Superb Automated Malware Binary Analysis Service – Figure out what malware does in minutes

These days, malware are VM aware to defend against automated analysis tools such as anubis, cukoo. And these automated analysis are based on behaviour analysis of malware that gives only tip of what actually it does as they are now intellegent and donot reveal at one instant. I am not at all satisfied with the automated analysis report i see these days.

Static analysis of unpacked malware provides much better picture of its capabilities and here is the a nice tool for this need.

This is superb service, i need not be a reverse engineer however with some little technical knowledge i can figure out hostile info and what the malware does based on API Calls, Control flow and Its Capabilities in Graph view.
It tracks the malicious process via the system call interface to identify where malware unpacked itself and then dumped for dissesmbly for analysis.
http://eureka.cyber-ta.org/

A great magic wand to help any organization if they can’t afford a malware researcher.
Thanks to its development team 🙂

Advertisements

About Uma Mahesh

A Creator/Equilizer. Creator/Equalizers are catalysts for positive, well-organized change. They never settle for the status quo. Instead, they see the opportunity for innovation in the processes that others have long taken for granted. They respect what's already operating, but they can't help but want to improve upon it. Their special combination provides innovation tempered with profound logic. They have incredible discernment. Should their efforts fail, they are unhesitating in accepting responsibility. They don't wallow in self-pity but rather see these missed attempts as critical steps on the path to success.
This entry was posted in Articles, Notes, security and tagged , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s