ██║██╔══██╗██╔════╝████╗ ████║██╔════╝██║ ██║██╔══██╗██╔══██╗██║ ██╔╝
██║ █╗ ██║███████║███████╗██╔████╔██║███████╗███████║███████║██████╔╝█████╔╝
██║███╗██║██╔══██║╚════██║██║╚██╔╝██║╚════██║██╔══██║██╔══██║██╔══██╗██╔═██╗
╚███╔███╔╝██║ ██║███████║██║ ╚═╝ ██║███████║██║ ██║██║ ██║██║ ██║██║ ██╗
╚══╝╚══╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝
WebAssembly Malware Analyzer
Key Capabilities
Static Analysis — Full WASM binary parser, disassembler, CFG, taint analysis
Dynamic Analysis — Wasabi instruction-level instrumentation, state machine extraction
Runtime Monitoring — eBPF/bpftrace kernel tracepoints, W+X memory detection
170+ Detection Rules — Cryptominer, ransomware, C2, dropper, credential theft
CFG Analysis — Dominance trees, SCC, natural loops, irreducibility detection
Getting Started
Analysis Modules
Detection
Reference
Detection Results
Sample |
Verdict |
Rules Matched |
|---|---|---|
|
MALICIOUS 100/100 |
CRYPTOMINER_WASM, TOR_C2_BEACON, RANDOMX_MONERO_MINER |
|
MALICIOUS 100/100 |
WASI_RANSOM_TRIAD, RANSOMWARE_KW, WASI_DROPPER |
|
MALICIOUS 100/100 |
BALANCED_MALICE_OBFUSC, XOR_DECRYPTOR, INDIRECT_DISPATCHER |
|
MALICIOUS 100/100 |
WASI_DROPPER, CREDENTIAL_EXFIL |
|
MALICIOUS 100/100 |
CRYPTOMINER_WASM, BROWSER_STORAGE_EXFIL |
|
CLEAN 0/100 |
— |