Niryara

The Niryara project aims to develop a tool for the automated detection and analysis of non-signature-based malware. The tool allows the automation of tasks previously performed manually by analysts. It makes their work easier and allows them to focus on the analysis of the information provided by this tool.

The R&D objectives are:

Automated static malware analysis . Analysis of the sample without the need for its execution.

Automated dynamic malware analysis using multi-sandbox. Dynamic analysis requires the use of different sandboxes (virtual environments controlled by simulation of an Internet connection, for example), as many as the OS to be simulated.

Creation of an IOC (Indicators of Compromise or Artifacts, in incident management terminology) generation engine based on sample analysis. Allows blocking of samples in FWs and IDS/IPS.

Labeling system for intuitive and simple classification and sharing of samples and their analysis.

Provide mechanisms to prevent malware concealment and anti-analysis techniques

The objectives of the project are:

Provide new approaches to malware detection not currently considered.

Allow in-depth analysis of the detected samples.

Automate the work to be done.

Simplify the usability of the solution offered.

Benefits:

Threat Detection

Automated malware analysis

Task automation

NIRYARA (IDI – 20150344)
Scroll to Top
¿Quieres ser el primero en conocer todas nuestras noticias?
¡Suscribete y ponte al día!
I agree with the Terms and conditions and the Privacy policy

“Los datos personales que nos facilite serán tratados por Entelgy con la finalidad de gestionar tu suscripción a nuestra Newsletter. Puedes ejercer tus derechos en materia de protección de datos dataprotection@entelgy.com. datos mediante comunicación dirigida a nuestro Delegado de Protección de Datos en dataprotection@entelgy.com.”