Blog

EpicNet – Hidden traffic, payload, and persistence

A SecondWrite blog seriesIntroduction At SecondWrite, we analyzed the EpicNet sample (Malware SHA256 Hash: A2C0B6D31DC39ED651B29729C10E748073001DD4F58F599E5B418954B4ECCA5D) using SecondWrite’s DeepView sandbox (no manual analysis) and two other leading commercial...

What to do about evasive malware?

A SecondWrite blog series Introduction Malware reverse engineering is a time consuming and difficult process. Most SOCs don’t employ team members with the time and/or skill set required to focus on a single sample, and so they must rely on external tools or malware...

SecondWrite joins VirusTotal’s multi-sandbox project

We are excited to announce the integration of SecondWrite into VirusTotal’s multi-sandbox project. The multi-sandbox project’s goal is to aggregate a few leading sandboxes into VirusTotal, which is a database of malware and multi-scanner maintained by Google. You can...

SecondWrite launches Free Evasive Malware Sandbox Service!!

We are proud to announce that SecondWrite’s sandbox product is launching in general availability today! SecondWrite’s sandbox is enterprise software for automated malware analysis. By employing patented binary-rewriting technologies, it can detect and analyze zero-day...

Copyright © SecondWrite Inc.