Knowledge is power
VMRay Analyzer is the 3rd generation in advanced threat detection. Read why hypervisor-based agentless monitoring for malware analysis and threat detection supersedes other approaches.
Learn how malware authors use 3 categories of techniques to conceal the real behavior of malicious files and evade analysis.
VMRay Analyzer provides out of the box integration with many leading technology vendors. Read about how VMRay integrates with ThreatConnect, a leading Threat Intelligence Platform (TIP) vendors, and Cloudlock (Cisco) for CASB (cloud platform) security.
We’ve published videos showing VMRay in action, as well as giving overviews of our technology and features.
Intro to VMRay Analyzer
An introduction to VMRay Analyzer and how our agentless hypervisor-based monitoring approach analyzes malware and detects threats that other approaches can’t.
Cryptolocker Ransomware Analysis with VTI scoring
We show an automated malware analysis in VMRay analyzer of Cryptolocker ransomware, highlighting how our VTI engine does automated threat scoring even for unknown malware undetected by AV.
VTI Custom Threat Scoring – Rule Creation
We show how to write a custom VTI rule to flag specific malware behavior and increase the threat score.
CryptoWall Analysis – Part 1: Overview
This video is Part 1 of 2, where we use VMRay’s hypervisor-based dynamic malware analysis to analyze a CryptoWall 2.0 variant.
CryptoWall Analysis – Part 2: Overview
In Part 2, we drill down into the details of a CryptoWall 2.0 ransomware variant using VMRay’s hypervisor-based dynamic analysis. In particular, we show the logs, hex dumps, network traffic (PCAP) and archive files.
A tour of the Wiper Malware
VMRay Analyzer can be used to automatically create detailed and comprehensive analysis of malware threats. To illustrate, we take a tour of the Wiper malware, that may have been involved in the Sony breach.