| Static Analysis | Behavioral Analysis | Code Analysis | Memory Analysis |
|---|---|---|---|
![]() | ![]() | ![]() ![]() | ![]() ![]() ![]() |
![]() | ![]() | ![]() | ![]() ![]() ![]() |
![]() | ![]() | ![]() | ![]() |
![]() | ![]() ![]() ![]() | ![]() | ![]() ![]() ![]() |
![]() ![]() ![]() | ![]() ![]() | ![]() ![]() ![]() | |
![]() ![]() ![]() | ![]() | ![]() ![]() ![]() | |
![]() | ![]() | ![]() ![]() ![]() | |
![]() | ![]() | ||
![]() ![]() ![]() | ![]() | ![]() | |
![]() | ![]() ![]() ![]() | ![]() ![]() | |
![]() | ![]() | ![]() ![]() ![]() | |
![]() | ![]() ![]() | ||
![]() | |||
![]() |
This additional tools are not directly used to analyze a malware sample, but support the process of it by simplifying e.g. the decryption of encypted or encoded parts or commands
| Name | pros | Cloud | on Premise | Analysis Hosts |
|---|---|---|---|---|
| JoeSanbox | Free accounts with limited number of analysis available | ✓ | ✓ | ![]() ![]() ![]() ![]() ![]() |
| Hybrid Analysis | Free accounts with limited number of analysis available | ✓ | ![]() ![]() ![]() | |
| Cuckoo Sandbox | "The Standard" for an open source sandbox | ✓ | ![]() ![]() ![]() ![]() ![]() | |
| Triage | Free accounts with limited number of analysis available | ✓ | ✓ | ![]() ![]() ![]() ![]() |
| Any Run | Free accounts with limited number of analysis available | ✓ | ![]() |
Windows ![]() |
OSX ![]() |
Linux ![]() |
iOS ![]() |
Android ![]() |