Back to Skills

binary-analysis

verified

Analyze binary files (exe, dll, sys, bin, ocx, scr, cpl, drv) to assess if they are malicious, perform decompilation, extract strings/imports/exports, detect malware, and provide threat assessment. Use this skill when user asks to analyze, examine, check, or assess any binary file, asks if a file is malicious/suspicious/safe, or provides a file path to a binary. Trigger for phrases like "Is [file] malicious?", "Analyze [file]", "What does [binary] do?", or any request involving binary file analysis.

View on GitHub

Marketplace

deepbits

DeepBitsTechnology/claude-plugins

Plugin

drbinary-chat-plugin

Repository

DeepBitsTechnology/claude-plugins
22stars

drbinary-chat-plugin/skills/binary-analysis/SKILL.md

Last Verified

January 20, 2026

Install Skill

Select agents to install to:

Scope:
npx add-skill https://github.com/DeepBitsTechnology/claude-plugins/blob/main/drbinary-chat-plugin/skills/binary-analysis/SKILL.md -a claude-code --skill binary-analysis

Installation paths:

Claude
.claude/skills/binary-analysis/
Powered by add-skill CLI

Instructions

# Binary Analysis

This skill enables deep analysis of suspicious binary files using remote Ghidra tools and sandbox environments. You HAVE TO upload binary files to the remote first before calling any Ghidra or sandbox tools.

## When to Use This Skill

Use this skill when you need to:
- Analyze suspicious executable files (.exe, .dll, .sys)
- Decompile binaries to understand their behavior
- Extract strings, imports, and exports from files
- Identify malware capabilities and techniques
- Perform static analysis on unknown binaries
- Investigate potential trojans, ransomware, or other malware
- Generate threat assessment reports

## Workflow

### Step 1: Perform Analysis

Use available Ghidra MCP tools to analyze the uploaded binary:

- **Decompilation**: Convert assembly to pseudo-C code
- **String Analysis**: Extract readable strings for IoC identification
- **Import/Export Analysis**: Identify API calls and dependencies
- **Function Analysis**: Map out program logic and control flow
- **Behavioral Indicators**: Identify suspicious patterns (registry manipulation, network calls, process injection)

### Step 2: Generate Report

Provide a comprehensive analysis including:
- File metadata (size, hash, compilation timestamp)
- Identified capabilities (network, file system, registry, process manipulation)
- Suspicious indicators
- Malware classification (if applicable)
- Recommended actions

## Analysis Techniques

### Static Analysis
- PE header examination
- Section analysis (.text, .data, .rdata, .rsrc)
- Import Address Table (IAT) review
- String artifact extraction
- Code signature verification

### Behavioral Indicators
Look for:
- Anti-debugging techniques
- Obfuscation/packing
- Suspicious API calls (CreateRemoteThread, WriteProcessMemory, etc.)
- Network communication patterns
- Persistence mechanisms
- Privilege escalation attempts

### Malware Classification
Common categories:
- Trojan/RAT (Remote Access Trojan)
- Ransomware
- Adware/PUP (Potentially Unwant

Validation Details

Front Matter
Required Fields
Valid Name Format
Valid Description
Has Sections
Allowed Tools
Instruction Length:
3084 chars