Malware analysts rejoice! A public submission interface for the CWSandox

Published: 2006-09-19
Last Updated: 2006-09-19 19:29:01 UTC
by William Salusky (Version: 1)
0 comment(s)
The public availability of a submission interface into the CWSandbox is finally at hand.

The CWSandbox has been a somewhat closely held tool in the professional security and AV researcher community for many months now.  The CWSandbox results offer near immediate insight into the actions of malicious code execution on win32 based systems which in turn offers you, the affected party some quick intel on what might be happening on your network!

Please be kind and submit samples that you have vetted in some way as malicious.  I'm sure this project would not be interested in receiving copies of your %SYSTEM% directory.

You can submit your malicious code samples via the sample web submission form at:
https://luigi.informatik.uni-mannheim.de/submit.php

CWSandbox results containing the sandbox/AV results are emailed to the submitter address.

This sandbox environment currently tracks malicious code variants against only three free/unnamed AV products at the moment.  I'm confident that this project would be interested in hearing from commercial AV vendors willing to offer unix based solutions to further their detection effort.

Handler on duty
W

Keywords:
0 comment(s)

Comments


Diary Archives