Explore Joe Security Cloud Basic Accounts Contact Us
top title background image

Joe Security's Blog

Live Interaction and Results

 In this blog post we are going to outline a new and exciting technology we have built some time ago and have extended over time. The technology enables analysts to directly interact with the analyzer and in addition get live data on detection rules, verdicts, IOCs etc. Why is this a great feature and useful for analysts? Manual AnalysisJoe Sandbox features various technologies to automate user behavior. Here is a good example:Full Analysis Report: https://www.


Joe Sandbox v34 Boulder Opal

Today we release Joe Sandbox 34 under the code name Boulder Opal! This release is packed with many new detection signatures and interesting features to make malware detection more precise!Our Joe Sandbox Cloud Pro, Basic and OEM servers have recently been upgraded to Boulder Opal.If you wish to upgrade your on-premise Joe Sandbox Desktop, Mobile, X, Linux, Complete or Ultimate installation right away, please run the following command:mono joeboxserver.exe --updatefast 350 new SignaturesWith these brand new Yara and Behavior signatures, Joe Sandbox is able to precisely detect various new malware families like WhisperGate, SilentXMRMiner, UpdateAgent, DeadBolt, onlyLogger, Vulturi Stealer, BotenaGo and many more. In addition, we added 10 new malware configuration extractors, e.


Deep Malware Analysis on a Domain joined Analyzer

In this blog post we are going to outline a new exciting technology we have recently built. The technology enables analysts to analyze malware fully automated or manually via live interaction on a Windows 10 analyzer which is fully joined to a domain and has full access to a domain controller. Why is this technology so exciting?Dynamic malware analysis systems and sandboxes typically analyze samples on a Windows system which is completely isolated and only has access to the Internet. This setup is not really reflecting the real word.