VMRay

@vmray

A Smarter, Stealthier Malware Sandbox | Imprint:

Vrijeme pridruživanja: studeni 2013.

Tweetovi

Blokirali ste korisnika/cu @vmray

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vmray

  1. prije 2 sata

    Save the date: Make sure to see VMRay Software Engineer, presentation “Dissecting Rotten Apples” at . Get an in-depth look at the macOS operating system from a malware analyst’s perspective. Register here:

    Poništi
  2. 4. velj

    [Hiring] If you have a passion for UX then this job is for you! This role will lead our user experience design and strategy. Apply today!

    Poništi
  3. 3. velj

    [Blog] Sandbox Evasion Techniques: Understanding Context Aware

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    ICYMI ... Listen in as shares how we dialed in our malware analysis pipeline using the Analyzer and .

    Poništi
  5. 30. sij

    [New Blog] 2020 Outlook: Evaluating the Threat Landscape at the Dawn of a New Decade. Featuring insights from our technology partners: , , and Cyberdefense.

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    EclecticIQ and are throwing a party and attendees are encourage to participate, enjoy some great food and drinks and relax from long conference days. Sign up at using the code RSA2020 before slots run out.

    Poništi
  7. 28. sij
    Prikaži ovu nit
    Poništi
  8. 28. sij

    Horton looked towards VMRay & They were in talks about a party, with food & some brew How fun! Horton thought – he was excited To network with his peers – they could all be united What do you say? Does this sound like fun? You better sign up now before it's all done!

    Prikaži ovu nit
    Poništi
  9. 27. sij

    SHA256:307020697b1a92e4e8bab760840f69c6e36dee04f5b24f371fd6679ba1853807

    Prikaži ovu nit
    Poništi
  10. 27. sij

    At the end of the analysis, VMRay Analyzer takes a memory dump of the sample before it terminates. In this unpacked binary, we can see Xorist string.

    Prikaži ovu nit
    Poništi
  11. 27. sij

    Xorist does not have a C2, and the key is hardcoded. To get the key, victims would have to contact the attacker by phone, but the free decryptor released by Emsisoft in 2016 still works and is downloadable from NoMoreRansom.

    Prikaži ovu nit
    Poništi
  12. 27. sij

    The “.EnCiPhErEd” suffix is added to all encrypted files. When the victim opens an encrypted file a prompt to enter the decryption key will appear.

    Prikaži ovu nit
    Poništi
  13. 27. sij

    Xorist adds itself to the registry for persistence and creates a new command for the suffix “.EnCiPhErEd” that opens the ransomware again.

    Prikaži ovu nit
    Poništi
  14. 27. sij

    In the extracted strings of Xorist ransomware, the following suffixes are targeted.

    Prikaži ovu nit
    Poništi
  15. 27. sij

    VMRay’s Reputation Engine recognizes the sample as “Win32.Trojan.Xorist” and our VTI rules classify it as ransomware because it renames multiple user files.

    Prikaži ovu nit
    Poništi
  16. 27. sij

    [ Analysis] Xorist ransomware doesn’t have a C&C server. Instead, relies on the victim sending an SMS message to a Chinese phone number.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    24. sij

    Had a great time geeking out about and on the podcast! Click in to hear more about how we dialed in our malware analysis pipeline using the VMRay Analyzer and

    Poništi
  18. 23. sij

    . Sr. Detection & Response Analyst, talks about using automation with VMRay to get results faster while minimizing the need for manual submission on the .

    Poništi
  19. 23. sij

    [Hiring] Are you a great storyteller that captivates the audience? We're looking for you. Apply to be our new Product Marketing Manager and make a monumental impact at VMRay.

    Poništi
  20. proslijedio/la je Tweet
    22. sij

    I liked working on this. The driver exploit used by TDL is very nicely visible in the API log of the sandbox

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·