Niryara
The Niryara project aims to develop a tool for the automated detection and analysis of non-signature-based malware. The tool allows the automation of tasks previously performed manually by analysts. It makes their work easier and allows them to focus on the analysis of the information provided by this tool.
Automated static malware analysis . Analysis of the sample without the need for its execution.
Automated dynamic malware analysis using multi-sandbox. Dynamic analysis requires the use of different sandboxes (virtual environments controlled by simulation of an Internet connection, for example), as many as the OS to be simulated.
Creation of an IOC (Indicators of Compromise or Artifacts, in incident management terminology) generation engine based on sample analysis. Allows blocking of samples in FWs and IDS/IPS.
Labeling system for intuitive and simple classification and sharing of samples and their analysis.
Provide mechanisms to prevent malware concealment and anti-analysis techniques
Provide new approaches to malware detection not currently considered.
Allow in-depth analysis of the detected samples.
Automate the work to be done.
Simplify the usability of the solution offered.
Benefits:
Threat Detection
Automated malware analysis
Task automation