Most Malware today use multiple types of evasion techniques to get past security systems. While somewhat varied, they are all built upon the same premise.

They hide in a packer to resemble a legit file

And stay hidden in it until they find a safe, ultimate environment to unpack in.

To find out if a certain environment is ideal they send out a query

While the malware is investigating its environment for these running processes, it keeps any malicious code compressed in an encrypted state, where it cannot be detected. It only unpacks and executes this code when it can be sure none of the aforementioned security tools or compromising elements are in place.

This is where Minerva VR™ comes in

Minerva’s Environment Simulation Technology is built upon a simple premise. As the malware does not unpack or run the code in an environment that appears unsuitable, we can simulate such an environment and prevent the malware from executing.

so the malware stays asleep in the packer indefinitely

Most unknown malware today uses multiple types of evasion techniques to get past security systems. While somewhat varied, they are all built upon the same premise.

They hide in a packer to resemble a legit file

And stay hidden in it until they find a safe, ultimate environment to unpack in.

To find out if a certain environment is ideal they send out a query

While the malware is investigating its environment for these running processes, it keeps any malicious code compressed in an encrypted state, where it cannot be detected. It only unpacks and executes this code when it can be sure none of the aforementioned security tools or compromising elements are in place.

This is where Minerva VR™ comes in

Minerva VR™ is built upon a simple premise: As the malware does not unpack or run the code in an environment that appears unsuitable, Minerva simulates such an environment and prevents the malware from executing.

So the malware stays asleep in the packer indefinitely

Finally, Minerva Increases the value of your entire defense ecosystem by notifying your other tools of existence of the unknown malware.

Ready to see us in action?

Resources

Brochure: Anti-Evasion Platform

Block unknown threats that are designed to evade your existing defenses

Download >>

Webinar: Evasive malware is everywhere

Learn more about evasive malware in our webinar co-hosted with SANS Institute

Watch >>

Brochure: Ransomware Protection

Learn how to stop time on ransomware and avoid paying the ransom

Download >>
See All Resources >>