Overview
Naga is a next-generation malware analysis sandbox that combines deep network forensics, real-time visualization, and modern analyst-centric design. Unlike traditional sandboxes that produce static reports, Naga provides a live, interactive experience where analysts can watch malware detonate in real-time, see decrypted network traffic, and explore process behavior with MITRE ATT&CK mappings.
Core Philosophy
"Stop treating malware analysis like a batch job. Start treating it like a live investigation." Traditional sandboxes (Cuckoo, CAPE) produce reports after the fact. Naga delivers live streaming of the entire detonation process, allowing analysts to:
React immediately to suspicious behavior
Intercept and explore network traffic in real-time
Visualize process relationships as they form
Understand why something happened, not just what happened
Key Features
Docker-wrapped deployment — one command to spin up the entire platform
Automatic VM lifecycle management: create, detonate, destroy, revert to clean state
Transparent mitmproxy integration with automatic certificate injection
Certificate inspection and validation details in the UI
Video recording saved for post-analysis review
WebSocket-based streaming with minimal latency
Tool Purpose Suricata Network intrusion detection — alerts on malicious patterns YARA Signature-based file scanning — detect known malware families CAPA Capability detection — identify what malware can do MITRE ATT&CK Tactical mapping — tag behaviors with industry-standard TTPs
Full parent-child process relationships
MITRE ATT&CK tags automatically applied to suspicious processes
Hover for details: PID, command line, detected techniques