VMRay Blog

Stay current on the threat landscape with industry-leading cybersecurity insights!

Today organizations of all sizes now become targets of cyber threats There is always the ominous risk that cybercriminals can gain access to an organization s network which is still despite all efforts of moving data to the cloud the central backbone of many organizations infrastructure Once an attacker is

Introduction In this Malware Analysis Spotlight we will take a look at a phishing attempt targeting customers of the popular US based bank Chase We discovered the URL of the phishing page at the end of March 2021 and found several similar pages The phishing page uses JQuery and Ajax

Introduction In this Malware Analysis Spotlight we ll share our research about a phishing kit that was used at the end of March to steal banking information of Polish users of the OnLine eXchange OLX trading platform We are referring to the phishing kit as Blackhat Coder based on the

Introduction In this Malware Analysis Spotlight we ll share our research about a phishing kit that was used at the end of March to steal banking information of Polish users of the OnLine eXchange OLX trading platform We are referring to the phishing kit as Blackhat Coder based on the

Hancitor can be grouped into the category of downloaders that are often responsible for delivering further malware families into a compromised network Recently it has been observed delivering the Ficker Stealer Cobalt Strike and the Cuba ransomware among others It is usually distributed to the victim via malicious spam campaigns

Agent Tesla is a spyware that has been around since 2014 It s in active development constantly being updated and improved with new features obfuscation and encryption methods The malware is sold as a service with a relatively cheap licensing model which makes it particularly easy to use and can

This blog post introduces VMRay s novel technique for TLS traffic decryption which is implemented in the hypervisor without any modifications to the virtual machine This approach doesn t modify the traffic like Man in the Middle based decryption that sandboxes typically use and doesn t come with the restrictions

With the release of version 4 0 last year the VMRay Platform took a huge leap forward and further solidified itself as the preeminent software for SOC and CERT teams that need automated analysis and detection of advanced threats Version 4 1 further rounded out the offering with incremental yet

In this Malware Analysis Spotlight we will assume the role of a threat researcher tasked with analyzing categorizing and classifying an unknown malicious sample We will analyze the unknown sample in a malware sandbox to jumpstart the process Our unknown sample in this Spotlight is the information stealer Raccoon also
When malware source code is leaked into the wild opportunistic malware authors will often be quick to analyze and repurpose the code to create new variants of their own malware providing another avenue for them to escape detection This post condensed from a SANS webcast featuring SANS Analyst Jake Williams
Vmray threatfeed

Latest Malware Analysis Reports

Get The Latest Update

Subscribe to our newsletter

Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!