Defeat Evasive Malware

Get the whitepaper

3 ways malware evades analysis

For malware analysis to truly be effective, Incident Responders and Malware Analysts need to have confidence that they are getting full, accurate results during sandbox analysis. Malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.
Our researchers have examined in detail these 3 approaches used to evade analysis. By reading this whitepaper you’ll gain a better understanding of evasion techniques that:

ACTIVELY DETECT THE ANALYSIS ENVIORNMENT

EXPLOIT SANDBOX WEAKNESSES

USE TIME, EVENT OR ENVIRONMENT BASED TRIGGERS

This whitepaper is based on the work of our research team, led by our co-founders, two pioneering experts in the field of dynamic binary analysis.

Dr. Carsten Willems

Co-Founder

Dr. Ralf Hund

Co-Founder

Tech Insights Deep Dive of April:
Detection Strategies & Operational Excellence

join VMRay for two powerhouse webinars designed to sharpen your threat detection and response capabilities — featuring a special joint session with Red Canary:

Live session's over. Watch the on-demand video to learn how VMRay and Red Canary combine forces to deliver faster, smarter threat detection!

Learn how to cut phishing triage time with automated detonation and deep analysis — quickly uncover threats while improving response accuracy!