Enterprise-Grade Malware Detection & Response System
Version 2.0.0 | Copyright Β© 2025 MalDestruct Project
MalDestruct is a comprehensive, enterprise-grade antivirus and malware detection system designed to protect Windows systems from modern threats. Built with C++ and Qt, it combines real-time monitoring, behavior analysis, and automated response capabilities in a sleek, cyber-inspired interface.
- Real-time Process Monitoring - Continuous scanning of running processes and modules
- SHA256 Hash Verification - File integrity checks with hash-based detection
- VirusTotal Integration - Cloud-based threat intelligence via VirusTotal API
- Behavior-Based Heuristics - Detect suspicious API calls and encryption patterns
- Registry & Startup Scanning - Identify persistence mechanisms
- Memory Dump Analysis - Advanced in-memory threat detection using MiniDumpWriteDump
- Automatic Quarantine - Isolate suspicious files with secure storage
- Kill Chain Isolation - Terminate processes and block network access
- Service Rollback - Restore registry and startup configurations
- Network Blocking - Firewall integration for IP and process-level blocking
- Process Tree Termination - Eliminate entire malware process families
- Dual-Format Logging - JSON and text logs for flexibility
- Real-Time Event Tracking - Comprehensive activity monitoring
- Summary Reports - Detailed reports with timestamps, PIDs, and actions
- Remote Log Sync - Secure SFTP/TLS synchronization
- Alert Notifications - Email, webhook, and syslog integration
- YAML/JSON Configuration - Easy customization of scan intervals, whitelists, and alerts
- Whitelist System - Signature-based exclusions to prevent false positives
- TLS-Based Updates - Secure, self-updating threat database
- Tamper Protection - Safeguard critical system components
- Dark Cyber Aesthetic - Black background with neon blue/green highlights
- Dashboard - System status, statistics, and recent detections
- Process Monitor - Live feed of running tasks with CPU/RAM usage
- Threat Logs - Interactive detection history with filtering
- Quarantine Manager - View, restore, or delete isolated files
- Settings Panel - Configure all system parameters
- System Tray Integration - Background protection with quick access
MalDestruct ships with comprehensive malware signatures from legitimate security sources:
- 20+ Threat Families including:
- π΄ WannaCry (CVE-2017-0144)
- π΄ Petya/NotPetya (CVE-2017-0199)
- π΄ Locky Ransomware
- π΄ Ryuk Ransomware
- π΄ REvil/Sodinokibi
- π΄ Maze, Conti, LockBit
- π΄ Emotet, TrickBot, Zeus Trojans
- π‘ XMRig Cryptominer
- π Agent Tesla, FormBook Spyware
- β« TDL4, ZeroAccess Rootkits
Sources: CVE Database, OWASP, MalwareBazaar, CISA, Hybrid Analysis, FBI Reports, Europol Operations
- Windows 10/11 (64-bit)
- Qt 6.x
- CMake 3.20+
- MSVC 2019+ or MinGW-w64
- Administrator privileges (for full functionality)
# Clone repository
git clone https://github.com/yourusername/MalDestruct.git
cd MalDestruct
# Create build directory
mkdir build
cd build
# Configure with CMake
cmake .. -G "Visual Studio 17 2022" -A x64
# Or for MinGW:
# cmake .. -G "MinGW Makefiles"
# Build
cmake --build . --config Release
# Install
cmake --install . --prefix "C:/Program Files/MalDestruct"Console Version:
cd bin
MalDestruct_Console.exeGUI Version:
cd bin
MalDestruct_GUI.exe- Run
MalDestruct_Console.exewith administrator privileges - Choose from the main menu:
- Quick Scan - Fast process scanning
- Full Scan - Comprehensive system analysis
- Real-Time Protection - Background monitoring
- View Threat Database - Browse signatures
- Quarantine Manager - Manage isolated files
- Registry Scan - Check for persistence
- Generate Report - Export scan results
- Settings - Configure behavior
-
Launch
MalDestruct_GUI.exe -
Navigate using the sidebar:
- Dashboard: Monitor system status and statistics
- Process Monitor: View and manage running processes
- Threat Logs: Review detection history
- Quarantine: Manage isolated threats
- Settings: Configure protection settings
- About: System information
-
Real-Time Protection: Toggle the green button on the dashboard
-
Quick Scan: Click "β‘ QUICK SCAN" for instant process analysis
-
System Tray: Minimize to tray for background protection
Edit maldestruct.conf:
[Scanning]
scan_interval=60
realtime_protection=true
behavior_analysis=true
auto_quarantine=true
[VirusTotal]
vt_enabled=true
vt_api_key=YOUR_API_KEY_HERE
[Alerts]
email_alerts=true
email_recipient[email protected]
webhook_alerts=true
webhook_url=https://your-webhook-url.com- Run as Administrator: Full functionality requires elevated privileges
- Whitelist Critical Processes: System processes are whitelisted by default
- VirusTotal API: Keep your API key secure
- Auto-Terminate: Use with caution; may affect system stability
- Quarantine Retention: Configure retention periods appropriately
MalDestruct/
βββ include/ # Header files
β βββ ThreatDatabase.h
β βββ DetectionEngine.h
β βββ ResponseEngine.h
β βββ Logger.h
β βββ Config.h
βββ src/ # Implementation files
β βββ ThreatDatabase.cpp
β βββ DetectionEngine.cpp
β βββ ResponseEngine.cpp
β βββ Logger.cpp
β βββ Config.cpp
β βββ main_console.cpp
βββ gui/ # Qt GUI
β βββ MainWindow.{h,cpp}
β βββ DashboardWidget.{h,cpp}
β βββ ProcessMonitorWidget.{h,cpp}
β βββ ThreatLogsWidget.{h,cpp}
β βββ QuarantineWidget.{h,cpp}
β βββ SettingsWidget.{h,cpp}
β βββ AboutWidget.{h,cpp}
β βββ main_gui.cpp
βββ CMakeLists.txt # Build configuration
βββ maldestruct.conf.default
βββ README.md
MalDestruct::ThreatSignature customThreat = {
L"CustomMalware",
"Description of the threat",
MalDestruct::ThreatType::RANSOMWARE,
MalDestruct::ThreatLevel::CRITICAL,
{L"malware.exe", L"badfile.exe"}, // Process names
{"sha256hash1", "sha256hash2"}, // Hashes
{}, // MD5 hashes
{L"HKEY_...", L"HKEY_..."}, // Registry keys
{L"C:\\Path\\To\\File"}, // File paths
"CVE-XXXX-XXXXX", // CVE reference
"Your Source", // Source
"2025-01-01", // Date
{"API1", "API2"} // Behavior patterns
};
ThreatDatabase::getInstance().addCustomSignature(customThreat);- Process Scanning: ~100-500 processes/second
- Hash Calculation: ~50-200 MB/second
- Memory Usage: ~50-150 MB (idle), ~200-500 MB (active scanning)
- CPU Usage: <5% (idle), 10-30% (active scanning)
We welcome contributions! Please:
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Open a Pull Request
This software is provided "as is" without warranty of any kind. Enterprise Edition - All Rights Reserved
- Threat Intelligence: CVE, OWASP, MalwareBazaar, CISA, Hybrid Analysis
- UI Framework: Qt Project
- Fonts: Orbitron, Rajdhani (Google Fonts)
- Icons: Material Design Icons
- Documentation: docs.maldestruct.io
- Issues: GitHub Issues
- Email: [email protected]
π‘οΈ Stay Protected. Stay Secure.