MCARTA

Malicious Code Automated Run-Time Analysis (MCARTA) is a completed incident analysis framework in respect to run-time analysis with automated log and pocket data correlation. MCARTA provides cataloging tracking, log correlation, and comparisons of malware based on behavioral activities.

Incident response requires very quick action on any suspicious behavioral activities such as anti-virus scan results; file, network, and registry activities; and process details. MCARTA is able to quickly and efficiently analyze the submitted malware and provide a thorough report.

Features

Malware Analysis

  • Behavioral activities
  • Log file correlation

Malicious Code Analysis

  • Behavioral activities
  • Log file correlation

Automated Runtime Analysis

  • File and network activities
  • Fast report
  • Similar malware

Similarity Search

  • Similar behavioral activities
  • Bloom filter techniques

System Requirements

Any of the following browsers: Firefox, Google Chrome, and Internet Explorer 7 and above

Download

MCARTA version 1.0 will be released on the CERT website in March 2012.

Find Us Here

Find us on Youtube  Find us on LinkedIn  Find us on twitter  Find us on Facebook

Share This Page

Share on Facebook  Send to your Twitter page  Save to del.ico.us  Save to LinkedIn  Digg this  Stumble this page.  Add to Technorati favorites  Save this page on your Google Home Page 

For more information

Contact Us

info@sei.cmu.edu

412-268-5800

Help us improve

Visitor feedback helps us continually improve our site.

Please tell us what you
think with this short
(< 5 minute) survey.