Advanced Malware Detection for Security Professionals

Multi-layered static analysis combining PE inspection, YARA rules, entropy calculation, and VirusTotal integration

New Analysis Zone: Automated Rule-based Inspection & Classification Kit

Open Source
Windows Compatible
VirusTotal Integrated
Free Forever
32,000+
Malware Signatures
4-Layer
Analysis Engine
Real-Time
Monitoring
VirusTotal
Integrated

Powerful Features for Comprehensive Analysis

Everything you need to detect and analyze potential threats

Multi-Engine Analysis
Combine multiple detection methods for comprehensive threat identification. Our hybrid approach uses YARA pattern matching, PE structure analysis, Shannon entropy calculation, and intelligent scoring to minimize false positives.
  • Custom YARA rule support
  • 200+ suspicious API tracking
  • Entropy threshold detection
  • Weighted scoring algorithm
Real-Time Protection
Monitor folders for changes and automatically scan new or modified files. Perfect for testing environments or monitoring download directories.
  • Instant file change detection
  • Automatic background scanning
  • Drag-and-drop testing
  • Minimal system impact
PE File Forensics
Deep analysis of Windows executables examining imports, sections, signatures, and entry points. Detect packers, suspicious permissions, and tampered timestamps.
  • Import Address Table analysis
  • Section anomaly detection
  • Digital signature verification
  • Entry point validation
Comprehensive Reporting
Generate detailed reports with executive summaries and technical breakdowns. Export results or copy to clipboard for documentation.
  • Executive summary dashboards
  • Expandable detailed findings
  • Export to TXT/JSON
  • Copy-to-clipboard support
VirusTotal Integration
Submit files or hashes directly to VirusTotal for cross-reference with 70+ antivirus engines. Get community scores and threat classifications.
  • Direct file upload (32MB max)
  • SHA256/MD5 hash lookup
  • 70+ engine results
  • Threat label identification
Intelligent Scoring
Proprietary scoring system (0-120 scale) weighs multiple factors to determine threat levels: Clean, Low, Medium, High, or Critical.
  • Context-aware analysis
  • False positive reduction
  • Confidence indicators
  • Trusted signer exceptions

How NAZARICK Analyzes Files

A multi-stage process ensuring thorough threat detection

Step 1

File Input

Upload a file manually or enable real-time folder monitoring

Step 2

YARA Pattern Matching

Scan for known malware signatures using YARA rules

Step 3

PE Structure Analysis

Examine executable headers, sections, imports, and signatures

Step 4

Entropy Calculation

Calculate Shannon entropy to detect packing/encryption (threshold: 7.5+)

Step 5

Hybrid Scoring

Combine all findings into weighted threat score (0-120)

Step 6

Threat Classification

Categorize as: Clean, Low, Medium, High, or Critical

Step 7

Optional VirusTotal Check

Cross-reference with 70+ antivirus engines for validation

Technical Deep Dive

Understanding the technology behind NAZARICK

YARA Pattern Matching
YARA is a pattern matching engine designed for malware research. It allows you to create rules based on textual or binary patterns.
rule Keylogger_Detection {
  meta:
    description = "Detects keylogger patterns"
    severity = "high"
  
  strings:
    $api1 = "GetAsyncKeyState" nocase
    $api2 = "SetWindowsHookExA" nocase
    $api3 = "SetWindowsHookExW" nocase
  
  condition:
    2 of them
}

Features

  • Custom rule import support
  • 200+ pre-built detection rules
  • Regular expression patterns
  • Hexadecimal byte matching
  • Wildcard support

See NAZARICK in Action

Explore the interface and features through screenshots

Main Dashboard
Scan Progress Window
Comprehensive Analysis Report
PE Analysis Details
VirusTotal Integration
Real-Time Monitoring

Main Dashboard

Clean, modern interface showing system status, recent scans, and quick access to all features

Who Uses NAZARICK?

