No, Word doc isn’t an invoice and I didn’t order the poodle hair trimmer. A lot of malware our customers see on a daily basis with VMRay Analyzer come in the form of malicious email attachments, mostly Office or PDF files. Of course, we use VMRay Analyzer to analyze and protect our own email traffic and -sometimes- to […]READ MORE
Automated browser exploit analysis in VMRay – a detailed look Analyzing browser exploits in a sandbox can be a laborious task and it poses several challenges. One of the most demanding hurdles is deciding what particular parts of the software stack to monitor. The naive approach of monitoring all related browser processes thorougly results in tons of data, diluted […]READ MORE
by: Dr. Carsten Willems November 9, 2015
Using Processor Trace feature to uncover hidden functionality during malware analysis In this blog post we give an overview of Intel’s new processor feature called Processor Trace and describe how it can be applied to enhance our 3rd generation threat detection technology. We outline the integration of Processor Tracing into VMRay Analyzer for identifying and triggering hidden functionality of […]READ MORE
Editor’s Note: This post was updated on February 6, 2018. VM Detection – passing the Pafish test Paranoid Fish (pafish) is a tool for detecting malware analysis environments, replicating what malware will do in the wild to detect if it is being analyzed. It comes with a number of generic and specific checks to reveal the presence of […]READ MORE
Website designed and developed by Raincastle Communications, Inc.