Analyzing Malware | VMRay Platform Fast Track


In this video, we’ll observe a known ransomware file’s behavior with the help of VMRay Analyzer. To get a better understanding of what makes it malicious, we will show you the key elements of the VMRay Analyzer Report:

VMRay Threat Identifiers (VTIs)
Monitored Processes
Indicators of Compromise (IOCs)
VTIs identify behavioral patterns that may indicate a threat and are scored on a scale of one to five, five being the most malicious.

In the IOC tab, you can see that IOCs are assigned a verdict, separating out irrelevant artifacts so you only see the information that matters.

In our next VMRay Platform Fast Track video, we will show you how to analyze URLs.


Covered in The Webinar

About The Speakers

Explore Valuable Cybersecurity Resources

User Reported Phishing:
How it Works

Download this eBook and learn how VMRay can help speed incident response with automated phishing triage and analysis.

Advanced Sandboxing: Supercharging your SOC

Watch this webinar and learn expert strategies for extracting IOCs, using YARA rules, and boosting perimeter security with STIX.

Defeating Anti-Sandbox Evasion Checks

Download our solution brief to learn how to stay ahead of advanced malwares’ tricks and ensure zero-day threats catch.