Learn how to submit files and URLs to VMRay for analysis using the Anomali ThreatStream connector and automatically visualize the results in a single pane of glass.
Learn about the wide range of file types available for analysis and how to interpret submitted file results in this VMRay Fast Track Video.
Today, threat actors are developing malware to exploit the major shortcomings in traditional sandbox technology. With an agentless, hypervisor-based monitoring approach, VMRay provides security teams with a truly evasion resistant solution by seeing every threat without being seen.
Manual interaction allows incident response teams to scrutinize suspect files, URLs, and snippets of code that have either raised a cautionary flag or completely evaded detection by automated methods. In manual mode, analysts can directly interact with suspicious samples.
In this Malware Analysis Spotlight, the VMRay Labs Team will examine Paymen45 Ransomware, a new ransomware strain first identified around April 2020. For this analysis, we will analyze a sample of Paymen45 Ransomware first seen in the wild on May 11th, 2020.
Subscribe to the VMRay Newsletter
Website designed and developed by Raincastle Communications, Inc.