Memhunter – Automated Memory Resident Malware Detection


Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving the threat hunter analysis process and remediation times.

Memhunter - Automated Memory Resident Malware Detection


It’s a self contained binary that can be deployed and managed at scale, does not use memory dumps and relies purely on memory inspection to do its work. It also does not require any complex infrastructure to deploy.

The tool was designed as a replacement of memory forensic volatility plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory resident malware threat hunting at scale, without manual analysis, and without the complex infrastructure needed to move dumps to forensic environments.

Memhunter in a nutshell:

  • It is an standalone binary that gets itself deployed as a windows service
  • It uses a set of memory inspection heuristics and ETW data collection to find footprints left by common injection techniques.
  • Forensic information on findings gets reported through console or event logs for forwarding

Memhunter Automated Memory Resident Malware Detection Features

The detection process is performed through a combination of endpoint data collection and memory inspection scanners. The tool is a standalone binary that, upon execution, deploys itself as a windows service. Once running as a service, memhunter starts the collection of ETW events that might indicate code injection attacks. The live stream of collected data events is feed into memory inspection scanners that use detection heuristics to down select the potential attacks. The entire detection process does not require human intervention, neither memory dumps, and it can be performed by the tool itself at scale.

  • 9 hunter heuristics included (see next slide)
  • 15 code injection techniques implemented on minjector test tool
  • ETW data collection of suspicious events used for heuristic triggering
  • Windows Event Log generation
  • Exclusion of baseline detection
  • Basic forensic information
  • Sqlite storage integration

Memhunter Automated Memory Resident Malware Detection minjector.exe

Besides the data collection and hunting heuristics, the project has also led to the creation of a companion tool called “minjector” that contains +15 code injection techniques. The minjector tool cannot only be used to exercise memhunter detections, but also as a one-stop location to learn on well-known code injection techniques out there.

You can download Memhunter here:

memhunter-master.zip

Or read more here.

Posted in: Forensics


Latest Posts:


Axiom - Pen-Testing Server For Collecting Bug Bounties Axiom – Pen-Testing Server For Collecting Bug Bounties
Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty, basically a pen-testing server out of the box with 1-line.
Quasar RAT - Windows Remote Administration Tool Quasar RAT – Windows Remote Administration Tool
Quasar is a fast and light-weight Windows remote administration tool coded in C#. Used for user support through day-to-day administrative work to monitoring.
Pingcastle - Active Directory Security Assessment Tool Pingcastle – Active Directory Security Assessment Tool
PingCastle is a Active Directory Security Assessment Tool designed to quickly assess the Active Directory security level based on a risk and maturity framework.
Second Order - Subdomain Takeover Scanner Tool Second Order – Subdomain Takeover Scanner Tool
Second Order Subdomain Takeover Scanner Tool scans web apps for second-order subdomain takeover by crawling the application and collecting URLs (and other data)
Binwalk - Firmware Security Analysis & Extraction Tool Binwalk – Firmware Security Analysis & Extraction Tool
Binwalk is a fast and easy to use Python-based firmware security analysis tool that allows for firmware analysis, reverse engineering & extracting of firmware.
zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors


3 Responses to Memhunter – Automated Memory Resident Malware Detection

  1. Sajid al orchid April 5, 2020 at 5:03 pm #

    I want hacking education

  2. Memespeak April 20, 2020 at 11:21 pm #

    If you don\’t mind importing unknown/foriegn libraries blindly, go for it.

    • Darknet April 22, 2020 at 2:24 pm #

      The code is all public on Github, feel free to actually get to know the code and what it does vs whinging.