Lastline Analyst - AsiaNet...Lastline Analyst can be accessed through either an on-prem solution or...

2
Look Inside Modern Malware Lastline Analyst is based on next-generation malware analysis to provide complete visibility into the actions of malware. Code emulation (rather than pure virtualization) is used to inspect every instruction executed by the malware. This enables more in-depth and sophisticated analysis, such as tracking data flows and counteracting evasion techniques. The solution supports the analysis of malicious web sites, the identification of web-based exploits, and the deobfuscation of JavaScript code. Discover Malware Behavior Lastline Analyst identifies critical malware interactions with the operating system (filesystem, registry, and process activity) and the network (DNS requests and UDP/TCP traffic). Malware is run inside a realistic environment, including popular applications and data (password files, decoy documents), to elicit all behaviors. Detailed reports include all artifacts, such as additional executables and captured network traffic. Integrate With and Enhance Existing Tools Lastline Analyst integrates easily with existing security and data analysis systems and SIEM solutions by enabling the export of data via a simple API. This enables dissemination and use of results across the entire organization’s security toolset. Malware Analysis Through the Lastline Cloud Lastline Analyst can be accessed through either an on-prem solution or through a hosted option. Binaries, web pages (URLs), PDF documents, Microsoft Office documents, Flash files, Java applets, Android applications, and more can be submitted via web interface or a fully supported API. Files submitted are uploaded to Lastline’s datacenter and analyzed using the high-resolution analysis approach pioneered by Lastline. Lastline Analyst provides threat analysts and forensics teams with an advanced malware analysis system to safely execute malware samples, dissect their actions, and understand their behavior. Lastline Analyst is built on top of years of research to identify and analyze evasive malware and web threats. Lastline Analyst can be used to analyze malicious components used in targeted attacks, APTs, and zero-day attacks safely, efficiently, and with complete privacy. Lastline Analyst Safe execution and analysis of malware samples Detailed, easy-to- understand reports reveal hidden malware behavior High-resolution analysis to counteract malware evasion techniques Turn-key, no-configuration deployment Analyzes executable files, MS Office documents, PDF documents and Web code Easy-to-use web-based console Flexible data access and export via API File submissions via API Key Features

Transcript of Lastline Analyst - AsiaNet...Lastline Analyst can be accessed through either an on-prem solution or...

Page 1: Lastline Analyst - AsiaNet...Lastline Analyst can be accessed through either an on-prem solution or through a hosted option. Binaries, web pages (URLs), PDF documents, Microsoft Office

Look Inside Modern MalwareLastline Analyst is based on next-generation malware analysis to provide complete visibility into the actions of malware. Code emulation (rather than pure virtualization) is used to inspect every instruction executed by the malware. This enables more in-depth and sophisticated analysis, such as tracking data flows and counteracting evasion techniques. The solution supports the analysis of malicious web sites, the identification of web-based exploits, and the deobfuscation of JavaScript code.

Discover Malware BehaviorLastline Analyst identifies critical malware interactions with the operating system (filesystem, registry, and process activity) and the network (DNS requests and UDP/TCP traffic). Malware is run inside a realistic environment, including popular applications and data (password files, decoy documents), to elicit all behaviors. Detailed reports include all artifacts, such as additional executables and captured network traffic.

Integrate With and Enhance Existing ToolsLastline Analyst integrates easily with existing security and data analysis systems and SIEM solutions by enabling the export of data via a simple API. This enables dissemination and use of results across the entire organization’s security toolset.

Malware Analysis Through the Lastline CloudLastline Analyst can be accessed through either an on-prem solution or through a hosted option. Binaries, web pages (URLs), PDF documents, Microsoft Office documents, Flash files, Java applets, Android applications, and more can be submitted via web interface or a fully supported API. Files submitted are uploaded to Lastline’s datacenter and analyzed using the high-resolution analysis approach pioneered by Lastline.

Lastline Analyst provides threat analysts and forensics teams with an advanced malware analysis system to

safely execute malware samples, dissect their actions, and understand their behavior. Lastline Analyst is built on

top of years of research to identify and analyze evasive malware and web threats.

Lastline Analyst can be used to analyze malicious components used in targeted attacks, APTs, and zero-day

attacks safely, efficiently, and with complete privacy.

Lastline Analyst

Safe execution and analysis of malware samples

Detailed, easy-to-understand reports reveal hidden malware behavior

High-resolution analysis to counteract malware evasion techniques

Turn-key, no-configuration deployment

Analyzes executable files, MS Office documents, PDF documents and Web code

Easy-to-use web-based console

Flexible data access and export via API

File submissions via API

Key Features

Page 2: Lastline Analyst - AsiaNet...Lastline Analyst can be accessed through either an on-prem solution or through a hosted option. Binaries, web pages (URLs), PDF documents, Microsoft Office

Copyright © 2009-2013 Lastline, Inc. - All rights

reserved worldwide.

lastline.com

6950 Hollister Avenue Suite 101Santa Barbara, CA 93117

+1 (805) 456-7075

Lastline, Inc., was founded in 2011 by university researchers Engin Kirda, Christopher Kruegel, and Giovanni Vigna. Lastline’s security products synthesize and bring to commercial standards the founders’ award-winning, world-renowned academic research on malware analysis and attack countermeasures. The founders of Lastline are also the founders of iSecLab, one of the top malware research organizations in the world, and are considered to be today’s thought leaders on automated high-resolution malware analysis and detection.

The founders are well-known for their development of Anubis and Wepawet, which are cloud-based malware analysis tools with a user base of thousands of corporations, government institutions, and security vendors.

Lastline is focused on real-time analysis of advanced malware and on tracking the Internet’s malicious infrastructure (the Malscape™). Lastline leverages this threat intelligence to create advanced malware defenses for companies of all sizes.

By focusing on cloud-based automated systems and processes, Lastline has developed the technology to analyze advanced malware at an unprecedented speed and volume. This gives Lastline the ability to analyze binaries and web content as it enters enterprise networks, as well as the ability to map the Malscape™ at a level of accuracy and relevance previously not available. As a result, Lastline’s technology is able to detect 0-day, targeted attacks and provides actionable threat intelligence to address the advanced malware problem.

Dell PowerEdge

1U Rack-Mount

42.55 lbs (19.3 Kg)

17.1’’ W x 25.3’’ D x 1.7’’ H (43.4 x 64.2 x 4.3 cm)

Fits 19-inch rack

(2) 10/100/1000 Base-T Ports

Up to 10,000 samples per day

100~240 VAC / 4.8 - 2.4 A

Dual Hot Plug Power 350W

2 x 2 TB HDs + 200 GB SSD

Intel® Xeon® E5-2430 2.20GHz, 15M Cache

32GB ECC RAM

10°C to 35°C (50°F to 95°F)

Base Model

Form Factor

Weight

Dimensions

Enclosure

Management Ports

Performance

AC Input Voltage/ Current

Power Supply

Hard Disk

CPU

Memory

Operating Temperature

Hardware Requirements: