hybrid-analysis.blogspot.com Open in urlscan Pro
2a00:1450:4001:813::2001  Public Scan

Submitted URL: https://hybrid-analysis.blogspot.de/
Effective URL: https://hybrid-analysis.blogspot.com/
Submission Tags: falconsandbox
Submission: On March 05 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

IT security blog focusing on malware forensics, dynamic and static analysis, as
well as automated malware analysis techniques.





WEDNESDAY, JANUARY 24, 2024

 Hybrid Analysis Kicks Off 2024 With a Fresh Look and New Features







 * New Hybrid Analysis logo and fresh look as we kick-start 2024

 * Image scanning support and feedback contact form are now available


To celebrate the start of a new year, Hybrid Analysis — your favorite free
public malware analysis platform — is kicking off 2024 with a fresh, modern new
look and some additional new features and improvements intended to provide the
best possible outcomes for our community. 


For the past year we’ve been hard at work making under-the-hood performance
optimizations. We’ve also added new features, such as support for file
detonations in Windows 11 64-bit and x86 macOS, as well as a new “Analysis
Related URLs'' category in the CrowdStrike AI section of the sample detonation
report, which presents data on URLs and domains extracted from analyzed samples.
We have also integrated new technologies from our partners including Bfore.Ai, 
ScamAdviser and CleanDNS. 


NEW LOGO, REFRESHED LOOKS

Vintage is in, but there is such a thing as hanging on to a look for too long —
and the Hybrid Analysis logo was beginning to look dated. We wanted a modern
look that reflects the exciting new capabilities added to the service over the
past year. In addition to the new logo, the Hybrid Analysis website has been
refreshed with new fonts for added visual appeal. 


These changes will become immediately apparent as you visit the homepage or
navigate to any overview or report page. We’re constantly working to improve the
Hybrid Analysis user experience, so through the upcoming year we plan to gently
roll out new visual modifications and updates to enhance your experience with
the platform.




Figure 1. Hybrid Analysis Latest Submissions page with new font and logo


IMAGE SCANNING SUPPORT FOR QUICKSCAN

Rest assured, the new changes are not just skin-deep. We just introduced new
image-scanning support for QuickScan static analysis. It's as easy as uploading
a 'png', 'jpg', 'gif', 'tiff', or 'bmp' file type and hitting the Analyze
button. If you’re ever in doubt whether an image file type could be carrying
some concealed executable code or malware, you can instantly get an assessment
from QuickScan, which performs static analysis using CrowdStrike machine
learning (ML) and technologies from our partners, such as Metadefender. 




Figure 2. Hybrid Analysis QuickScan Analysis Overview for a ‘gif’ file


WE VALUE YOUR INPUT

Hybrid Analysis vetted users now have the ability to conveniently ask questions,
make suggestions or offer feedback about the platform. We have introduced a
“Contact Us” form — found at the bottom of the webpage in the footer — so it’s
easier than ever to reach out to us. Just pick one of the predefined topics from
the Subject drop down list, blast us a message and we will do our best to reply
to the email address associated with your Hybrid Analysis account. 


Alternatively, for those that are not vetted users and want to reach out with
comments, suggestions or feedback, please feel free to drop us a line on our
Hybrid Analysis X (formerly Twitter) account. Your feedback is important to us
and we value your input! 




Figure 3 - Hybrid Analysis Contact Us form (available for vetted users)


THE ROAD AHEAD

We have been committed to continually improving the capabilities and the quality
of the Hybrid Analysis platform by constantly adding new features, improving
existing ones or in some cases, removing them.


Thank you to our users. You can look forward to continued investment in Hybrid
Analysis upgrades through 2024. Expect ongoing improvements to the UI and, most
importantly of all, continued enhancements to our services along with more
technology partnerships to augment our capabilities for providing the best
possible insights for you — the Hybrid Analysis community.




Posted by Liviu Arsene
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest




TUESDAY, MARCH 14, 2023


HYBRID ANALYSIS PARTNERS WITH SCAMADVISER AND CLEANDNS TO PROVIDE ENHANCED
CONTEXT TO URL AND DOMAIN ANALYSIS



Hey everyone, we’ve got some exciting news to share! We are thrilled to announce
our newest partnerships and technology integrations, with ScamAdviser and
CleanDNS. These relationships will provide the Hybrid Analysis community with
more context into analyzed URLs and domains. This augments our capabilities for
providing the best possible insights for the Hybrid Analysis community.




We constantly strive to provide the most effective and comprehensive threat
analysis platform to our community and these new integrations will enable the
community to better understand threats and make more informed decisions on how
to analyze or respond to them.




So, what exactly do these integrations offer our community? 

Both ScamAdviser and CleanDNS will be presented as Scorecards in the Analysis
Overview section. Clicking the View Details button will open a modal with
additional context and information on the analyzed domain. Apart from Domain
Scam Score and Domain Abuse Reports, users also have the option of visiting each
partners’s website for further details on the analyzed domain.





