Malware Analysis MCP Server
Provides real-time threat intelligence and malware metadata by integrating with MalwareBazaar and VirusTotal APIs. Users can search for IOCs, analyze local file hashes, and access data transformation tools for defensive security research.
README
Malware Analysis MCP server (Cursor MCP Server)
This is a Cursor MCP (Model Context Protocol) server that talks to the MalwareBazaar Community API/VirusTotal to provide real-time threat intel / malware sample metadata (IOCs) for authorized defensive research workflows.
Note:
get_file(malware binary download) is disabled in this project. This server provides metadata/IOCs only.
What you get
- Recent sample metadata from MalwareBazaar (
get_recent) - Detailed metadata for a specific
sha256(get_info) - Samples associated with a specific tag (
get_taginfo) - VirusTotal analysis stats summary (
vt_lookup) - Telegram alerts (
send_alert) - Check a local file against MalwareBazaar/VirusTotal by hashing it (
check_local_file) - Suggested analysis blogs/resources for a malware family/signature (
suggest_analysis_blogs)
Requirements
- Windows 10+
- Node.js (recommended LTS)
npm
Install
Inside the project folder:
npm install
Configure (.env)
Set these in the root .env file:
PORT=3000
# MalwareBazaar (required)
MB_AUTH_KEY=YOUR_ABUSECH_AUTH_KEY
# VirusTotal (optional - only for vt_lookup)
VT_API_KEY=YOUR_VT_KEY
# Telegram (optional - only for send_alert)
TG_BOT_TOKEN=YOUR_BOT_TOKEN
TG_CHAT_ID=YOUR_CHAT_ID
- Where to get
MB_AUTH_KEY:https://auth.abuse.ch/
Cursor MCP setup (important)
Cursor runs MCP servers from mcp.json.
For this repo, the global Cursor config file c:\Users\user\.cursor\mcp.json contains a malware-mcp entry that runs using stdio transport:
cmd.exe /c npx -y ts-node ${workspaceFolder}/mcp-server.ts- Automatically loads
.envviaenvFile: ${workspaceFolder}/.env
After changing config
- Restart Cursor (or reload MCP) so the new config is loaded.
Run (manual testing)
You can also run it locally:
npx ts-node mcp-server.ts
This is a stdio MCP server, so you won’t see “web server style” output—Cursor/the MCP host will communicate over the MCP protocol.
MCP Tools
help
Prints a quick usage guide listing all tools and example prompts/args.
Input
- none
Example
Run help
get_recent
Get recent sample metadata from MalwareBazaar.
Input
limit(1..100, default 10)selector("100"or"time", default"100")
Example
{ "limit": 10, "selector": "100" }
get_info
Get full metadata for a specific sample.
Input
hash(sha256 string)
Example
{ "hash": "81ddacc1d4689616b993f34465cb372e6046c035b45a4831343bd55ed37d48ee" }
get_taginfo
Get samples associated with a specific tag.
Input
tag(required)limit(1..1000, default 100)
Example
{ "tag": "TrickBot", "limit": 50 }
virustotal_lookup (alias: vt_lookup)
VirusTotal analysis stats summary.
Input
hash(sha256 string)
Example
{ "hash": "81ddacc1d4689616b993f34465cb372e6046c035b45a4831343bd55ed37d48ee" }
send_alert
Send a message via your Telegram bot.
Input
message(string)
Example
{ "message": "🚨 New malware sample: <sha256> ..." }
get_file (disabled)
This tool is intentionally disabled because it would involve downloading live malware binaries.
check_local_file
Compute the SHA256 of a local file (on this PC) and check whether it matches a known entry in MalwareBazaar. Optionally also performs a VirusTotal lookup by SHA256 (requires VT_API_KEY).
Input
path(string, required): absolute path to the filevt(boolean, optional, defaulttrue): also run VirusTotal lookup
Example
{ "path": "C:\\\\Users\\\\user\\\\Downloads\\\\somefile.exe", "vt": true }
suggest_analysis_blogs
Suggests relevant analysis blogs/resources for the same malware family/signature (Malpedia / MITRE / abuse.ch / vendor writeups).
You can pass a signature name directly, or pass a hash and it will try to resolve the signature via MalwareBazaar first.
Input
signature(string, optional)hash(string, optional; sha256 recommended)
Examples
{ "signature": "HijackLoader" }
{ "hash": "4f9669712b6cd325eba9e94faf73a7d6ac29cdb724e857f5693aebe542f64b94" }
Utility Tools (encoding/encryption/compression/analysis)
These tools run offline (no uploads) and are useful for quick data transformations and analysis.
base64_encode
{ "text": "hello" }
base64_decode
{ "base64": "aGVsbG8=" }
url_encode / url_decode
{ "text": "a+b c" }
hex_encode / hex_decode
{ "text": "hello" }
gzip_compress
Compress UTF-8 text and return base64.
{ "text": "hello" }
gzip_decompress
Decompress from base64 (gzip bytes) back to UTF-8.
{ "base64": "<gzip_base64>" }
hash_text
{ "alg": "sha256", "text": "hello" }
entropy
{ "text": "hello" }
hexdump_text
{ "text": "hello", "limitBytes": 256 }
aes_gcm_encrypt
Encrypt UTF-8 text using AES-256-GCM with PBKDF2-derived key (password + salt). Returns a JSON envelope.
{ "text": "secret", "password": "pass123", "salt": "cyberchef-lite" }
aes_gcm_decrypt
{ "envelope": "{...json...}", "password": "pass123" }
Files
mcp-server.ts: Real MCP stdio server (recommended for Cursor MCP)
Troubleshooting
MalwareBazaar Auth-Key missing: setMB_AUTH_KEYin.env.- Tools not showing in Cursor: restart Cursor and check MCP Logs.
VT API key missing:vt_lookuprequiresVT_API_KEYin.env.VT API key missing:virustotal_lookup(orvt_lookup) requiresVT_API_KEYin.env.- Telegram errors: verify
TG_BOT_TOKENandTG_CHAT_ID.
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.
VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.
E2B
Using MCP to run code via e2b.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.