Pipeline Stages
The triage runs asynchronously and you’ll see real-time progress updates in the chat as each stage completes.File Extraction
If the upload is an archive (ZIP, RAR, etc.), DECODA extracts the contents. Zip bomb detection is built in to prevent decompression attacks.
Hashing
The file is hashed using five algorithms:
- MD5 - Legacy identifier, still widely used in threat intel feeds
- SHA1 - Common in older detection systems
- SHA256 - Primary identifier for deduplication and lookup
- ssdeep - Fuzzy hash for finding similar samples
- imphash - Import hash for PE files, useful for clustering malware families
YARA Scanning
The sample is scanned against DECODA’s built-in YARA rulesets covering:
- Known malware families
- Packer and protector signatures
- Ransomware indicators
- Suspicious API patterns
VirusTotal Lookup
The SHA256 hash is checked against VirusTotal’s database. If there’s a match, you’ll see:
- Detection ratio (e.g., 45/72 engines detected)
- Engine-specific labels
- First and last seen dates
By default, DECODA uses its own platform API key. If you have a paid VirusTotal subscription, you can add your own key in settings for higher rate limits.
Binary Classification
DECODA identifies the file type and classifies it into one of these categories:
| Type | Description |
|---|---|
native-pe | Native Windows PE (C/C++, Delphi, etc.) |
dotnet | .NET assembly |
elf | Linux ELF binary |
macho | macOS Mach-O binary |
office-ole | Legacy Office format with OLE streams |
office-ooxml | Modern Office format (docx, xlsx, pptx) |
pdf | PDF document |
script | Scripts (PowerShell, VBScript, JavaScript, batch) |
java-jar | Java JAR archive |
packed | Packed/protected binary (UPX, Themida, etc.) |
unknown | Unrecognised format |
PE Metadata Extraction
For PE files (both native and .NET), additional metadata is extracted:
- Compilation timestamp - When the binary was compiled (can be faked but often useful)
- Entry point address - Where execution begins
- Section table - Names, sizes, and entropy of each section
- Security flags - ASLR, DEP, SEH, CFG, and other protection mechanisms