SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Datasheet




Malware Analysis System
Next Generation Forensic Analysis of Advanced Targeted Attacks




Highlights                                 The FireEye Malware Analysis System (MAS) gives threat
•	 Streamlines and batches analysis        analysts hands-on control over powerful auto-configured
   of suspicious files, Web code,
                                           test environments to safely execute and inspect advanced
   and executables
                                           malware, zero-day, and targeted APT attacks embedded
•	 Reports in-depth on system-level
   OS and application changes to           in files, email attachments, and Web objects.
   file systems, memory, and registries
•	 Offers sandbox or live–mode             As cybercriminals tailor attacks to penetrate a specific business, user
   analysis to confirm zero-day exploits   account, or system, analysts need easy-to-use forensic tools that help
                                           them rapidly address very targeted malicious activities.
•	 Eliminates deployment headaches
   and tuning with a pre-configured
   environment, plus automated setup       Assess OS, browser and application attacks
   and teardown of virtual test images     The FireEye Virtual Execution (VX) engine empowers in-house analysts
•	 Dynamically generates malware           with a full 360-degree view of an attack, from the initial exploit to
   intelligence for immediate local        callback destinations and follow-on binary download attempts. Through
   protection via Central Management       a pre-configured, instrumented Windows virtual analysis environment,
   System (CMS) integration                the VX engine fully executes suspicious code to allow deep inspection
•	 Captures packets to allow analysis      of common file formats, email attachments, and Web objects. FireEye
   of malicious URL session and            MAS inspects single files or batches of files for malware and tracks
   code execution                          outbound connection attempts across multiple protocols.
•	 Supports custom YARA rules
   (compatible with version 1.3)           Spend time analyzing, not administering
•	 Includes AV-Suite checks to             The VX engine features virtualized PC hardware running full-fledged
   streamline incident response            versions of Microsoft operating systems as well as browsers, plug-ins, and
   prioritization                          other third-party applications. The MAS appliance frees administrators
•	 Supports remote third-party AAA         from time-consuming setup, baselining, and restoration of the virtual
   (Authentication, Authorization, and     machine environments used in manual malware analysis.
   Accounting) network service access
   in addition to local authentication
                                           Choose sandbox or honeypot analysis modes
                                           In sandbox mode, researchers can witness the execution path of
                                           particular malware samples as well as generate a dynamic and
                                           anonymized profile of the attack that can be distributed through the


MAS dashboard shows status of completed    “One of the big attractions of the FireEye solution is that analysis is
and pending VX engine analysis              performed in a virtual execution environment to determine if a flagged
                                            piece of code actually is a threat. The detailed information that is
                                            generated allows us to pinpoint the optimal option for resolving an issue.
                                            It puts us in the position of knowing exactly how to react.”
                                           — Director of Cyber Security, Energy Sector
Datasheet



CMS to other FireEye Web, Email, and File Malware                               objects for threats specific to the organization.
Protection System (MPS) appliances. Malware                                     The custom rules are used as part of the VX engine
attack profiles include identifiers of malware code,                            analysis to identify likely malicious objects as well
exploit URLs, and other sources of infections and                               as objects previously classified as malicious.
attacks. Also, malware communication protocol
characteristics are shared to provide dynamic                                   Global malware protection network
blocking of data exfiltration attempts.                                         Malware Analysis Systems can automatically share
                                                                                malware forensics data to other MPS appliances via
In addition to sandbox analysis, FireEye offers a
                                                                                the FireEye CMS to block outbound data exfiltration
live, on-network “honeypot” mode for full malware
                                                                                attempts and stop inbound known attacks. MAS
lifecycle analysis. Today’s advanced malware
                                                                                threat data can also be shared via the FireEye
circumvents traditional security by unfolding in
                                                                                Malware Protection Cloud (MPC) to protect against
multiple stages. The first vulnerability exploit stage
                                                                                emerging attacks.
simply establishes a beachhead for criminals.
                                                                                With pre-configured virtual execution engines
FireEye integrates inbound and outbound inspections
                                                                                eliminating the need for tuning heuristics, the
across multiple protocols for comprehensive threat
                                                                                FireEye MAS saves administrators setup time and
analysis of OS, Web, email, and application threats
                                                                                configuration headaches. This is an easy-to-manage,
that attack across multiple vectors.
                                                                                cost-effective solution that helps threat researchers
                                                                                analyze advanced targeted attacks without adding
YARA-based rules enables customization
                                                                                network and security management overhead.
The MAS supports custom YARA rule importation to
specify byte-level rules and quickly analyze suspicious


Technical Specifications

                                                  MAS 4310                                         MAS 7300

  Form Factor                                     1U Rack-Mount                                    1U Rack-Mount

  Weight                                          30 lbs (13.6 Kg)                                 30 lbs (13.6 Kg)

  Dimensions (WxDxH)                              17.2” x 25.6” x 1.7” (43.7 x 65.0 x 4.3 cm)      17.2” x 25.6” x 1.7” (43.7 x 65.0 x 4.3 cm)

  Enclosure                                       Fits 19-Inch Rack                                Fits 19-Inch Rack

  Management Interfaces                           (2) 10/100/1000 BASE-T Ports                     (2) 10/100/1000 BASE-T Ports

  Monitoring Interfaces                           N/A                                              N/A

  Performance Rating                              25,000 objects per day                           50,000 objects per day

  AC Input Voltage                                Auto-switching 100 ~ 240 VAC Full Range          Auto-switching 100 ~ 240 VAC Full Range

  AC Input Current                                8.5-6 A                                          8.5-6 A

  Power Supply/RAID                               Dual / 2 SAS HDD in HW RAID1                     Dual / 2 SAS HDD in HW RAID1

  Frequency                                       50-60 Hz                                         50-60 Hz

  AC Power                                        700 W Max                                        700 W Max

  Ambient Temp                                    40° C                                            40° C




© 2012 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may
be trademarks or service marks of their respective owners. – DS.MAS.022012



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

Contenu connexe

Plus de FireEye, Inc.

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontFireEye, Inc.
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat FireEye, Inc.
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails FireEye, Inc.
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent ThreatFireEye, Inc.
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye, Inc.
 

Plus de FireEye, Inc. (16)

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 

FireEye Malware Analysis

  • 1. Datasheet Malware Analysis System Next Generation Forensic Analysis of Advanced Targeted Attacks Highlights The FireEye Malware Analysis System (MAS) gives threat • Streamlines and batches analysis analysts hands-on control over powerful auto-configured of suspicious files, Web code, test environments to safely execute and inspect advanced and executables malware, zero-day, and targeted APT attacks embedded • Reports in-depth on system-level OS and application changes to in files, email attachments, and Web objects. file systems, memory, and registries • Offers sandbox or live–mode As cybercriminals tailor attacks to penetrate a specific business, user analysis to confirm zero-day exploits account, or system, analysts need easy-to-use forensic tools that help them rapidly address very targeted malicious activities. • Eliminates deployment headaches and tuning with a pre-configured environment, plus automated setup Assess OS, browser and application attacks and teardown of virtual test images The FireEye Virtual Execution (VX) engine empowers in-house analysts • Dynamically generates malware with a full 360-degree view of an attack, from the initial exploit to intelligence for immediate local callback destinations and follow-on binary download attempts. Through protection via Central Management a pre-configured, instrumented Windows virtual analysis environment, System (CMS) integration the VX engine fully executes suspicious code to allow deep inspection • Captures packets to allow analysis of common file formats, email attachments, and Web objects. FireEye of malicious URL session and MAS inspects single files or batches of files for malware and tracks code execution outbound connection attempts across multiple protocols. • Supports custom YARA rules (compatible with version 1.3) Spend time analyzing, not administering • Includes AV-Suite checks to The VX engine features virtualized PC hardware running full-fledged streamline incident response versions of Microsoft operating systems as well as browsers, plug-ins, and prioritization other third-party applications. The MAS appliance frees administrators • Supports remote third-party AAA from time-consuming setup, baselining, and restoration of the virtual (Authentication, Authorization, and machine environments used in manual malware analysis. Accounting) network service access in addition to local authentication Choose sandbox or honeypot analysis modes In sandbox mode, researchers can witness the execution path of particular malware samples as well as generate a dynamic and anonymized profile of the attack that can be distributed through the MAS dashboard shows status of completed “One of the big attractions of the FireEye solution is that analysis is and pending VX engine analysis performed in a virtual execution environment to determine if a flagged piece of code actually is a threat. The detailed information that is generated allows us to pinpoint the optimal option for resolving an issue. It puts us in the position of knowing exactly how to react.” — Director of Cyber Security, Energy Sector
  • 2. Datasheet CMS to other FireEye Web, Email, and File Malware objects for threats specific to the organization. Protection System (MPS) appliances. Malware The custom rules are used as part of the VX engine attack profiles include identifiers of malware code, analysis to identify likely malicious objects as well exploit URLs, and other sources of infections and as objects previously classified as malicious. attacks. Also, malware communication protocol characteristics are shared to provide dynamic Global malware protection network blocking of data exfiltration attempts. Malware Analysis Systems can automatically share malware forensics data to other MPS appliances via In addition to sandbox analysis, FireEye offers a the FireEye CMS to block outbound data exfiltration live, on-network “honeypot” mode for full malware attempts and stop inbound known attacks. MAS lifecycle analysis. Today’s advanced malware threat data can also be shared via the FireEye circumvents traditional security by unfolding in Malware Protection Cloud (MPC) to protect against multiple stages. The first vulnerability exploit stage emerging attacks. simply establishes a beachhead for criminals. With pre-configured virtual execution engines FireEye integrates inbound and outbound inspections eliminating the need for tuning heuristics, the across multiple protocols for comprehensive threat FireEye MAS saves administrators setup time and analysis of OS, Web, email, and application threats configuration headaches. This is an easy-to-manage, that attack across multiple vectors. cost-effective solution that helps threat researchers analyze advanced targeted attacks without adding YARA-based rules enables customization network and security management overhead. The MAS supports custom YARA rule importation to specify byte-level rules and quickly analyze suspicious Technical Specifications MAS 4310 MAS 7300 Form Factor 1U Rack-Mount 1U Rack-Mount Weight 30 lbs (13.6 Kg) 30 lbs (13.6 Kg) Dimensions (WxDxH) 17.2” x 25.6” x 1.7” (43.7 x 65.0 x 4.3 cm) 17.2” x 25.6” x 1.7” (43.7 x 65.0 x 4.3 cm) Enclosure Fits 19-Inch Rack Fits 19-Inch Rack Management Interfaces (2) 10/100/1000 BASE-T Ports (2) 10/100/1000 BASE-T Ports Monitoring Interfaces N/A N/A Performance Rating 25,000 objects per day 50,000 objects per day AC Input Voltage Auto-switching 100 ~ 240 VAC Full Range Auto-switching 100 ~ 240 VAC Full Range AC Input Current 8.5-6 A 8.5-6 A Power Supply/RAID Dual / 2 SAS HDD in HW RAID1 Dual / 2 SAS HDD in HW RAID1 Frequency 50-60 Hz 50-60 Hz AC Power 700 W Max 700 W Max Ambient Temp 40° C 40° C © 2012 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. – DS.MAS.022012 FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com