Fig. 1 Scorecards in the Analysis Overview section displaying the ScamAdviser
and CleanDNS integration








Fig. 2 Modal view for the CleanDNS View Details button




ScamAdviser utilizes over 40 data sources such as the IP address of the web
server, the availability of contact details on the website, the age of the URL
and ratings on review sites. The service is designed to assist in making
informed decisions regarding the scam-like behavior of URLs. Its algorithm
determines whether a website is legitimate – with genuine reviews – or a
phishing site selling fake products. By integrating ScamAdvisor into the Hybrid
Analysis platform with its 30 million analyzed websites, we will be able to
provide researchers and analysts with a more comprehensive understanding of the
URLs we analyze. For more information on how the technology behind it works,
feel free to check out the ScamAdviser website.




CleanDNS offers a vital solution for detecting likely sources of abuse. It is a
valuable tool for assisting registries, registrars and researchers in making
informed decisions to take action against such abuse. Initially informed by
reputable abuse data sources including top domain abuse feeds, commercial,
non-profit and academic DNS abuse feeds, CleanDNS enhances abuse records with an
evidence-based workflow to create actionable reports. With CleanDNS, we can
provide our community with an additional layer of context regarding the state of
analyzed domains. For more information on how the technology behind it works,
feel free to check out the CleanDNS website. 




These partnerships with ScamAdviser and CleanDNS enable Hybrid Analysis
researchers and analysts to identify fraud, phishing scams, and other malicious
activities. By leveraging these capabilities, we are augmenting our already
powerful platform, providing the community with additional insights into the
behavior of a URL or domain. We look forward to continuing to collaborate and
partner with technology providers to offer additional tools and improve threat
research insights for our security community.




Happy Hunting!








Posted by Liviu Arsene
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: automated malware analysis, CleanDNS, Feature Updates, Hybrid Analysis
partnerships, ScamAdviser



TUESDAY, JUNE 8, 2021


PUBLIC SERVICE ANNOUNCEMENT: RETIRING FALCON SANDBOX PUBLIC API V1 STARTING
AUGUST 3, 2021



We are announcing the sunset of  Falcon Sandbox Public API v1, which will reach
end of life as of August 3, 2021, 12:00 PM EST. After this date, the Falcon
Sandbox Public API v1 will stop responding altogether.


Here at Hybrid Analysis, we are dedicated to enabling our community to leverage
a unified platform for automated malware forensics by concentrating our efforts
on improving our systems to deliver the best experience, performance, features,
and tools to enrich malware analysis.

 

Anyone visiting the Hybrid Analysis homepage has probably already seen the
banner about retiring the Falcon Sandbox Public API v1, and we have already
started notifying API connectors authors about version removal.









Falcon Sandbox Public API v2 has been in use for more than a year, and we’ve
made great efforts to integrate existing API v1 features into API v2, while also
expanding on them.

 


WHO IS IMPACTED?

This change impacts everyone that has been using the Falcon Sandbox Public API
v1. Starting today June 8, 2021, the Falcon Sandbox Public API v1 has entered
the sunset period, leading to deprecation beginning August 3, 2021,12:00 PM EST.


Anyone using the VxWebService Python API Connector v2 with the Falcon Sandbox
Public API v2 will not be impacted and the code that resides in the master
branch of that repository supports API v2. 


As a reminder, the legacy VxWebService app utilising API v1 is not supported
anymore, but still available in the v1 branch.




WHY THE CHANGE TO FALCON SANDBOX PUBLIC API V2?

As some of you have already noticed when using the API v2, one of the major
benefits involves using OpenAPI and Swagger Docs, which have become the world
standard for defining RESTful interfaces.

 

Data security and privacy are also something we take seriously, so the fact that
Falcon Sandbox Public API v2 is also SOC II compliant is all the more critical.
This means the API v2 is built around the five “trust service principles”
involving security, availability, processing integrity, confidentiality and
privacy.

 

But most importantly, with Falcon Sandbox Public API v2 we can readily and
constantly roll out new features that can help you, the research community,
expand on analysis capabilities while offering a reliable API standard that’s
easy to use.


For a complete list of features and functionalities we have added over time into
the Falcon Sandbox Public API v2, check out our API v2 changelog section (here)





HOW TO SUCCESSFULLY MIGRATE TO FALCON SANDBOX PUBLIC API V2?

Throughout the sunsetting phase, those who still use the API v1 are encouraged
to switch to the API v2 by following the instructions we have put together
(here).

 

If you have any automation dependencies running on Falcon Sandbox Public API v1,
please make the necessary changes and switch to Falcon Sandbox Public API v2
using the available documentation.

 

We hope this graceful transition will not bring too much disruption to your
activities. If you experience any issues with the migration process or if you
have suggestions on new features that you would like to have available, please
let us know.


Happy Hunting!


Posted by Liviu Arsene
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: api calls, API v1, automated malware analysis, Falcon Sandbox



WEDNESDAY, APRIL 7, 2021


UPCOMING MAINTENANCE - APRIL 7TH, 2021 2AM EST - 3AM EST



Hello again HA Community! The CrowdStrike Falcon Sandbox team hopes you are
doing well, and staying safe during these unprecedented times. As always, thank
you for being a part of the biggest community-focused sandbox service! Our goal
is to continually enhance your experience by not only delivering new and useful
features to assist in malware analysis, but also by maintaining a stable and
efficient platform.

As such, we have scheduled a brief downtime window from 2AM - 3AM EST on April
7th, 2021 to perform critical maintenance. During this downtime the site will be
unavailable. We appreciate your patience during this brief interruption and look
forward to seeing you back!

Happy Hunting!


Posted by CS-JordanWhite
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: apt, behavior, capabilities, detonation, digital forensics, dropper,
embedded macro, Evasion, Falcon Sandbox, hunt, hybrid-analysis, incident,
Malware Analysis, targeted attack



THURSDAY, DECEMBER 3, 2020


NETWORK SIMULATION NOW LIVE ON HYBRID-ANALYSIS!



We are proud to announce the availability of Network Simulation for file and URL
detonations on Hybrid-Analysis.com! 

Network Simulation will block internet-bound traffic from reaching its
destination, instead routing all traffic to an internal endpoint which responds
to those outbound requests (DNS/HTTP(s)/etc...). This allows the submitter to
collect crucial indicators and detonation details without ever directly
contacting attacker-controlled infrastructure. 

To utilize this new feature, submit a new file or URL for analysis and expand
"Runtime Options" found within the environment selector section:




Then select "Simulate Network Traffic" when customizing your detonation
parameters:






That's it! When your sample is submitted, all traffic destined for the internet
will be safely routed internally to feign internet availability. 


Happy Hunting!











Posted by CS-JordanWhite
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: apt, behavior, capabilities, detonation, digital forensics, dropper,
embedded macro, Evasion, Falcon Sandbox, hunt, hybrid-analysis, incident,
Malware Analysis, targeted attack



WEDNESDAY, AUGUST 12, 2020


NEW AND IMPROVED THREAT SCORE!



Greetings from Sandboxland! From all of us at Hybrid Analysis, we hope this
message finds you healthy and well. It’s been quite a long time since our last
blog post… we’ve been busy working on platform enhancements and introducing new
features to further improve your sandbox experience. One of the most exciting
new features is the integration of a machine-learning powered threat score!

With this new feature, the sample and pertinent sandbox data will be scrutinized
by a machine-learning model developed with CrowdStrike’s proven machine-learning
technology, returning a threat score and associated verdict.  The objective of
this undertaking was to achieve greater sensitivity and specificity while
computing threat scores.  Initial analysis from a data set consisting of ~40K
samples shows the new methodology to be quite effective, with a significant
decrease in the False Positive Rate (FPR), while simultaneously increasing the
True Positive Rate (TPR).  This feature is initially limited to non-URL
submissions detonated in our Windows detonation environments with plans for
further expansion as the model develops and matures.


Posted by Mike M.
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest




THURSDAY, JUNE 6, 2019


NEW FEATURE: UPLOAD YOUR COLLECTIONS OF FILES


As security researchers, we often need to share sets of samples with our peers.
Frequently files are part of the same campaign or by the same threat actor,
often we need files from the same malware family, and in other cases it’s just a
matter of sharing samples in a broader context. To facilitate this type of
sharing, we now support File Collections on Hybrid Analysis — give it a shot!

The new Files Collection tab on the upload screen allows for drag and drop
functionality for multiple files, or you can use batch file selection by
clicking the upload area.





The new bulk upload dialog lets you name the collection, provide comments, and
even add hashtags to associate your file collection with a specific topic.






Lastly, the new collections overview page shows you details for all files in the
collection, including current detection status. As an example, here’s a
collection of samples that are part of the Ryuk family. From here, you can also
select individual files to see their details or to run them through the sandbox
for further analysis.

We hope you will find this new feature useful!

Posted by Sven Krasser
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest


Older Posts Home

Subscribe to: Posts (Atom)



LINKS

 * Free Malware Analysis
 * Falcon Sandbox Technology




BLOG ARCHIVE

 * ▼  2024 (1)
   * ▼  January (1)
     *  Hybrid Analysis Kicks Off 2024 With a Fresh Look ...

 * ►  2023 (1)
   * ►  March (1)

 * ►  2021 (2)
   * ►  June (1)
   * ►  April (1)

 * ►  2020 (2)
   * ►  December (1)
   * ►  August (1)

 * ►  2019 (1)
   * ►  June (1)

 * ►  2018 (1)
   * ►  August (1)

 * ►  2016 (4)
   * ►  December (1)
   * ►  October (1)
   * ►  July (1)
   * ►  February (1)

 * ►  2015 (15)
   * ►  September (3)
   * ►  August (1)
   * ►  July (1)
   * ►  May (3)
   * ►  April (1)
   * ►  March (2)
   * ►  February (3)
   * ►  January (1)

 * ►  2014 (5)
   * ►  November (2)
   * ►  October (1)
   * ►  August (1)
   * ►  July (1)





Copyright © 2019 CrowdStrike. Simple theme. Powered by Blogger.



Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe
zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit
Messwerten zur Leistung und Sicherheit für Google freigegeben. So können
Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die
Qualität des Dienstes gewährleistet werden.Weitere InformationenOk