- Feb 7, 2023
- 2,349
For their emulation they use a host of proprietary engines such as CADET on executables, neural networks, deep learning, CPU-level detection and Intel TDT, static deobfuscators including one for macros and scripts, yara signatures on file and process memory, proprietary anti-malware signatures, Mitre-based and behavioural analysis. And then it uses Kaspersky feeds and Bitdefender as well.Interesting. And for their sandbox?(You mentioned BitDefender, what else?)
In the end Malware DNA is used to identify the malware family.
Last edited: