www.crowdstrike.com
Open in
urlscan Pro
104.16.181.118
Public Scan
Submitted URL: http://prodsimplycomputermerchantsaccess.falcon-sandbox.com/
Effective URL: https://www.crowdstrike.com/platform/threat-intelligence/malware-analysis/
Submission: On November 16 via api from DK — Scanned from DK
Effective URL: https://www.crowdstrike.com/platform/threat-intelligence/malware-analysis/
Submission: On November 16 via api from DK — Scanned from DK
Form analysis
0 forms found in the DOMText Content
Skip to main contentEnable accessibility for low visionOpen the accessibility menu x CrowdStrike to Acquire Adaptive Shield, Delivering Unified Cloud and Identity Security for SaaS applications Learn more Skip to Main Content * Experienced a Breach? * Small Business * CrowdStrike Marketplace * Contact Us * Blog English * * Deutsch * * English (AU) * * English (UK) * * English (US) * * Español * * Français * * Italiano * * LatAm * * Português * * عربى * * 日本語 * * 繁體中文 * * 한국어 * Platform Explore Platform THE DEFINITIVE AI-NATIVE CYBERSECURITY PLATFORM * Endpoint Security The leader in EPP and EDR, backed by pioneering adversary intelligence and native AI. * Exposure Management The leader in exposure management with complete attack surface visibility & AI-powered vulnerability management. * Generative AI Turn hours of work into minutes or seconds with generative AI workflows for cybersecurity and IT. * Identity Protection Stop modern attacks in real time with the only unified platform for identity protection and endpoint security. * SaaS Security Leading SaaS Security (SSPM) that delivers deep visibility into identities and misconfigurations. * IT Automation Unify security and IT with one platform, agent, and console to cut complexity and cost. * Threat Intelligence & Hunting The leader in cyber threat intelligence with world-class research and elite threat hunting to disrupt adversaries. * Cloud Security The most complete CNAPP with unified agent and agentless protection, from code to cloud. * Workflow Automation Build your own workflows with native security orchestration, automation, and response (SOAR). * Next-Gen SIEM The world’s only AI-native SOC platform that unifies siloed security tools and data. * Data Protection Unified data protection that deploys instantly on existing agents to stop the theft of sensitive information. * Services PREPARE * SEC Readiness Services * Tabletop Exercise * Red Team/Blue Team Exercise * Adversary Emulation Exercise * Penetration Testing RESPOND * Incident Response * Compromise Assessment * Endpoint Recovery * Network Detection Experienced a breach? FORTIFY * Maturity Assessment * Technical Risk Assessment * SOC Assessment * Cloud Security Assessment * Identity Security Assessment MANAGED SERVICES * Managed Detection & Response Included in Falcon Complete and backed by CrowdStrike's Breach Prevention Warranty. * Cloud Detection & Response The only CDR that unifies world-class threat intelligence and 24/7 services with the world's most complete CNAPP. * Why CrowdStrike WHY CROWDSTRIKE * Industry Recognition CrowdStrike is the recognized leader in endpoint protection solutions. * Customer Stories Don’t take our word for it, hear what our customers have to say. * Compliance and Certifications Confidently meet mandates with the accredited CrowdStrike Falcon® platform. COMPARE CROWDSTRIKE * vs. Microsoft Burdensome operations drive up TCO. * vs. Palo Alto Networks Hard to deploy, hard to use, harder to manage. * vs. SentinelOne Weak coverage, can’t stop breaches. * vs. Wiz Incomplete CNAPP that can't stop breaches. * vs. Other Competitors See why CrowdStrike is the top choice for comprehensive cybersecurity. SOLUTIONS BY TOPIC * Cloud Detection and Response The only CDR that unifies world-class threat intelligence and 24/7 services with the world’s most complete CNAPP. * Zero Trust Real-time breach protection on any endpoint, cloud workload or identity, wherever they are. * Ransomware Protection Learn what you can do to stop ransomware threats in their tracks. * Observability & Log Management Fills in the gaps, logs everything, and realizes real-time observability for your entire system. * Log4Shell Mitigation Get the latest information on this evolving vulnerability. SOLUTIONS BY INDUSTRY * Small Business * Election Security * State and Local Government * Federal Government * Healthcare * Education * Retail * Learn CUSTOMER RESOURCES * CrowdStrike University * Free Trial Guide * Customer Support Portal * Developer Portal FEATURED RESOURCES * Cybersecurity 101 * Your Threat Landscape * 2024 Global Threat Report * 2024 Threat Hunting Report RESOURCE CENTER * Tech Hub * All resources BLOG * Blog articles * Company CONNECT WITH US * Careers * Events * Fal.Con 2024 * Falcon Encounter Hands-on Labs PARTNER PROGRAMS * Channel Partners and Distributors * Service Providers * Strategic Technology Partners * CrowdStrike Marketplace * View All Become a Partner ABOUT US * Our Story * Board of Directors * Investor Relations * CrowdStrike & F1 Racing * Executive Team * Latest News * Environment, Social & Governance * Login Your Cart Added to Cart -------------------------------------------------------------------------------- There's nothing in your cart Explore products per endpoint / per year - + View Order