Malcore: Simple File Analysis
  • Malcore API docs
  • Packer Checking
  • Deep Static Analysis
  • PCAP diffing
  • Gather sections
  • Shellcode Emulation
  • Executable File Analysis
  • Binary Diffing
  • Script Analysis
  • Ransom Note Comparison
  • PCAP Analysis
  • Snort Rule Generation
  • Hash Checksum
  • Strings
  • Imports and Exports
  • Status Check
  • Yara Rule Scanning
  • Parse Exif Data
  • Domain Analysis
  • Threat Score
  • Execute From URL
  • Document File Analysis
  • URL Checking
  • Browser Extension Analysis
  • Android Permission Lookup
  • AndroidManifest Parsing
  • Phone Application Analysis
  • Dynamic Analysis
  • Threat Feed
  • AI Classifier
  • Scan Results Manipulation
Powered by GitBook
On this page
  • [ POST ] https://api.malcore.io/api/sections
  • Query Params
  • Headers
  • Request
  • Responses

Gather sections

[ POST ] https://api.malcore.io/api/sections

Gather the sections out of the binary file


Query Params

  • filename1 file

Headers

  • apiKey string


Request

curl -X POST  https://api.malcore.io/api/phoneapp \ 
-H "apiKey: MY-API-KEY" \
-F "filename1=@calc.exe" \

Responses

🟢 200

{
  "results": [
    [
      ".text:",
      "5.80653548846"
    ],
    [
      ".rdata:",
      "3.96936179484"
    ],
    [
      ".data:",
      "0.378703493488"
    ],
    [
      ".pdata:",
      "1.97732827586"
    ],
    [
      ".rsrc:",
      "2.93658107871"
    ],
    [
      ".reloc:",
      "0.0"
    ]
  ]
}

🔴 400

{}

🔴 404

{
  "error": "invalid upload name provided, make sure the upload name is 'filename1'"
}
PreviousPCAP diffingNextShellcode Emulation

Last updated 1 year ago