This file provides guidance to Claude Code (claude.ai/code) when working with code in this repository.
This is a Claude skills package for malware analysis — not a traditional software project. It contains 6 SKILL.md files (1 orchestrator + 5 specialized skills) with supporting references, templates, and scripts that guide Claude through every phase of the malware analysis lifecycle. There is no build system, test suite, or application code.
The root SKILL.md is the orchestrator — the single entry point for all malware analysis. It routes to the 5 sub-skills based on file type and user intent, manages analysis state across phases in analysis_state.md, and supports multi-sample batch workflows. Users don't need to invoke sub-skills directly.
Each sub-skill is a self-contained directory with a SKILL.md (the skill prompt) plus optional references/, assets/, and scripts/ subdirectories:
- malware-triage/ — Rapid sample assessment, classification, and prioritization (5-30 min per sample). Includes
scripts/hash_calculator.pyand reference files for suspicious API indicators and triage checklists. - malware-dynamic-analysis/ — Safe execution and behavior monitoring in isolated VMs. Covers Procmon, Wireshark, Process Hacker, Sysmon setup and evidence collection workflows.
- specialized-file-analyzer/ — Non-PE file analysis: .NET assemblies, Office macros, PDFs, PowerShell/VBS/JS scripts, archives, LNK files, ELF binaries.
- detection-engineer/ — Creating Sigma rules (SIEM), Suricata/Snort rules (IDS), hunting queries, IOC defanging, and IOC format conversion (STIX, CSV, OpenIOC).
- malware-report-writer/ — Professional report creation with a 12-section template (
assets/report_template.md), YARA rule authoring, and quality checklists.
The root SKILL.md orchestrator manages this workflow automatically — users describe what they need and the orchestrator routes to the right sub-skill and phase.
- Triage all samples first (classify, prioritize)
- Dynamic analysis or specialized file analysis for deep investigation
- Detection engineering to create actionable rules from findings
- Report writing to document everything professionally
These ownership boundaries require reading multiple SKILL.md files to discover:
- YARA rules are authored in
malware-report-writer, notdetection-engineer. Detection-engineer handles Sigma, Suricata, and hunting queries. - Sigma rules for behavioral detection and Suricata rules for network detection both live in
detection-engineer. - File type determines skill: use
filecommand output to route — "Mono/.Net assembly", "Microsoft Office Document", "PDF document", "ELF" all go tospecialized-file-analyzer; standard PE32/PE64 executables go tomalware-triagethenmalware-dynamic-analysis. - IOC defanging is handled by
detection-engineer, but defanged IOCs appear in reports created bymalware-report-writer.
- Skills use YAML frontmatter (
name,description) for metadata. - All IOCs in reports and rules must be defanged (e.g.,
hxxp://,[.]com,[@]). - Reports always include all three hash types: MD5, SHA1, SHA256.
- Detection rules (YARA, Sigma, Suricata) must be tested before inclusion in reports.
- MITRE ATT&CK technique IDs should be tagged in Sigma rules.
- Evidence files should be in text-parseable formats (CSV, JSON, TXT) — not raw binary formats (PML, PCAP, EVTX).
- Sigma rules require unique UUIDs and use SIDs starting at 1000000+ for custom Suricata rules.
Optional MCP servers can automate manual steps in the workflow. See references/mcp_integrations.md for the full guide. Key integrations: VirusTotal (hash/URL lookups), Threat.Zone (automated sandbox), Threat Intel (abuse.ch/AbuseIPDB/GreyNoise), MISP (IOC sharing), Shodan (infrastructure recon), Volatility (memory forensics).
- The host machine runs Claude Code with internet access; the analysis VM (REMnux/FlareVM) is network-isolated. Claude analyzes exported evidence, never executes malware directly.
- The
references/subdirectories contain domain knowledge (suspicious API lists, tool setup guides, best practices) that skills reference inline. assets/report_template.mdin malware-report-writer is the canonical 12-section report structure.references/indicators.mdin malware-triage is the primary suspicious API/string/behavioral pattern database.references/tool_setup.mdin malware-dynamic-analysis covers Procmon, Wireshark, Process Hacker, Sysmon, Regshot, INetSim, and FakeNet-NG configuration.
A GitHub Actions workflow (.github/workflows/mirror.yml) mirrors the repo to Codeberg on push to main and on a weekly schedule.