Get Hands-On With VMRay

Try the smartest, stealthiest malware
analysis and detection platform for 30-days.

We’ve Already Solved Your Toughest Malware Challenges

Defeating evasive malware

Getting full visibility
into malware behavior

Reducing attacker dwell time

Scaling security without compromise

VMRay Analyzer Core Capabilities & Features

VMRay supports all major formats on Windows and macOS operating systems for Office documents, scripts, archives, drivers, executables as well as URLs. We are constantly expanding the range of file types supported as malware authors seek new infection vectors by leveraging obscure and outdated formats.

VMRay automatically generates IOCs with every analysis. Going beyond other sandbox analysis we apply VMRay Threat Identifier (VTI) rules to flag and score artifacts and determines which qualify as “true” IOCs.

The entire MITRE ATT&CK framework is mapped to VMRay Threat Identifiers (VTIs). This allows security teams to understand the scale and impact of an incident fast, leading to actionable mitigation measures.

Manually interact with the sandbox during the analysis runtime using a built-in VNC viewer.

VMRay offers customers a choice of where their data resides: in the US or the EU.

Hands-free features include simulated user interaction and automatic reboot to trigger malicious behavior.

VMRay’s GDPR compliance and ISO27001 certification provide multiple safeguards to the substantial protections already built into our solutions. We allow customers to create a completely isolated environment for analyzing advanced malware threats, without the risks posed by open-source tools and services.

Because of VMRay’s hypervisor-based monitoring technology provide security teams with evasion resistant analysis environments out-of the box. Security teams will have the ability to:

  • Match analysis environment to the real-world
  • Set Golden Images and Localization
  • Remain undetectable by malware
  • Analyze with multiple techs 360 degrees

VMRay detects a wide-range of phishing techniques including: credential-harvesting, drive-by download, file sharing web apps, HTML attachments, and safelinks.

Detect geo-location evasion techniques. VMRay provides analysts the ability to choose an exit node from a list of over 40 countries when they submit a sample.

Website designed and developed by Raincastle Communications, Inc.