VMRay x SANS Case Study: Malware Family Analysis


When malware source code is leaked into the wild, opportunistic malware authors are often quick to analyze and repurpose the code to create new variants of their own malware, providing another avenue for them to escape detection. This post, condensed from a SANS webcast featuring SANS Analyst Jake Williams and VMRay Threat Analysis – Team Lead Tamas Boczan, discuss how leaked malware source code is co-opted and adapted by malware authors, explore new strategies for proactively identifying and mitigating new malware variants, and examine how to operationalize these source code leaks.


Find a recap of the full webcast here https://www.vmray.com/cyber-security-blog/challenges-tracking-new-malware-variants-source-code-leaks-recap/

Calculate how much malware false positives are costing your organization:
Malware False Positive Cost Calculator