Malware configurations contain the highest fidelity IOCs that are possible to automatically generate. These IOCs can be used for threat hunting or even blocking. The malware’s configuration includes all of its C2 addresses, and often other indicators such as registry keys, mutexes and filenames.
VMRay has been diligently working on expanding our best-in-class phishing threat detection with ML. The solution supplements already existing detections to catch even more unknown phishing pages which can otherwise fall through the cracks.
The out-of-box connectors with various security tools empowers SOC teams to automate the resource-intensive alert processing, threat analysis, malware investigation and false positive elimination tasks.
Detect threats that other security controls miss
Detect and respond faster with less effort
Unlock the full potential of your existing cybersecurity solutions
Manual analysis of a huge number of submissions was time-consuming. With VMRay, we are able to handle this task with ease in an automated way. This creates enormous value for our company, customers and partners.
VMRay’s data quality and rich API allowed us to automate our reverse engineering and data extraction tasks in a way no other vendor was able to provide.
What our team loves about VMRay is the ability to quickly triage a lot of malicious samples by providing a wide variety of targets, configurations and applications out of the box.
Autonomous Response to critical malware alerts
VMRay + Palo Alto Networks JOINT WEBINAR