Today's Core Dump is brought to you by ThreatPerspective

Threat Intelligence

Scaling Up Malware Analysis with Gemini 1.5 Flash

Richer Contextual Information: Beyond improved decompiled code, we're investigating methods to provide the model with richer contextual data. This might include visual representations like data flow diagrams and control flow graphs, or even a complete export of IDA Pro's IDB. This additional information can provide valuable insights into the program's overall structure and logic, enabling a more thorough and accurate analysis.

Google Threat Intelligence: The Next Evolution


This is just the beginning of our exploration into leveraging AI for large-scale threat analysis. We are excited to announce that these types of code analysis reports will soon be integrated into VirusTotal's Code Insight section. This integration will provide the VirusTotal community with valuable insights into the behavior of binary files, powered by the speed and scalability of Gemini 1.5 Flash.

For an even more powerful analysis experience, we are developing an advanced version of this pipeline within Google Threat Intelligence. This implementation will leverage the capabilities of Gemini 1.5 Pro enhanced by AI agents that can use specialized malware analysis tools and correlate threat information from across Google, Mandiant, and VirusTotal. This advanced analysis will be available within our Private Scanning service, ensuring the confidentiality of the content processed. Watch our recent webinar for more on Gemini in Google Threat Intelligence.

We will continue to share our progress and new advancements in AI-driven threat analysis as we strive to make the digital world a safer place. Here at GSEC Malaga, we are dedicated to pushing the boundaries of what's possible in cybersecurity and exploring new ways to apply AI to protect users from evolving threats.

Samples Details


The following table contains details on the binary samples discussed in this post.



Filename

SHA-256

goopdate.dll

0d2115d3de900bcd5aeca87b9af0afac
90f99c5a009db7c162101a200fbfeb2c


BootstrapPackagedGame-Win64-Shipping.exe

07db922be22e4feedbacea7f92983f51
404578bd0c495abaae3d4d6bf87ae6d0


svrwsc.exe

0cdb71e81b07247ee9d4ea1e1005c945
4a5d3eb5f1078279a905f0095fd88566


colto.exe

091e505df4290f1244b3d9a75817bb1e
7524ac346a2f28b0ef3c689c445beb45


3DViewer2009.exe

08f20e0a2d30ba259cd3fe2a84ead658
0b84e33abfcec4f151c5b2e454602f81


AdvProdTool.exe

04af0519d0dbe20bc8dc8ba4d97a791a
e3e3474c6372de83087394d219babd47





















Published: 2024-07-15T14:00:00











© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us