Build your malware & phishing defenses on facts. Not fiction.

Faster investigations, higher-confidence verdicts, and in-depth evidence that add clarity to your SOC, CERT and CTI workflows.

Use the the most powerful threat analysis and detection platform against novel, targeted and evasive threats.

Download CSVs (All IOCs)
Download STIX 2.1 (All IOCs)

Sandboxing reinvented – enables your SOC, CERT, and CTI team to reach their full potential

Because your SOC, CERT & CTI team are only as good as the data they get.

Accelerate analysis & response

96% faster malware analysis

Empower automation & AI tools

Payback in 6 months

Complete your threat intel

Based on unique insights

Fuel your SOC, CERT and CTI insights
with accurate data across all use cases

Detect and analyze novel, targeted, and evasive malware and phishing threats 
with sandbox-based and AI-assisted analysis solutions.

From analysis to automation to intelligence: Power the workflows that matter with facts, not fiction.

Recent examples of novel, zero-day malware or phishing threats that we found earlier than most others.

January 2026

Top 5 Malware Families

  1. XMRig
  2. Mirai
  3. XWorm
  1. BlihanStealer
  2. ClearFake

Recent zero-day malware detections

Live Updates

Threat Name
Category
Detection
Sandbox Bypass
Summary
Actions
AgentTesla
SHA256: 50ad7...
Injector/Spyware

VMRay

Other Vendors

VM Detection, Sleep Timers
This script contains an AES-encrypted, Base64-encoded blob that unfolds into a .NET injector.
Hacktool
SHA256: a62be...
Shellscript compiler

VMRay

Other Vendors

Mouse Movement, Process Injection
0 detections on VirusTotal by the time of our detection
XMRig
SHA256: 540f1...
Miner

VMRay

Other Vendors

Environment Detection, API Hooks
Backdoored configuration script waits until user is inactive (!) to run Linux
KematianStealer
SHA256: c8721...
Stealer/Spyware

VMRay

Other Vendors

Mouse Movement, Process Injection
Malicious batch file reveals full behavior only when it's started by a double-click
ValleyRAT
SHA256: 4ceb4...
Backdoor

VMRay

Other Vendors

Mouse Movement, Process Injection
0 detections on VirusTotal by the time of our detection
Xworm
SHA256: 96cc0...
Downloader/Spyware

VMRay

Other Vendors

Mouse Movement, Process Injection
Heavily obfuscated batch file loads XWorm hosted on GitHub
Learn more about the treat landscape from our latest Threat Detection Highlights webinars

Seamlessly integrate with your security stack

Boost the value of your existing security solutions by bring the power of the most advanced threat detection and analysis platform ito your EDR, XDR, SIEM, SOAR and TIP with connectors or rest API.

Proven results for enterprises and governments

Helping the most demanding security teams across tech, finance, government, automotive, and beyond protect their organizations and achieve lasting results.

Trusted by industry leaders

See how organizations worldwide have transformed their security operations with VMRay.

Expel

Precision, clarity, and efficiency: 
How Expel uses VMRay against malware and phishing

Northwestern Mutual

How Northwestern Mutual reduced threat investigation time 
from 24 hours to minutes with VMRay.

A Global Tech Enterprise

Unlocking automated Threat Intelligence: A global tech leader’s transformative journey with VMRay

What our clients say about us

Hear directly from our customers how VMRay empowers their teams to detect, respond, and stay ahead of threats.

Fueling the AI-Enabled SOC
with High-Fidelity Threat Intelligence

AI

Uses advanced AI to stay ahead of emerging threats.

Deployment options

Flexible deployment on-prem or in the cloud to fit any environment.

ROI

Delivers strong ROI by lowering risk & reducing operational effort.

🚀 Meet UniqueSignal: empower your security operations with precise and actionable threat intelligence!