How Malware Evades Sandbox Analysis

Malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.

Learn More

How VMRay Analyzer Works

See how our agentless hypervisor-based monitoring approach analyzes and detects threats that other approaches can’t.

More videos


[Video] Analyzing a Malicious Microsoft Word Document

One of the key features in VMRay Analyzer 2.0 is the built-in reputation engine that identifies known malicious or known benign files in milliseconds. The addition of the reputation engine gives Incident Responders and Malware Analysts a powerful “One-Two” combination of rapid threat detection and detailed analysis of malware behavior. To illustrate the benefits of […]

Read More “[Video] Analyzing a Malicious Microsoft Word Document”

Malware Detection and Analysis: Delivering a Knockout Blow to Malware

In boxing, the “One-Two” combination is an essential component of a fighter’s arsenal. A left jab followed by a right cross is one the most effective combinations a fighter can unleash on his opponent. In the fight against malware, it’s just as important for Malware Analysts and Incident Responders to have a “One-Two” combination consisting […]

Read More “Malware Detection and Analysis: Delivering a Knockout Blow to Malware”

Analyzing Malware Embedded in MS Publisher Files

We have started to see malware authors use embedded Visual Basic (VBA) macros in many unconventional file types to attack hosts. In response to this trend, VMRay Analyzer V 2.0 now supports the analysis of Microsoft Access and Microsoft Publisher files. Support for analysis of new sample types means greater coverage of an attack surface […]

Read More “Analyzing Malware Embedded in MS Publisher Files”

See all posts