The Blog

Malware of the Week – Trojan

Malware of the Week – Trojan

7fbbd075d1c2afb0bda717fde96ae452b104b628348a4454e14f2e3a07828f67 (SHA-256) Malicious with 81% Confidence  SecondWrite’s DeepView Sandbox analyzed this file last week and declared it to be malicious using our proprietary techniques. At the time of...

Malware of the Week – Ransomware

Malware of the Week – Ransomware

fb3439936c8be4798abbeb7e4078aef7fa58d6da5d4ffc88c08c14e514f43b94 (SHA-256) Malicious with 81% Confidence  SecondWrite’s DeepView Sandbox analyzed this file last week and declared it to be malicious using our proprietary techniques. At the time of...

Malware of the Week – March 30

Malware of the Week – March 30

f65d3f4ab2ce87a433f965fa3f267e5d73447c0146a60cce614de44fe5e8641f (SHA-256) Malicious with 91% Confidence  SecondWrite’s DeepView Sandbox analyzed this file last week and declared it to be malicious using our proprietary techniques. At the time of detection, this...

Malware of the Week – March 23

Malware of the Week – March 23

c80a7ab07611836f0da1e9084d765a84049f1beb95174c1cef16bb2524924e13 (SHA-256) Malicious with 82% Confidence  SecondWrite’s DeepView Sandbox analyzed this file last week and declared it to be 82%  malicious using our proprietary techniques. At the...

Malware Of The Week – March 16

Malware Of The Week – March 16

Malicious with 99% Confidence 3C9D9812EB79D414F2DFD04E7401944C2E45168F870C339C9491EF2A0813A557 (SHA-256) SecondWrite’s DeepView Sandbox analyzed this file last week and declared it to be 99%  malicious using our proprietary techniques. A link to the...

Malware of the Week – March 9

Malware of the Week – March 9

d5ffda19d6950757973f52325dbe9b7e01084320e1bdbdcabf9662874d6e6451 (SHA-256) Malicious with 99% Confidence SecondWrite's DeepView Sandbox analyzed this file last week and declared it to be 99% malicious using our proprietary techniques. The full report is below but here...

Why Dwell Time Matters & What To Do About It

Why Dwell Time Matters & What To Do About It

At SecondWrite, we compared the detection results of the three evasive malware samples deemed malicious by our DeepViewTM cloud-based malware detector against other leading endpoint tools from Gartner’s magic quadrant.

What to do about evasive malware?

What to do about evasive malware?

Malware reverse engineering is a time consuming and difficult process. Most SOCs don’t employ team members with the time and/or skill set required to focus on a single sample, and so they must rely on external tools or malware

SecondWrite joins VirusTotal’s multi-sandbox project

SecondWrite joins VirusTotal’s multi-sandbox project

We are excited to announce the integration of SecondWrite into VirusTotal’s multi-sandbox project. The multi-sandbox project’s goal is to aggregate a few leading sandboxes into VirusTotal, which is a database of malware and multi-scanner maintained by Google. You can...

Copyright © SecondWrite Inc.