Learn about the wide range of file types available for analysis and how to interpret submitted file results in this VMRay Fast Track Video.
Today, threat actors are developing malware to exploit the major shortcomings in traditional sandbox technology. With an agentless, hypervisor-based monitoring approach, VMRay provides security teams with a truly evasion resistant solution by seeing every threat without being seen.
Manual interaction allows incident response teams to scrutinize suspect files, URLs, and snippets of code that have either raised a cautionary flag or completely evaded detection by automated methods. In manual mode, analysts can directly interact with suspicious samples.
In this Malware Analysis Spotlight, the VMRay Labs Team will examine Paymen45 Ransomware, a new ransomware strain first identified around April 2020. For this analysis, we will analyze a sample of Paymen45 Ransomware first seen in the wild on May 11th, 2020.
In this analysis, the VMRay Labs Team examines the behavior of Rhino Ransomware (first identified in April 2020). This sample was found by Twitter user @GrujaRS on May 4th.
Subscribe to the VMRay Newsletter
Website designed and developed by Raincastle Communications, Inc.