Malware Analysis

We carry out in-depth malware analysis to understand how it can get inside the perimeter, how it works and impacts the infected system. 

Results

You get a detailed report with the results of the analysis, a list of recommendations on how to mitigate similar attacks in the future. The report contains:

  • Malware operation algorithm and functionality;
  • Possible impact on the infected system;
  • Analysis of additional modules, downloaded from the Internet;
  • Comparison with other samples of malware; 
  • Results of C&C servers detection and blocking;
  • Recommendations on malware removal.

Service provision conditions

You can order one investigation or get subscription for analysis of particular number of malware samples per month. 


Order

Reasonable and appropriate measures are taken to ensure that your personal data is protected from unauthorized access or modification, unlawful destruction, and improper use. No information provided by you will be made available to third parties. Personal data will be held only for as long as is necessary for the purpose for which it is provided and, in any event, will only be kept for 24 months after any application you have made has been completed. By submitting your personal information, you consent to the use of your information as set out in this statement.