How Malware Evades Sandbox Analysis

Malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.

Learn More

How VMRay Analyzer Works

See how our agentless hypervisor-based monitoring approach analyzes and detects threats that other approaches can’t.

More videos

Blog

404 Error Page Hides RAMNIT.A Worm in the Source Code

Malware Family: Win32/Ramnit Hash Values MD5: 089dc369616dafa44a9f7fefb18e8961 SHA1: c4a2430634b7ca7427d2c055dbbb1fb8cd42a285 SHA256: 4ebafa2738f11d73d06dddf18ce41cf 02c6913f431f2b383f7abaa0d04419f2f View the Full RAMNIT.A Worm Analysis Report Most of the time, links aren’t dangerous without user interaction. Recently, we discovered an innocent-looking link for a JPG picture that prompts a user to activate ActiveX on IE. Leveraging a social engineering technique, if the user […]

Read More “404 Error Page Hides RAMNIT.A Worm in the Source Code”

VMRay Analyzer Identifies Resume Containing Evasive Malware

Recently, we received a seemingly innocuous job application with an attached Word document called “resume.doc”. Let’s take a closer look at the malicious behavior embedded in this fake resume. Upon uploading the Word doc into VMRay Analyzer, the signature was sent to our built-in reputation service, where the file hash was queried against known malicious […]

Read More “VMRay Analyzer Identifies Resume Containing Evasive Malware”

‘Close Enough’ Doesn’t Count in Cyber Security

Even though enterprises spend millions every year on information security they still remain vulnerable to persistent cyber criminals in a world where cybercrime like ransomware is pervasive. Organizations cannot afford to do the “bare minimum” when it comes to threat analysis. As the saying goes, ” ‘close enough’ only counts in horseshoes and hand grenades” and not in […]

Read More “‘Close Enough’ Doesn’t Count in Cyber Security”

See all posts