Phishing is a widespread form of social engineering attack aimed at stealing sensitive data such as login credentials, payment information, or personal details. Attackers impersonate trusted entities to deceive victims into opening emails, messages, or links that may lead to malware installation, ransomware, or data exposure. These attacks have become increasingly sophisticated, making detection and prevention critical.
Suspicious is a web application designed to support this need by providing automated analysis of potentially malicious content. It allows users to submit and investigate different types of data, including:
- Emails (MSG /EML format)
- Files (PDF, DOC/DOCX, XLS/XLSX, EXE, MSI, HTML, ZIP, etc.)
- IP addresses
- URLs
- Hashes
- Users send a suspicious email as an attachment to the dedicated address (e.g.,
[email protected]). - The system splits the submission into individual components (headers, body, attachments, links, etc.).
- Each component is analyzed using Cortex analyzers (external APIs and rulesets such as YARA).
- Results are aggregated, scored, and classified.
- The frontend provides users with access to reports, detailed analysis, and final conclusions.
- Using the configured SMTP server it sends back a quick report / answer to the User
- Users goes to the web platform and uses the
Submit an Itempage to send an Item to analyze (File, IP, Url, Hash) - If the Item is an MSG or EML File, the system splits the submission into individual components (headers, body, attachments, links, etc.).
- Each component is analyzed using Cortex analyzers (external APIs and rulesets such as YARA).
- Results are aggregated, scored, and classified.
- The frontend provides users with access to reports, detailed analysis, and final conclusions.
Based on the analysis score, submissions are categorized into four levels:
- Dangerous – Cannot be opened; content must not be trusted.
- Suspicious – Should not be opened; content is risky.
- Inconclusive – Can be opened, but content should not be trusted.
- Safe – Can be opened; content is considered trustworthy.
Suspicious is designed as a modular and containerized web application that can be deployed easily using Docker.
The core application is built with Django (Python), ensuring flexibility, maintainability, and straightforward setup.
A database is mandatory for the application to run, while additional services can be integrated to enhance its capabilities.
- Database (MySQL, MariaDB, or PostgreSQL) – Stores submissions, reports, and analysis results.
- Elasticsearch – Provides fast and efficient search capabilities across stored data.
- StrangeBee's Cortex – Executes analyzer jobs for processing emails, files, IP addresses, and URLs.
- MinIO S3 – Handles object storage for uploaded files and extracted artifacts.
To install Suspicious, please review our CONFIG.md and SETUP.md
Contributions are welcome! If you'd like to contribute to Suspicious, please review our CONTRIBUTING.md guidelines for information on our development process, coding standards, and how to submit pull requests.
Suspicious is licensed under the GNU AFFERO GENERAL PUBLIC License. For more details, see the LICENSE file.
For questions, feedback, or support, please open an issue on GitHub