loading…
Search for a command to run...
loading…
Provides real-time threat intelligence and malware metadata by integrating with MalwareBazaar and VirusTotal APIs. Users can search for IOCs, analyze local file
Provides real-time threat intelligence and malware metadata by integrating with MalwareBazaar and VirusTotal APIs. Users can search for IOCs, analyze local file hashes, and access data transformation tools for defensive security research.
This is a Cursor MCP (Model Context Protocol) server that talks to the MalwareBazaar Community API/VirusTotal to provide real-time threat intel / malware sample metadata (IOCs) for authorized defensive research workflows.
Note:
get_file(malware binary download) is disabled in this project. This server provides metadata/IOCs only.
get_recent)sha256 (get_info)get_taginfo)vt_lookup)send_alert)check_local_file)suggest_analysis_blogs)npmInside the project folder:
npm install
Set these in the root .env file:
PORT=3000
# MalwareBazaar (required)
MB_AUTH_KEY=YOUR_ABUSECH_AUTH_KEY
# VirusTotal (optional - only for vt_lookup)
VT_API_KEY=YOUR_VT_KEY
# Telegram (optional - only for send_alert)
TG_BOT_TOKEN=YOUR_BOT_TOKEN
TG_CHAT_ID=YOUR_CHAT_ID
MB_AUTH_KEY: https://auth.abuse.ch/Cursor runs MCP servers from mcp.json.
For this repo, the global Cursor config file c:\Users\user\.cursor\mcp.json contains a malware-mcp entry that runs using stdio transport:
cmd.exe /c npx -y ts-node ${workspaceFolder}/mcp-server.ts.env via envFile: ${workspaceFolder}/.envYou can also run it locally:
npx ts-node mcp-server.ts
This is a stdio MCP server, so you won’t see “web server style” output—Cursor/the MCP host will communicate over the MCP protocol.
Prints a quick usage guide listing all tools and example prompts/args.
Input
Example
Run help
Get recent sample metadata from MalwareBazaar.
Input
limit (1..100, default 10)selector ("100" or "time", default "100")Example
{ "limit": 10, "selector": "100" }
Get full metadata for a specific sample.
Input
hash (sha256 string)Example
{ "hash": "81ddacc1d4689616b993f34465cb372e6046c035b45a4831343bd55ed37d48ee" }
Get samples associated with a specific tag.
Input
tag (required)limit (1..1000, default 100)Example
{ "tag": "TrickBot", "limit": 50 }
VirusTotal analysis stats summary.
Input
hash (sha256 string)Example
{ "hash": "81ddacc1d4689616b993f34465cb372e6046c035b45a4831343bd55ed37d48ee" }
Send a message via your Telegram bot.
Input
message (string)Example
{ "message": "🚨 New malware sample: <sha256> ..." }
This tool is intentionally disabled because it would involve downloading live malware binaries.
Compute the SHA256 of a local file (on this PC) and check whether it matches a known entry in MalwareBazaar. Optionally also performs a VirusTotal lookup by SHA256 (requires VT_API_KEY).
Input
path (string, required): absolute path to the filevt (boolean, optional, default true): also run VirusTotal lookupExample
{ "path": "C:\\\\Users\\\\user\\\\Downloads\\\\somefile.exe", "vt": true }
Suggests relevant analysis blogs/resources for the same malware family/signature (Malpedia / MITRE / abuse.ch / vendor writeups).
You can pass a signature name directly, or pass a hash and it will try to resolve the signature via MalwareBazaar first.
Input
signature (string, optional)hash (string, optional; sha256 recommended)Examples
{ "signature": "HijackLoader" }
{ "hash": "4f9669712b6cd325eba9e94faf73a7d6ac29cdb724e857f5693aebe542f64b94" }
These tools run offline (no uploads) and are useful for quick data transformations and analysis.
{ "text": "hello" }
{ "base64": "aGVsbG8=" }
{ "text": "a+b c" }
{ "text": "hello" }
Compress UTF-8 text and return base64.
{ "text": "hello" }
Decompress from base64 (gzip bytes) back to UTF-8.
{ "base64": "<gzip_base64>" }
{ "alg": "sha256", "text": "hello" }
{ "text": "hello" }
{ "text": "hello", "limitBytes": 256 }
Encrypt UTF-8 text using AES-256-GCM with PBKDF2-derived key (password + salt). Returns a JSON envelope.
{ "text": "secret", "password": "pass123", "salt": "cyberchef-lite" }
{ "envelope": "{...json...}", "password": "pass123" }
mcp-server.ts: Real MCP stdio server (recommended for Cursor MCP)MalwareBazaar Auth-Key missing: set MB_AUTH_KEY in .env.VT API key missing: vt_lookup requires VT_API_KEY in .env.VT API key missing: virustotal_lookup (or vt_lookup) requires VT_API_KEY in .env.TG_BOT_TOKEN and TG_CHAT_ID.Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"malware-analysis-mcp-server": {
"command": "npx",
"args": []
}
}
}PRs, issues, code search, CI status
Database, auth and storage
Reference / test server with prompts, resources, and tools.
Secure file operations with configurable access controls.