Skip to main content
DECODA’s analysis router automatically detects uploaded file types using magic bytes, file headers, and structural analysis. Each type is routed to the most effective tools.

Executable Binaries

TypeExtensionsDetectionAnalysis Tools
Native PE.exe, .dll, .sys, .ocxMZ header + PE signatureGhidra (decompilation, disassembly), YARA, strings, Python
.NET Assembly.exe, .dllBSJB metadata signature, mscoree.dll importILSpyCMD (C# decompilation), monodis (IL disassembly), metadata extraction
ELF.elf, .so, .o, no extension\x7FELF magicGhidra, YARA, strings, Python
Mach-O.dylib, .app, no extensionFEEDFACE/FEEDFACF magicGhidra, YARA, strings, Python
UEFI.efiPE with EFI subsystem (10-13)Ghidra, binwalk, strings
Shellcode.sc, .shellcode, .raw, .binNo headers + high instruction density (capstone)Ghidra, capstone disassembly, strings
PackedAny executableHigh entropy (>7.5), packer signatures (UPX, Themida, VMProtect, ASPack, MPRESS, .NET Reactor, Enigma, PECompact)Packer detection, unpacking, then standard tools

Managed Code

TypeExtensionsDetectionAnalysis Tools
Java JAR.jarZIP with META-INF/MANIFEST.MF or .class filesCFR/JADX decompilation, javap disassembly, signature verification
Android APK.apkZIP with AndroidManifest.xmlJADX decompilation, manifest analysis, apktool
Android DEX.dexdex\n magic (0x6465780A)JADX decompilation

Documents

TypeExtensionsDetectionAnalysis Tools
OLE Documents.doc, .xls, .pptD0CF11E0 OLE compound headeroletools (macros, DDE, embedded objects), mraptor
OOXML Documents.docx, .xlsx, .pptxZIP with [Content_Types].xmloletools, zipinfo
PDF.pdf%PDF headerpdfid (keyword scanning), pdf-parser (object extraction)
OneNote.one, .onetoc2E4525C7B magicEmbedded attachment/script extraction

Email & Messaging

TypeExtensionsDetectionAnalysis Tools
Email (EML).emlRFC 822 mail headersHeader parsing, attachment extraction, phishing indicators
Outlook MSG.msgOLE with __properties_version1.0 streamoletools, header parsing, attachment extraction

Disk Images & Installers

TypeExtensionsDetectionAnalysis Tools
ISO.iso, .imgISO 9660 / UDF filesystem header7z extraction, content analysis
VHD/VHDX.vhd, .vhdxconectix / vhdxfile magic7z extraction, guestfish
MSI.msiOLE with _Tables/_StringData streamsmsiextract/7z, custom action inspection
CHM.chmITSF magic (0x49545346)Embedded script/ActiveX extraction

Scripts

TypeExtensionsDetectionAnalysis Tools
PowerShell.ps1, .psm1, .psd1Text detection + content heuristicsString analysis, deobfuscation, regex
VBScript.vbs, .vbeText detectionString analysis, deobfuscation
JavaScript.js, .jseText detectionString analysis, deobfuscation
Batch.bat, .cmdText detectionString analysis
Python.py, .pycText/bytecode detectionpyinstxtractor (packed), uncompyle6, pycdc
HTA.htaHTA:APPLICATION tag in HTMLScript extraction, ActiveX reference analysis

Forensic Artifacts

Forensic file types were added in DECODA v2. They enable investigation of Windows event logs, network traffic, and execution evidence.
TypeExtensionsDetectionAnalysis Tools
PCAP/PCAPNG.pcap, .pcapng, .capD4C3B2A1/A1B2C3D4 (PCAP) or 0A0D0D0A (PCAPNG) magicPython dpkt/scapy for protocol analysis
Windows Event Log.evtxElfFile\0 magic (0x456C6646696C6500)Python python-evtx for event parsing and timeline
Registry HiveNTUSER.DAT, SYSTEM, SOFTWARE, etc.regf magic (0x72656766)Python python-registry for hive parsing
Prefetch.pfMAM compressed header (0x4D414D04)Python windowsprefetch for execution evidence
EVTX files begin with ElfFile\0 (0x456C66…) which is distinct from Linux ELF binaries (0x7F454C46). DECODA checks the full 8-byte signature to avoid confusion.

Firmware

TypeExtensionsDetectionAnalysis Tools
UEFI Firmware.efi, .romPE with EFI subsystem valuesGhidra, binwalk
Embedded Firmware.bin, .fw, .imgbinwalk heuristics (SquashFS, JFFS2, U-Boot, etc.)binwalk extraction, Ghidra

How Detection Works

DECODA uses a multi-stage detection pipeline:
1

Magic Bytes

The first 4-16 bytes of the file are checked against known signatures (MZ, ELF, PDF, OLE, etc.).
2

Structural Analysis

For ambiguous types (ZIP-based files, OLE documents), DECODA inspects internal structure to distinguish JAR from OOXML, MSG from OLE, or MSI from Office documents.
3

Deep Inspection

PE files are checked for .NET metadata (BSJB signature), UEFI subsystems, and packer signatures. Unknown blobs are tested with capstone for shellcode instruction density.
4

Tool Routing

The detected type determines which tools are recommended, discouraged, and prioritised. This guidance is passed to the AI agent, which makes final tool selection decisions.
Each detection includes a confidence score (0-100):
  • 90-100 — High confidence (multiple strong indicators)
  • 70-89 — Good confidence (clear magic bytes, valid structure)
  • 50-69 — Medium confidence (partial matches, some ambiguity)
  • 0-49 — Low confidence (heuristic guesses)