Creating malware visualizations with Ghidra and CantorDust
![]()  | 
    
|---|
| Cantordust Ghidra plugin - Visualization of REvil ransomware sample | 
..cantor.dust.. is a binary visualization tool developed by Christopher Domas, first presented at Derbycon 2012. The original source code was never released. Then in 2020 a plugin for Ghidra was released by Battelle - (https://github.com/Battelle/cantordust)
Visualizing binaries in this way could assist forensics and reverse-engineering teams in the initial triage and categorization of unknown files. Battelle shared on their blog why they think this is important and details about how the visualizations work - (https://inside.battelle.org/blog-details/battelle-publishes-open-source-binary-visualization-tool)
Installation
I’ve had the cantordust plugin running successfully on both Windows and Linux based installations of Ghidra.
The instructions provided by Battelle are enough to get started - (https://github.com/Battelle/cantordust#installation-and-setup)
Examples
Here are some malware visualizations I’ve generated using samples from both theZoo and vx-underground
![]()  | 
      ![]()  | 
    
|---|---|
| AlienSpy | CobaltStrike | 
![]()  | 
      ![]()  | 
    
| Darkside | Emotet | 
![]()  | 
      ![]()  | 
    
| Mirai | Pegasus | 
![]()  | 
      ![]()  | 
    
| Petya | REvil | 
![]()  | 
      ![]()  | 
    
| Shadow Hammer | Stuxnet | 
Similar Projects
- https://rustrepo.com/repo/sharkdp-binocle-rust-data-visualization
 - https://github.com/wapiflapi/veles
 - https://github.com/VelocityRa/binviz
 
References
- https://sites.google.com/site/xxcantorxdustxx
 - https://github.com/Battelle/cantordust
 - https://inside.battelle.org/blog-details/battelle-publishes-open-source-binary-visualization-tool
 - https://www.youtube.com/watch?v=4bM3Gut1hIk
 - https://bdtechtalks.com/2021/09/10/computer-vision-deep-learning-threat-detection
 










