VMRay. Agentless Threat Analysis & Detection.
100% Total Detection Efficacy Against In-the-Wild Malware
Find out why MRG and Ukatemi concluded that VMRAy Analyzer is a must-have for DFIR professionals and an essential tool for CERTs.
SANS Webcast: How Automated Analysis Turns Threat Data into Threat Intel
Join VMRay co-founder Carsten Willems and senior SANS instructor Dave Shackleford to learn how automated threat analysis is the key to turning millions of raw data points into actionable intelligence.
Built-In YARA Rulesets for Increased Efficacy and Classification
YARA is an open source tool that helps malware researchers identify and classify malware by family based on known binary patterns and strings. YARA works by ingesting rules and applying them against various elements of the analysis (such as files and registry keys) to flag potentially malicious files and processes. Signature-based detection with YARA rulesets has its […]
Petya/NotPetya/ExPetr Cyber Attack is More Wiper Than Ransomware
Malware Family: (Not)Petya Hash Value SHA256: 027cc450ef5f8c5f653329641ec1fed 91f694e0d229928963b30f6b0d7d3a745 View the Full Petya Analysis Report According to Microsoft, the Petya (also referred to as NotPetya/ExPetr) Ransomware attack started its initial infection through a compromise at the Ukrainian company M.E.Doc, a developer of tax accounting software. We took a closer look and did a full analysis using VMRay […]
404 Error Page Hides RAMNIT.A Worm in the Source Code
Malware Family: Win32/Ramnit Hash Values MD5: 089dc369616dafa44a9f7fefb18e8961 SHA1: c4a2430634b7ca7427d2c055dbbb1fb8cd42a285 SHA256: 4ebafa2738f11d73d06dddf18ce41cf 02c6913f431f2b383f7abaa0d04419f2f View the Full RAMNIT.A Worm Analysis Report Most of the time, links aren’t dangerous without user interaction. Recently, we discovered an innocent-looking link for a JPG picture that prompts a user to activate ActiveX on IE. Leveraging a social engineering technique, if the user […]
“Cloudmark customers and partners around the world count on us to secure their email, ensuring that threats are identified and blocked. Our team looked extensively at what the industry had to offer for automated in-depth dynamic malware analysis, and we chose VMRay as a vendor and technology we could trust. VMRay Analyzer provides the accuracy, performance and depth of analysis we require to meet our customers’ expectations.”
Angela Knox, SVP of Engineering, Cloudmark
“SonicWall Capture Advanced Threat Protection Service incorporates the VMRay third-generation Analyzer threat detection analysis engine, supporting SonicWall’s ability to deliver a first-to-market, adaptive, multi-engine sandboxing approach that enhances organizations’ ability to safeguard against today’s shape-shifting cyber threats.”
Dmitriy Ayrapetov, Executive Director, Product Management, SonicWALL
“VMRay has become one of the most important tools for our security team. We use it to analyze malware and also for system level hardening against common malware. We significantly reduced the time and effort needed for malware analysis.”
Adem Sen, CSIRT Lead, DB Systel GmbH (Deutsche Bahn)
“Carbon Black’s customers are targeted by some of the most evasive and advanced malware around. When analyzing a new threat, our team uses VMRay Analyzer to provide deep analysis and insights that surpass what we’ve seen from other sandboxing technologies.”
Paul Drapeau, Principal Security Researcher, Carbon Black
“We wanted a solution that could scale and easy to configure, manage and update for different types of malware. VMRay Analyzer was much easier to manage. It captured behavioural information to the depth and breadth that we needed. It was user-friendly, easy for our team to get up and running quickly. It captures a richer set of information than many other sandbox solutions and was easy for us to build upon.”
Large Enterprise Security Vendor