Our updated Sandbox (ver. 3.0): “The Matrix for Malware”.
#1
Exclamation 
Quote:Something important has happened – though you might have missed it…

The third version of our Research Sandbox has been released!

Hmm. Hardly jaw-dropping, right? But it still matters – big time. Let me tell you why…

What is it?

What’s a sandbox? Let me start with the very basics…

How can you tell if an object (file, web resource…) is malicious? The simplest way is to run it and see what happens. If it steals passwords and card data or encrypts files and demands a ransom – there you go: it’s malicious. But “sucking it and seeing” is hardly a great idea given the damage such infections/encryption can wreak.

To safely test a suspicious object in a controlled environment, we created a sandbox – a sort of virtual petri dish where malware can reveal its true malicious colors while we observe it under a microscope.

[Image: main-view-with-VNC-running.png]
 
Static and dynamic analysis

Now for some details on how we analyze an object in the Sandbox. First, it can perform static analysis – disassembling the object, looking at what’s inside, identifying connections, analyzing the file structure, and comparing all this against our reputation-database information and detection rules; searching for known threats, and identifying potentially suspicious features, etc.

[Image: static-analysis.png]

Now for the dynamic analysis…

The Research Sandbox can act as a “Matrix” (yes – the one with Neo and Morpheus, not the kinds used in printing or math) for the object – a world where it can live its “normal life”. From the perspective of the running file (script, webpage), the Sandbox appears to be a regular workstation.

Meanwhile, the bad guys are getting forever smarter. They’re constantly getting better at identifying artificial environments and then tricking them.

[Image: report.png]

But back to our Sandbox being like a “Matrix for malware”…

We’ve got cutting-edge technology like a robust event-logging system, and it’s all deeply embedded within the virtual OS and virtualization system layers that malware can’t access. And yes, a real-world workstation environment is also simulated. Files open and close, processes start and stop, the user browses documents, and shops for a robot vacuum on a marketplace, and complains about low pay in a messenger (just kidding, any details on how it works can be provided upon request).

Continue Reading...
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Adobe Acrobat Reader DC 2026.001.21529
Adobe Acrobat Read...harlan4096 — 09:58
AxCrypt 3.0.0.90
AxCrypt 3.0.0.90: ...harlan4096 — 06:27
Microsoft Edge 147.0.3912.98
Version 147.0.3912...harlan4096 — 06:26
Google Chrome 147.0.7727.137/138
Google Chrome 147....harlan4096 — 06:22
Rufus 4.14
Rufus 4.14 (stable...harlan4096 — 06:19

[-]
Birthdays
Today's Birthdays
avatar (74)divinenews
avatar (51)plajhunTat
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (38)owysykan
avatar (49)beautgok
avatar (39)axuben
avatar (45)talsmanthago
avatar (31)mocetor
avatar (46)piomaibhaict
avatar (51)kingbfef
avatar (38)izenesiq
avatar (45)centfootadoni
avatar (40)ihijudu
avatar (45)tiojusop
avatar (42)Damiennug
avatar (40)acoraxe
avatar (49)contjrat
avatar (41)axylisyb
avatar (44)tukrublape
avatar (41)iruqi
avatar (42)saitetib
avatar (36)ypasodiny
avatar (39)omapek
avatar (48)Geraldtuh
avatar (44)knigiJow
avatar (46)1stOnecal
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (45)xclubDum
avatar (41)Stewartanilm
avatar (44)nikitaxople
avatar (40)GregoryRog
avatar (45)mediumog
avatar (40)odukoromu
avatar (46)Joanna4589
avatar (28)Honor6

[-]
Online Staff
There are no staff members currently online.

>