A forum for reverse engineering, OS internals and malware analysis 

Forum for announcements and questions about tools and software.
 #1854  by Tesk
 Sun Aug 08, 2010 1:58 pm
After playing around a bit with your tool, it has become a normal part of my analysis routine.

Anyway, I miss a function when you are in automatic analysis, you should save a log file of each file processed automatic and maybe make the Malware Analyzer able to read logfiles from a folder, so you can process old logs.

Maybe some command-line switches too?

EDIT: I see it automatically saves a logfile after being processed.

Anyway, what about maybe 3 folders which it will sort the files based on their actions - like "Suspecious" - "Malicious" - "Safe" - so you know what files you should put an interest into.
 #3247  by gjf
 Thu Oct 28, 2010 10:40 am
Attached is simple winlocker file which has no malware activity according to analyzer.

Sure it can be easily investigated manually - just for future improvements :)
Attachments
Password is infected
(151.81 KiB) Downloaded 28 times
 #3521  by Buster_BSA
 Tue Nov 16, 2010 6:22 pm
Released BSA 1.24.

No major changes this time; just a few minor additions and a bugfix.

* Added help inside BSA through a .CHM file.

* BSA will not modify HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SbieSvc value

* Fixed a bug when processing in automatic mode.
 #3956  by Buster_BSA
 Sun Dec 12, 2010 4:58 pm
gjf wrote:Looks like I have issues on Windows 7 Ultimate. Is it supported - if so, can we discuss?
Sure, let me know.

Don´t forget to tell me what version of BSA and Sandboxie you are using.
  • 1
  • 4
  • 5
  • 6
  • 7
  • 8
  • 32