Malware Signature Scanner
Skill Name: malware-signature-scanner
Version: 1.0.0
Category: Security / Threat Detection
Price: Lifetime: $39 / Optional Monthly: $7/mo (includes all Pro features permanently)
Author: EdgeIQ Labs
OpenClaw Compatible: Yes — Python 3, pure stdlib, WSL + Linux
What It Does
Detects known malware signatures, suspicious patterns, and indicators of compromise (IOC) in files and URLs. Uses YARA-style pattern matching, hash comparison against threat intelligence feeds, PE header analysis, and behavioral pattern detection. Designed for security researchers and sysadmins analyzing suspicious files.
⚠️ Legal Notice: Only scan files you own or have explicit authorization to analyze. Do not use this tool to analyze files you don't have rights to. Analyzing malware may require a safe, isolated environment.
Features
- YARA-style pattern matching — rule-based detection for known malware families
- Hash reputation check — MD5/SHA1/SHA256 vs VirusTotal, MalwareBazaar, Hybrid-Analysis feeds
- PE header analysis — detects packers, suspicious sections, malformed headers, overlay data
- String extraction — pulls suspicious strings (IP addresses, URLs, mutexes, API calls)
- Entropy analysis — identifies encrypted/packed sections (high entropy = likely obfuscated)
- URL/domain reputation — checks URLs against blocklists
- JSON export — structured threat report
Tier Comparison
| Feature | Free | Lifetime ($39) | Optional Monthly ($7/mo) |
|---|
| Hash reputation check | ✅ (5 files) | ✅ (unlimited) | ✅ (unlimited) |
| YARA pattern matching | ✅ (basic rules) | ✅ (full + custom) | ✅ (full + custom) |
| PE header analysis | ✅ | ✅ | ✅ |
| String extraction | ✅ | ✅ | ✅ |
| Entropy analysis | ✅ | ✅ | ✅ |
| URL/domain reputation | ✅ | ✅ | ✅ |
| JSON export | ✅ | ✅ | ✅ |
Installation
cp -r /home/guy/.openclaw/workspace/apps/malware-signature-scanner ~/.openclaw/skills/malware-signature-scanner
Usage
Basic hash + YARA scan (free tier)
python3 malware_scanner.py --file /path/to/suspicious.exe
SHA256 hash check only
python3 malware_scanner.py --hash "a1b2c3d4e5f6789012345678901234567890123456789012345678901234abcd" --pro
URL reputation check
EDGEIQ_EMAIL=your_email@gmail.com python3 malware_scanner.py --url "https://suspicious-site.com/payload.exe" --pro
Full bundle analysis with JSON export
EDGEIQ_EMAIL=your_email@gmail.com python3 malware_scanner.py --file /path/to/sample.exe --bundle --output malware-report.json
As OpenClaw Discord Command
In #edgeiq-support channel:
!malware /path/to/file.exe
!malware --hash a1b2c3d4...abcd
!malware --url https://suspicious-site.com/payload.exe
Parameters
| Flag | Type | Default | Description |
|---|
--file | string | — | Path to file to analyze |
--hash | string | — | SHA256/MD5/SHA1 hash to check |
--url | string | — | URL to check for malicious content |
--pro | flag | False | Enable Pro features |
--bundle | flag | False | Enable Bundle features |
--output | string | — | Write JSON report to file |
--timeout | int | 30 | Analysis timeout (seconds) |
Output Example
=== Malware Signature Scanner ===
Target: /samples/payload.exe (SHA256: a1b2c3d4...)
[1m[91m🔴 THREAT DETECTED — Win32/TrickBot[0m
Confidence: 94%
Signature: YARA_rule_trickbot_v3
Category: Banking Trojan
Source: EdgeIQ Threat Intel + Hybrid-Analysis
[1m[93m🟡[0m Suspicious Strings:
- hxxp://malicious-c2[.]server[.]com:443/update
- Mutex: Global\\MSCTF_ASDF1234
- API: CreateRemoteThread, WriteProcessMemory
[1m[93m🟡[0m Entropy: 7.8/10 (HIGH — likely obfuscated/packed)
[1m[92m✔[0m PE Header: Normal (no suspicious entries)
Threat Level: HIGH — 1 malware signature matched (TrickBot)
Pro Upgrade
Full YARA ruleset + entropy analysis + URL reputation + unlimited hash checks:
👉 Buy Lifetime — $39
👉 Subscribe Monthly — $7/mo
Data Sources
- VirusTotal Community API (hash lookup)
- MalwareBazaar (Abuse.ch)
- Hybrid-Analysis public feed
- Internal EdgeIQ YARA ruleset (200+ rules)
- URLhaus (Malware URL blocklist)
- Emerging Threats ruleset
Safe Analysis Tips
- Always analyze malware in an isolated VM or sandboxed environment
- Do not run payloads — use
--hash to check before downloading
- Use
--pro for full threat intelligence lookup
- Export reports with
--output for security documentation
Support
Open a ticket in #edgeiq-support or email gpalmieri21@gmail.com
🔗 More from EdgeIQ Labs
edgeiqlabs.com — Security tools, OSINT utilities, and micro-SaaS products for developers and security professionals.
- 🛠️ Subdomain Hunter — Passive subdomain enumeration via Certificate Transparency
- 📸 Screenshot API — URL-to-screenshot API for developers
- 🔔 uptime.check — URL uptime monitoring with alerts
- 🛡️ headers.check — HTTP security headers analyzer
👉 Visit edgeiqlabs.com →