Continue Shopping Updating cart... View bundles & pricing -------------------------------------------------------------------------------- * View bundles & pricing -------------------------------------------------------------------------------- * Platform -------------------------------------------------------------------------------- * Services -------------------------------------------------------------------------------- * Why CrowdStrike -------------------------------------------------------------------------------- * Learn -------------------------------------------------------------------------------- * Company -------------------------------------------------------------------------------- * Blog -------------------------------------------------------------------------------- * Marketplace -------------------------------------------------------------------------------- * Login -------------------------------------------------------------------------------- * Contact us -------------------------------------------------------------------------------- * Experienced a breach? -------------------------------------------------------------------------------- * Languages -------------------------------------------------------------------------------- Back * Threat Intelligence * Back * Overview * Explore Products and Services Use Cases KNOW YOUR ADVERSARY. STOP BREACHES. The industry’s only unified intelligence and hunting solution built to disrupt adversaries. * Adversary OverWatch 24/7 AI-powered, intelligence-led threat hunting across all domains. * Adversary Intelligence Speed response and improve efficacy with automated threat intelligence * Adversary Intelligence Premium World-class intelligence reports, pre-built detections, and integrated workflows. * Counter Adversary Elite Don’t go it alone. Our experts bring elite experience and intel to your defense. KNOW YOUR ADVERSARY. STOP BREACHES. The industry’s only unified intelligence and hunting solution built to disrupt adversaries. * Threat Hunting 24/7 threat hunting across the cloud, identities, and endpoints. * Adversary Profiles Access 245+ adversary profiles to know your attacker’s playbook and prepare defenses. * Digital Risk Protection We scour the deep and dark web for any hint of risk to your organization. * Malware Analysis Quickly detect, assess, and defend against malware attacks. * Intelligence Reports Get proactive with industry-leading threat intelligence research. * Intelligence Automation & Orchestration Automated threat intelligence orchestration to adapt to emerging threats. * Attack Surface Management Gain complete attack surface visibility to reduce intrusion risk and outpace threats. * Pricing * Resources * Why CrowdStrike * Contact us * * Overview * Explore Explore Products and Services Adversary OverWatch 24/7 AI-powered, intelligence-led threat hunting across all domains. Adversary Intelligence Speed response and improve efficacy with automated threat intelligence Adversary Intelligence Premium World-class intelligence reports, pre-built detections, and integrated workflows. Counter Adversary Elite Don’t go it alone. Our experts bring elite experience and intel to your defense. Use Cases Threat Hunting 24/7 threat hunting across the cloud, identities, and endpoints. Adversary Profiles Access 245+ adversary profiles to know your attacker’s playbook and prepare defenses. Digital Risk Protection We scour the deep and dark web for any hint of risk to your organization. Malware Analysis Quickly detect, assess, and defend against malware attacks. Intelligence Reports Get proactive with industry-leading threat intelligence research. Intelligence Automation & Orchestration Automated threat intelligence orchestration to adapt to emerging threats. Attack Surface Management Gain complete attack surface visibility to reduce intrusion risk and outpace threats. * Pricing * Resources * Why CrowdStrike * Contact us * Platform * Threat Intelligence & Hunting * Malware Analysis Threat Intelligence DEFEAT MALWARE Empower your teams to detect, analyze, and neutralize malware with confidence. Request a demo View product demo EMPTY HEADING AUTOMATE MALWARE ANALYSIS. UNCOVER ADVANCED THREATS. Make faster, smarter decisions with CrowdStrike malware analysis tools. EMPTY HEADING * EMPTY HEADING DETECT SOPHISTICATED MALWARE Expose all malicious behavior and system interactions, going beyond common file analysis for deeper insights. * EMPTY HEADING ACCELERATE THREAT RESPONSE Respond faster to threats with detailed insights, minimizing damage and reducing recovery costs. * EMPTY HEADING STREAMLINE SECURITY OPERATIONS Seamlessly integrate analysis into your tools, enhancing efficiency and simplifying workflows. AUTOMATED FILE SUBMISSION Suspicious files and behaviors identified by the Falcon sensor are automatically submitted for automated malware analysis. This submission happens seamlessly in the background, ensuring no interruption in endpoint performance. DEEP BEHAVIORAL ANALYSIS Comprehensive analysis of suspicious files provides insights into their behavior and impact by recording all actions, from file changes to network activity. DETAILED, ACTIONABLE REPORTS Receive reports that include technical breakdowns, behavioral analysis, and impact assessments, providing your security teams with the insights they need for informed decision-making. GET THE FULL PICTURE Don’t just analyze a single malware file — identify its connections to threat actors or broader campaigns. With over 9 billion samples, we expand analysis to related files, providing comprehensive insights and enriched IOCs to fortify your defenses. STAY INVISIBLE TO ATTACKERS Our anti-evasion tech ensures malware behaves naturally during analysis, making it nearly impossible for malware to detect it’s being monitored. STRENGTHEN YOUR DEFENSE CrowdStrike’s tools integrate seamlessly with existing security platforms, enhancing collaboration and enabling a coordinated defense. SEE CROWDSTRIKE COUNTER ADVERSARY OPERATIONS IN ACTION SEE WHY CUSTOMERS TRUST CROWDSTRIKE > Strong partnerships power strong defenses > > “Having a partner that can help you dig in and really investigate and have > that threat intelligence to back it up to say ‘actually this is not what you > think it is’, has definitely helped. I can take a deep breath when I hear > ‘we’ve checked with CrowdStrike. It’s okay’, and that has given me peace of > mind” > Kelly McCracken, SVP of Detection and Response, Salesforce Watch their story > Combating espionage with CrowdStrike Threat Intelligence > > “CrowdStrike was a clear winner for us, based upon what we wanted to do and > how we wanted to defend our environment through profiling threat actors then > being able to use that tool to respond to a threat and remediate it quickly.” > Jason Koler, Director of Incident Response and Threat Intelligence, Eaton > Corporation Watch their story > Seamless excellence > > “My overall experience has been highly positive and satisfying. From the > outset, the product or service has consistently delivered on its promises, > exceeding my expectations. The seamless integration of quality, performance, > and attentive customer support has made every interaction enjoyable.” > IT Services, Software Development Read review > Strong partnerships power strong defenses > > “Having a partner that can help you dig in and really investigate and have > that threat intelligence to back it up to say ‘actually this is not what you > think it is’, has definitely helped. I can take a deep breath when I hear > ‘we’ve checked with CrowdStrike. It’s okay’, and that has given me peace of > mind” > Kelly McCracken, SVP of Detection and Response, Salesforce Watch their story > Combating espionage with CrowdStrike Threat Intelligence > > “CrowdStrike was a clear winner for us, based upon what we wanted to do and > how we wanted to defend our environment through profiling threat actors then > being able to use that tool to respond to a threat and remediate it quickly.” > Jason Koler, Director of Incident Response and Threat Intelligence, Eaton > Corporation Watch their story > Seamless excellence > > “My overall experience has been highly positive and satisfying. From the > outset, the product or service has consistently delivered on its promises, > exceeding my expectations. The seamless integration of quality, performance, > and attentive customer support has made every interaction enjoyable.” > IT Services, Software Development Read review > Strong partnerships power strong defenses > > “Having a partner that can help you dig in and really investigate and have > that threat intelligence to back it up to say ‘actually this is not what you > think it is’, has definitely helped. I can take a deep breath when I hear > ‘we’ve checked with CrowdStrike. It’s okay’, and that has given me peace of > mind” > Kelly McCracken, SVP of Detection and Response, Salesforce Watch their story * * * FEATURED RESOURCES Data Sheet FALCON SANDBOX Learn more Article MALWARE ANALYSIS Learn more Report CROWDSTRIKE 2024 THREAT HUNTING REPORT Learn more Report CROWDSTRIKE 2024 GLOBAL THREAT REPORT Learn more View more KNOW THEM. FIND THEM. STOP THEM. Learn how the world’s most dangerous adversaries are targeting organizations like yours. Explore the Adversary Universe Start your free trial now. Total protection has never been easier. Take advantage of our free 15-day trial and explore the most popular solutions for your business: * Protect against malware with next-gen antivirus. * Get unrivaled visibility with USB device control. Request free trial * * * * * New to CrowdStrike? About the platform Explore products Services Why choose CrowdStrike? CrowdStrike Financial Services Cyber Monday deals Company About CrowdStrike Careers Events Newsroom Partners CrowdStrike Marketplace Learn with CrowdStrike 2024 Global Threat Report Cybersecurity 101 Your Threat Landscape Tech Center View all resources Contact us Experienced a breach? Copyright © 2024 * Contact us * Privacy * Cookies * Your Privacy Choices * Terms of Use * Accessibility ABOUT COOKIES ON THIS SITE By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Notice Cookie Settings Reject All Accept All Cookies COOKIE PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * FUNCTIONAL COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. This includes diagnostic functions such as identifying 404 errors and monitoring page load speed. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collet is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All