Static Analysis | Behavioral Analysis | Code Analysis | Memory Analysis |
---|---|---|---|
![]() |
![]() |
![]() ![]() |
![]() ![]() ![]() |
![]() |
![]() |
![]() |
![]() ![]() ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() ![]() ![]() |
![]() |
![]() ![]() ![]() |
![]() ![]() ![]() |
![]() ![]() |
![]() ![]() ![]() |
|
![]() ![]() ![]() |
![]() |
![]() ![]() ![]() |
|
![]() |
![]() |
![]() ![]() ![]() |
|
![]() |
|
![]() |
|
![]() ![]() ![]() |
![]() |
![]() |
|
![]() |
![]() ![]() ![]() |
![]() ![]() |
|
![]() |
![]() |
![]() ![]() ![]() |
|
![]() |
![]() ![]() |
||
![]() |
|||
![]() |
This additional tools are not directly used to analyze a malware sample, but support the process of it by simplifying e.g. the decryption of encypted or encoded parts or commands
Name | pros | Cloud | on Premise | Analysis Hosts |
---|---|---|---|---|
JoeSanbox | Free accounts with limited number of analysis available | ✓ | ✓ |
![]() ![]() ![]() ![]() ![]() |
Hybrid Analysis | Free accounts with limited number of analysis available | ✓ |
![]() ![]() ![]() |
|
Cuckoo Sandbox | "The Standard" for an open source sandbox | ✓ |
![]() ![]() ![]() ![]() ![]() |
|
Triage | Free accounts with limited number of analysis available | ✓ | ✓ |
![]() ![]() ![]() ![]() |
Any Run | Free accounts with limited number of analysis available | ✓ |
![]() |
Windows
![]() |
OSX
![]() |
Linux
![]() |
iOS
![]() |
Android
![]() |