Skip to the content.

GNAT-o-sphere / malware sandbox

SandGNAT

Automated malware runtime-analysis environment: detonate suspicious binaries in isolated Windows VMs on Proxmox, cluster samples against the existing corpus via byte/opcode trigram MinHash, and emit STIX 2.1 objects into PostgreSQL.

Source: github.com/wrhalpin/SandGNAT.

SandGNAT mascot

Documentation

Organised with the Diátaxis framework. Four quadrants for four kinds of reader-intent:

  Action (doing) Study (reading)
Learning Tutorials Explanation
Working How-to guides Reference

Start here if you’re…

What SandGNAT does, end to end

  1. Intake (POST /submit) — validate, hash, dedupe against the existing corpus, VT hash pre-check, YARA scan, stage to SMB.
  2. Static analysis (Linux VM, optional pre-stage) — PE/ELF parsing, ssdeep + TLSH fuzzy hashes, deep YARA, CAPA capability detection, strings + entropy, byte + opcode trigram MinHash.
  3. LSH similarity lookup — banded-candidate fetch then exact Jaccard. If the best hit clears the threshold (default 0.85), skip detonation.
  4. Windows detonation — ProcMon, tshark, RegShot, dropped-file collection.
  5. Artifact parsing → STIX 2.1 — deterministic UUIDv5 IDs, PostgreSQL JSONB storage.
  6. ExportGET /analyses/<uuid>/bundle serves the STIX bundle to external consumers (the GNAT connector, analyst scripts, etc.).

Full architecture diagrams live in explanation/architecture — topology, pipeline flow, sequence, and component diagrams rendered via Mermaid.

Key design choices

Status

Phases 1–6 shipped: scaffold, host↔guest detonation protocol, intake, VM pool manager, Linux static-analysis + trigram similarity, the read-only export API, and the anti-analysis evasion mitigations (phases A–G). See explanation/anti-analysis-evasion for the full implementation record.

The GNAT-o-sphere

SandGNAT is one of three add-ons that plug into GNAT, the core threat-intel platform. Every sibling emits STIX 2.1 objects and is pulled by GNAT through a documented connector rather than writing into its database directly.

Core platform

GNAT

The hub TIP. Connector abstraction, STIX 2.1 modelling, investigations, reports, and workflow automation across a large integration surface.

Learn more
Frontend

GNAT-gui

Analyst workbench for GNAT — React SPA + FastAPI backend covering investigations, detection rules, evidence graphs, and live SSE streaming.

Learn more
Addon

RedGNAT

Continuous automated readiness testing — ingests threat intel, constructs adversary emulation scenarios, executes them with safety controls.

Learn more
Addon

SenseGNAT

NNetwork profiling and behavior analysis that surfaces anomalies and enriches GNAT investigations with traffic-layer context using network sensor and honeypot telemetry — high-volume ingestion from Kafka topics, Redis dedup, automatic campaign linking.

Learn more

Canonical Workflow

Collect Telemetry & Sources

External indicators and raw network telemetry enter the ecosystem

Process GNAT

Ingest, normalize, convert to STIX, and route to addons

SenseGNAT

Behavioral profiling & anomaly detection

SandGNAT

Malware detonation & artifact enrichment

RedGNAT

Adversary emulation & validation

Report Investigate & Act

Unified investigation graph, reporting, and operator action

View full diagram → Read the workflow doc →

Licensed under Apache 2.0.