VMRay. Agentless Threat Analysis & Detection.
Behind Enemy Lines
In this webcast VMRay’s Co-Founder Carsten Willems and Forrester’s Principal Analyst, Jeff Pollard give an inside look at the techniques (TTPs) used by threat actors to design evasive malware.
100% Total Detection Efficacy Against In-the-Wild Malware
Download MRG Effitas’ assessment of VMRay Analyzer against 60 in-the-wild malware samples, 10 different sandbox evasion techniques and 17 custom malware samples.
Cutting Through the Noise
Learn how automated threat analysis can turn millions of raw data points into actionable intelligence in our webcast featuring co-founder Carsten Willems and SANS Sr. Instructor Dave Shackleford.
VMRay Analyzer Rated 5-Stars
“VMRay Analyzer is a powerful, moderately easy to use, reasonably-priced tool for analysts who don’t want to do manual analysis but want the benefit of full information.”
Agentless Detection – Locard’s Exchange Principle Applied to Cybersecurity
Marketing departments of Cybersecurity vendors around the globe go into overdrive when they can shout from the rooftops that their solution is ‘agentless’. Sure, that sounds good, but why is this so important? And what is truly agentless? To appreciate the importance of an agentless approach, we’ll go old school and invoke Locard’s Exchange Principle . […]
Poweliks Malware – Filelessly Persistent
Malware Family: Poweliks Hash Value SHA256: 4727b7ea70d0fc00f96a28de7fa3d97fa 9d0b253bd63ae54fbbf0bd0c8b766bb View the Full Poweliks Malware Analysis Report One of the key features released in VMRay Analyzer v2.1 is the enhanced analysis of fileless malware (also referred to as “non-malware”). Fileless malware is defined by malware analysis expert Lenny Zeltser as “..malware that operates without placing malicious executables on the file system.” An important […]
Password Protected Word Document Connects to TOR Hidden Service
Hash Value SHA256: 3a813df1c8f1e835cc98dd60b799c64e61 db51a259ee30b7235004ccb3c9df64 View the Full Password Protected Word Document Analysis Report Password protected documents are an effective method for malware to bypass anti-virus (AV) and other detection solutions. Typically the AV will not be able to parse the password required from the text of the email used to send the malicious document. […]
With VMRay’s capabilities we can provide faster answers when customers ask, ‘What should I do right now to contain the damage and get rid of the malware while also ensuring it doesn’t come back next week or next month?
Tilman Frosch, Managing Director, G DATA Advanced Analytics
“Cloudmark customers and partners around the world count on us to secure their email, ensuring that threats are identified and blocked. Our team looked extensively at what the industry had to offer for automated in-depth dynamic malware analysis, and we chose VMRay as a vendor and technology we could trust. VMRay Analyzer provides the accuracy, performance and depth of analysis we require to meet our customers’ expectations.”
Angela Knox, SVP of Engineering, Cloudmark
“SonicWall Capture Advanced Threat Protection Service incorporates the VMRay third-generation Analyzer threat detection analysis engine, supporting SonicWall’s ability to deliver a first-to-market, adaptive, multi-engine sandboxing approach that enhances organizations’ ability to safeguard against today’s shape-shifting cyber threats.”
Dmitriy Ayrapetov, Executive Director, Product Management, SonicWALL
“VMRay has become one of the most important tools for our security team. We use it to analyze malware and also for system level hardening against common malware. We significantly reduced the time and effort needed for malware analysis.”
Adem Sen, CSIRT Lead, DB Systel GmbH (Deutsche Bahn)
“Carbon Black’s customers are targeted by some of the most evasive and advanced malware around. When analyzing a new threat, our team uses VMRay Analyzer to provide deep analysis and insights that surpass what we’ve seen from other sandboxing technologies.”
Paul Drapeau, Principal Security Researcher, Carbon Black