CAS- Need to install JRE to analyse .JAVA malware

I need a solution

Hi Team,

Please provide your advise on the below queries.

1. If we need to analyse .JAVA malware, we need to  have JRE installed or else it will not detected it ( No JAVA runtime environment).

2. Not sure if this is possible on our current Malware Sandbox. Is there a way for it to extract the content of an archive and execute the file inside an archive?

We have 2 cases (ISO and IMG) which only mounts the file

3. If this is not possible, we need to extract the malware out of the archive and move it inside the Malware Sandbox

Thanks,

Ram

0

Related:

Content & Malware Analysis – Virtual Appliance

I need a solution

Hi All,

I’ve configured my Virtual Appliance Content Analysis in my lab and I have a few questions.

1. I got a license for – Sandbox Broker and On-Box Sandboxing.  what can I do with the content analysis with these licenses?

2. I can see in the Statistics > Historical Connections all the websites from the users. but if I try to download the EICAR test file, the result is CLEAN

Log file from my content analysis;

https://imgur.com/Z0h8xYa

3. there is a Malware Analysis Virtual Appliance? if No, Can I do some malware analysis in the virtual content analysis?

Thanks,

0

Related:

How can I be notified when a file goes into Sandboxing with advanced malware protection license?

I need a solution

Hi;

How can I be notified when a file goes into Sandboxing with advanced malware protection license? Of course this is regardless of the verdict. I mean even if the file is not a malware, how can I see what files have been sent to the sandboxing engine that comes with advanced malware protection license as opposed to the standard one.

Is it in the logs, can it be associated with an SNMP trap or an email.

Kindly

Wasfi

0

Related:

  • No Related Posts