Tyler Fornes, a Senior Security Analyst at Expel, explains how his team uses key features of VMRay Analyzer to quickly analyze suspicious or malicious files that have been identified in a client’s environment.
In VMRay Analyzer v2.3, we’ve continued to bolster the performance with a static analysis engine, which will complement the existing dynamic analysis and reputation engines and support an even higher analysis throughput.
Countering Innovative Sandbox Evasion Techniques Used by Malware Watch VMRay co-founder, Dr. Carsten Willems' presentation at Secure Early Bird in Poland on the techniques malware authors use to evade sandbox detection. In Carsten's presentation, he discusses the three primary sandbox evasion techniques and how DFIR specialists can deal with them.
VMRay Analyzer: The Power of an Agentless Approach Understand the power of VMRay Analyzer's agentless approach to dynamic malware analysis. VMRay Analyzer embeds all monitoring in the hypervisor while using real Windows images as target machines, allowing for rapid threat detection and evasion resistance with every analysis.
In v2.1 of VMRay Analyzer users have access to several hundred built-in YARA rules to bolster detection efficacy. With built-in YARA rulesets and a built-in reputation engine to complement its best-in-class hypervisor-based detection, VMRay Analyzer provides the right combination of signature-based and dynamic analysis techniques for malware detection.
Using the VMRay App for Phantom, we demonstrate with a simple playbook how VMRay and Phantom help to protect organizations from malicious email. This video post details the automatic scanning of emails received by an organization and forwarding any file attachments to VMRay’s agentless hypervisor-based sandbox for analysis.