Skip to main content
DECODA offers two distinct analysis modes. You can switch between them using the toggle at the top of the chat input.

Ask Mode

Ask mode is a conversational Q&A interface. You type a question, and the AI responds immediately using its knowledge of your uploaded sample and triage results. Best for:
  • Quick triage questions (“Is this file packed?”, “What do these YARA matches mean?”)
  • Conceptual explanations (“How does process injection work?”, “What is a PE import table?”)
  • Discussing findings from a previous Agent mode analysis
How it works:
  • Uses a fast language model for low-latency responses
  • Does not execute any tools or access the sandbox
  • Draws on the triage data (hashes, YARA matches, VirusTotal results) already collected for your sample
  • Rate limited to 60 requests per minute
Ask mode is great for learning. If the agent produces a technical finding you don’t understand, switch to Ask mode and ask it to explain.

Agent Mode

Agent mode gives the AI autonomous control over a full analysis toolkit. It decides which tools to run, executes them inside an isolated sandbox, reviews the output, and iterates until it has enough information to answer your question. Best for:
  • Deep static analysis (“Decompile the entry point and trace the execution flow”)
  • IOC extraction (“Find all network indicators in this binary”)
  • Detection engineering (“Generate a YARA rule for this malware family”)
  • Full reports (“Produce a comprehensive threat intelligence report”)
How it works:
  • Uses Claude Sonnet for reasoning and tool selection
  • Each analysis runs inside a fresh Firecracker microVM with network disabled
  • The agent can chain multiple tools together across iterations
  • Rate limited to 20 requests per minute

Available Tools (Agent Mode)

When in Agent mode, the AI has access to the following tools:

Core Analysis

ToolWhat it does
File InfoFull metadata, all hash types (MD5, SHA1, SHA256, ssdeep, imphash), and entropy calculation
YARA ScanScan with built-in rulesets plus any custom rules you’ve added
Strings AnalysisExtract strings with automatic categorisation (URLs, IPs, API calls, registry keys)
Terminal CommandRun safe shell commands inside the sandbox (dangerous commands are blocked)
Python CodeExecute custom Python scripts with pefile, capstone, lief, PyCryptodome, and more

Reverse Engineering

ToolWhat it does
Ghidra Scripts16 pre-built scripts covering decompilation, crypto detection, packer identification, cross-references, and call graphs
.NET AnalysisDecompile .NET assemblies using ILSpyCMD and monodis
Cross ReferencesMap function cross-references across the binary
Call GraphGenerate function call graphs
Crypto DetectionIdentify cryptographic algorithms and constants
Python UnpackerDetect and unpack PyInstaller/py2exe binaries

Document Analysis

ToolWhat it does
OLE AnalysisAnalyse Office documents and OLE files for macros and embedded objects
PDF AnalysisInspect PDF structure for suspicious JavaScript, embedded files, and launch actions
JAR AnalysisAnalyse Java archive contents and class files

Output

ToolWhat it does
Generate IOCsExtract and export indicators of compromise as JSON, CSV, or STIX 2.1
Generate YARA RuleCreate detection rules based on the sample’s characteristics
Save ArtifactSave extracted payloads, configs, or other artifacts for download
Save ReportGenerate a structured analysis report

Choosing the Right Mode

ScenarioRecommended Mode
”What type of file is this?”Ask
”Explain the YARA match for Emotet”Ask
”Decompile the main function”Agent
”Extract all network IOCs”Agent
”Is this file malicious?”Start with Ask, switch to Agent for confirmation
”Generate a report for my team”Agent
”How does DLL sideloading work?”Ask
”Find any encrypted strings and decrypt them”Agent

Analysis Perspectives

In your settings, you can choose from five analysis perspectives that shape how the AI communicates its findings:
  • Executive - High-level summaries focused on business impact and risk
  • Professor - Educational explanations that teach concepts alongside findings
  • Analyst - Balanced technical detail for SOC workflows
  • Reverse Engineer - Deep technical analysis with assembly-level detail
  • Threat Hunter - TTPs, detection opportunities, and adversary behaviour focus