Joe Sandbox Class is fully integrated into Joe Sandbox Desktop or Ultimate.
Features from the analysis report are extracted in the first step of the process. Joe Sandbox Class mainly uses Hybrid Code Analysis as well as Behavior Signature Information in this step. Next, the features are generalized and noise is reduced. A similarity search over all stored features is then executed.
Joe Sandbox Class generates a classification report in HTML, XML and JSON outlining similar samples as well as the shared Hybrid Code Analysis results. In addition, it compiles a detailed graph for a complete malware set.
Joe Sandbox Class output is very useful for finding similarities shared within different malware variants or groups. It can also be used to identify new, never-before-seen samples.
Joe Sandbox Class classification algorithm is based on Hybrid Code Analysis (HCA) results. HCA combines dynamic and static program analysis while retaining such benefits as code completion. Joe Sandbox Class uses the complete view, including non-executed codes of the malware behavior for similarity analysis.
Joe Sandbox Class's classification algorithm is scalable (O(n*m), n = number of features per sample, m = number of stored features in the database) and can be mutlithreaded to process enormous amounts of data in a short period of time.
In addition to classification reports in HTML, XML and JSON formats, Joe Sandbox Class generates a detailed cluster map in GraphML format.
Joe Sandbox Class is built as a modular and scalable system with many settings for advanced tuning. With its open SDK, behavior signatures and cookbooks, it enables performing advanced use cases to serve organizations' specific needs. Joe Sandbox Class supports multiple analysis machines with different applications/versions installed.
Joe Security provides excellent services, such as system installations, training, maintenance, customization and expert knowledge as an supplemental package to Joe Sandbox Class.
APT28/Grizzlybear Lojack Double Agent
Gozi ISFB Banking Malware
APT28/Grizzlybear related sample
Malicious RTF using CVE-2018-0802