SNDBOX

77 posts

SNDBOX banner
SNDBOX

SNDBOX

@SNDBOXCOM

Designed by researchers for researchers, the world’s first AI malware research platform, offering never-seen-before malware analysis visibility.

Beigetreten Ocak 2018
6 Folgt976 Follower
SNDBOX
SNDBOX@SNDBOXCOM·
SNDBOX tweet media
ZXX
1
1
8
0
SNDBOX
SNDBOX@SNDBOXCOM·
Introducing UltraFast SNDBOX! the fastest most scalable solution in the industry, providing accurate verdicts powered by deep learning in under 60 seconds of dynamic analysis - for millions of files. Detect 0-day and evasive malware attacks fast and accurately.
SNDBOX tweet media
English
0
3
15
0
SNDBOX
SNDBOX@SNDBOXCOM·
@superMi11818336 @Pr3R00T Hey there Mike, could you please DM us the problems you encountered, and I will do my best to help out.
English
0
0
0
0
SNDBOX
SNDBOX@SNDBOXCOM·
@marcelmalware So is that as David said? Perhaps some human behavior missing?
English
0
0
0
0
Maʁsɛl
Maʁsɛl@WinningYahud·
@SNDBOXCOM I see a process drop and start from my document
English
1
0
0
0
SNDBOX
SNDBOX@SNDBOXCOM·
New type of attack on #OLE (Office) files to avoid AV detection. Malware Doesn't execute anything, leaves a #GenericPersistence mechanism to execute after machine restart. 21 \ 61 on VirusTotal IOCS: solsin[.]top/w1 eb49ee744d8a05c877681c68da251720 app.sndbox.com/sample/4cc66ec…
English
2
1
13
0
SNDBOX
SNDBOX@SNDBOXCOM·
@Ledtech3 Hmm thats interesting! We'll have a deeper look
English
1
0
0
0
David Ledbetter
David Ledbetter@Ledtech3·
@SNDBOXCOM I've Pulled all of the scripts and text box info and it looks like it opens form 2 then loads form 1 "Public Sub Rovio". It may require a label click to trigger when run "UserForm1.Label5_Click"
David Ledbetter tweet media
English
3
0
1
0
SNDBOX
SNDBOX@SNDBOXCOM·
@Ledtech3 It doesnt detect the sandbox, it tries to avoid being detected by only dropping a file that will execute after machine restart, and doesn't execute the file by it self
English
1
0
0
0
SNDBOX
SNDBOX@SNDBOXCOM·
In May we analyzed over 980K files which are easily accessible and searchable for all registered users on our public feed: app.sndbox.com/feed
English
0
1
7
0
SNDBOX
SNDBOX@SNDBOXCOM·
Interesting behavior of winword.exe -> svchost.exe -> wmi -> powershell Behavior visibility obtained by monitoring #RPC calls on the operating system
English
0
1
8
0
SNDBOX
SNDBOX@SNDBOXCOM·
Searching the malicious CNC IP Address on SNDBOX, yields more results of similar attacks 92[.]38[.]135[.]134 bit.ly/2Q1nJzn
English
0
0
1
0
SNDBOX
SNDBOX@SNDBOXCOM·
Recently uploaded, only 3/61 hits on VT, fake "Protected document" while executing malicious #MSI payload on the machine from remote server. app.sndbox.com/sample/9fbc357…
SNDBOX tweet mediaSNDBOX tweet media
English
1
4
10
0
SNDBOX retweetet
PR3R00T
PR3R00T@Pr3R00T·
Created a Light Python3 wrapper for the SNDBOX Rest API @SNDBOXCOM the code will upload supported files, provide metadata details and search the SNDBOX database returning the raw response. Check it out at: github.com/PR3R00T/SNDBOX…
English
1
2
6
0
SNDBOX
SNDBOX@SNDBOXCOM·
New static feature: we have added a DOCUMENT PREVIEW tab, preview to document files & #OCR. This opens many new feature possibilities to (A) enhance our detection, (B) #similarity search between known attacks, and (C) more information for researchers app.sndbox.com/sample/6baa2e1…
SNDBOX tweet mediaSNDBOX tweet media
English
0
3
9
0