WASMShark — WebAssembly Malware Analyzer

https://img.shields.io/badge/version-1.0-blue https://img.shields.io/badge/python-3.8%2B-brightgreen

WASMShark is a university project. It’s a WebAssembly malware analyzer combining static analysis, dynamic instrumentation, and eBPF kernel-level runtime monitoring — the first tool of its kind for WASM binary analysis.

██╗    ██╗ █████╗ ███████╗███╗   ███╗███████╗██╗  ██╗ █████╗ ██████╗ ██╗  ██╗
██║    ██║██╔══██╗██╔════╝████╗ ████║██╔════╝██║  ██║██╔══██╗██╔══██╗██║ ██╔╝
██║ █╗ ██║███████║███████╗██╔████╔██║███████╗███████║███████║██████╔╝█████╔╝
██║███╗██║██╔══██║╚════██║██║╚██╔╝██║╚════██║██╔══██║██╔══██║██╔══██╗██╔═██╗
╚███╔███╔╝██║  ██║███████║██║ ╚═╝ ██║███████║██║  ██║██║  ██║██║  ██║██║  ██╗
 ╚══╝╚══╝ ╚═╝  ╚═╝╚══════╝╚═╝     ╚═╝╚══════╝╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═╝
WebAssembly Malware Analyzer

Key Capabilities

  • Static Analysis — Full WASM binary parser, disassembler, CFG, taint analysis

  • Dynamic Analysis — Wasabi instruction-level instrumentation, state machine extraction

  • Runtime Monitoring — eBPF/bpftrace kernel tracepoints, W+X memory detection

  • 170+ Detection Rules — Cryptominer, ransomware, C2, dropper, credential theft

  • CFG Analysis — Dominance trees, SCC, natural loops, irreducibility detection



Detection Results

Sample

Verdict

Rules Matched

sample_cryptominer.wasm

MALICIOUS 100/100

CRYPTOMINER_WASM, TOR_C2_BEACON, RANDOMX_MONERO_MINER

sample_ransomware.wasm

MALICIOUS 100/100

WASI_RANSOM_TRIAD, RANSOMWARE_KW, WASI_DROPPER

sample_obfuscated_loader.wasm

MALICIOUS 100/100

BALANCED_MALICE_OBFUSC, XOR_DECRYPTOR, INDIRECT_DISPATCHER

sample_credential_thief.wasm

MALICIOUS 100/100

WASI_DROPPER, CREDENTIAL_EXFIL

sample_browser_cryptojack.wasm

MALICIOUS 100/100

CRYPTOMINER_WASM, BROWSER_STORAGE_EXFIL

sample_clean.wasm

CLEAN 0/100