Superb Automated Malware Binary Analysis Service – Figure out what malware does in minutes

These days, malware are VM aware to defend against automated analysis tools such as anubis, cukoo. And these automated analysis are based on behaviour analysis of malware that gives only tip of what actually it does as they are now intellegent and donot reveal at one instant. I am not at all satisfied with the automated analysis report i see these days.

Static analysis of unpacked malware provides much better picture of its capabilities and here is the a nice tool for this need.

This is superb service, i need not be a reverse engineer however with some little technical knowledge i can figure out hostile info and what the malware does based on API Calls, Control flow and Its Capabilities in Graph view.
It tracks the malicious process via the system call interface to identify where malware unpacked itself and then dumped for dissesmbly for analysis.
http://eureka.cyber-ta.org/

A great magic wand to help any organization if they can’t afford a malware researcher.
Thanks to its development team 🙂

Advertisements

About wikihead

A security freak
This entry was posted in Articles, Notes, security and tagged , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s