Trusted by security professionals across multiple disciplines

Malware Analysts

"Quickly triage suspicious samples with multi-engine validation"

Use Cases:

  • Automated initial assessment
  • Import table red-flagging
  • Entropy-based packer detection
  • VirusTotal cross-reference
Software Developers

"Verify builds aren't flagged as false positives before release"

Use Cases:

  • Pre-release scanning
  • Digital signature validation
  • Clean build verification
  • Whitelist confirmation
Security Students

"Learn PE structure and malware detection techniques hands-on"

Use Cases:

  • Educational rule examples
  • Detailed explanation logs
  • Open-source study
  • Safe analysis environment
IT Security Teams

"Monitor endpoint directories for anomalies and threats"

Use Cases:

  • Real-time folder watching
  • Batch scanning capabilities
  • Exportable compliance reports
  • Minimal resource overhead

Built for Speed and Accuracy

Performance metrics from real-world testing

Scan Speed
File SizeScan TimeMemory
< 1 MB~100ms~50 MB
1-10 MB~500ms~100 MB
10-50 MB~2s~200 MB
50-100 MB~5s~350 MB
Accuracy Metrics
Detection Rate95%
False Positive Rate2%

Test Corpus: 10,000+ samples

Comparison: Tested vs 70 AV engines

Faster than traditional AV for static analysis
Low memory footprint (~100MB average)
No system slowdown
Offline capable

Download Project NAZARICK

Start analyzing files in minutes

Version 0.8

Latest Stable Release

Released: June 10, 2025

License: MIT (Free & Open Source)

System Requirements

  • Windows 10/11 (64-bit)
  • .NET Framework 4.7.2+
  • 4GB RAM (8GB recommended)
  • 100MB free disk space
View on GitHub

Installation Steps

  1. Download the installer
  2. Run setup wizard
  3. Launch NAZARICK
  4. Start scanning files

Need help? Check our Installation Guide

NAZARICK vs Traditional Antivirus

See how we compare to conventional solutions

FeatureNAZARICKTraditional AV
Static Analysis
Deep
Basic
Custom YARA Rules
Yes
No
Entropy Detection
Yes
No
VirusTotal Integration
Built-in
Manual
Real-time Monitoring
Folder-based
System-wide
False Positive Rate
~2%
Variable
Resource Usage
Light
Medium-Heavy
Offline Capability
Full
Limited
Transparency
Open Source
Proprietary
Cost
Free
Varies

Legend:

Fully supported / Excellent
Partial support / Moderate
Not supported

Frequently Asked Questions

Get answers to common questions

Documentation & Resources

Everything you need to get started and master NAZARICK

Quick Start Guide
  • Installation steps
  • First scan tutorial
  • UI walkthrough
User Manual
  • Feature explanations
  • Configuration options
  • Best practices
YARA Rule Writing
  • Rule syntax guide
  • Pattern examples
  • Testing rules
API Reference
  • Command-line usage
  • Programmatic integration
  • Report formats
Troubleshooting
  • Common issues
  • Error codes
  • Performance tuning
Contributing Guide
  • Code guidelines
  • Submitting PRs
  • Rule contributions

Join the NAZARICK Community

Help us build better malware detection tools

NAZARICK is open source and thrives on community contributions.

Report Bugs

Found an issue? Submit a bug report on GitHub

Suggest Features

Have ideas for improvements? We're listening

Write YARA Rules

Expand our detection library with new patterns

Code Contributions

Submit pull requests for bug fixes or features

Improve Docs

Help others by improving documentation

Community Support

Join our Discord server and help other users

GitHub Statistics

1,200+
Stars
230
Forks
15
Contributors
450+
Commits

Security & Privacy First

Your trust is our priority

Data Privacy
  • All analysis performed locally
  • No telemetry or tracking
  • Optional VirusTotal submission
  • Open-source audit trail
Safe Execution
  • Sandboxed analysis only
  • No automatic file execution
  • Read-only file access
  • Safe for production environments
Open Source License
  • MIT License (permissive)
  • Commercial use allowed
  • Attribution required
  • No warranty (use at your own risk)
Responsible Disclosure
  • Security vulnerabilities welcome
  • Private disclosure process
  • Hall of fame for researchers
  • Coordinated disclosure timeline