Comodo/Xcitium Valkyrie Verdicts


Machine Learning Analysis Completed
:warning:The uploaded file looks like a malicious file
Static Precise Trojan Detector 13 :Malware REASON:Trojan.Win32.Agent@10


:warning:FLS Verdict:The uploaded file is Blacklisted


Machine Learning Analysis Completed
:warning:The uploaded file looks like a malicious file
Based on the sections entropy check! file is possibly packed
Header Checksum is zero!

Explain why you are writing these comments with pictures here? What is the benefit of your comments for other forum users?
I just can’t understand the meaning of this action.

3 Likes

i like Valkyrie and its amazing and i upload files daily to Valkyrie so i share the results here whats the problem? and also i share the results so users can see how powerfull Valkyrie is.

1 Like

A filter like this in uBlock can help.

forums.comodo.com##.raw-topic-link:has-text(Comodo/Xcitium Valkyrie Verdicts):upward(tr[id])
1 Like


Machine Learning Analysis Completed
:white_check_mark:Dynamic Analysis Completed

1 Like


Malicious
Machine Learning Analysis Completed
The uploaded file looks like a malicious file
All Detectors Clean

1 Like


Malicious
Machine Learning Analysis Completed
The uploaded file looks like a malicious file
The Size Of Raw data is valued illegal! Binary might crash your disassembler/debugger


Malicious
Machine Learning Analysis Completed
The uploaded file looks like a malicious file
Header Checksum is zero!


Comodo Automated Malware Analysis System_tab
CAMAS tab
CAMAS.Suspicious

Comodo Automated Malware Analysis System (CAMAS)

Comodo Automated Malware Analysis System (CAMAS) is a cloud-based malware analysis platform developed by Comodo. It is a powerful tool used to identify and analyze suspicious files, such as executables, scripts, and documents, in order to determine whether they are malicious.

Here’s how CAMAS works:

  1. Submission: Files are submitted to CAMAS for analysis, either manually or automatically through integrations.
  2. Sandbox Environment: The submitted file is executed in a virtualized environment, called a sandbox. This isolated environment allows the file to run without affecting the user’s computer.
  3. Behavioral Analysis: CAMAS monitors the file’s behavior within the sandbox, looking for any malicious actions, such as:
    • Network communication: Attempting to connect to known malicious servers.
    • File manipulation: Modifying or deleting critical system files.
    • Registry modifications: Making changes to the system registry.
    • Process creation: Launching other malicious processes.
  4. Malware Detection: Based on the observed behavior, CAMAS determines whether the file is malicious. It uses a combination of techniques, including:
    • Signature-based detection: Comparing the file to a database of known malware signatures.
    • Heuristic analysis: Detecting suspicious patterns in the file’s behavior.
    • Machine learning: Using AI algorithms to identify malicious behavior.
  5. Reporting: Once the analysis is complete, CAMAS generates a detailed report that includes:
    • File information: File type, size, hash, etc.
    • Behavioral analysis: Actions performed by the file in the sandbox.
    • Malware detection: Verdict on whether the file is malicious.
    • Threat intelligence: Information about the malware family, origin, and known attack vectors.

Benefits of CAMAS:

  • Automated analysis: Reduces the time and eff
1 Like


Machine Learning Analysis Completed
Malicious
The uploaded file looks like a malicious file

Timestamp value suspicious
Header Checksum is zero!
Enrty point is outside the 1st(.code) section! Binary is possibly packed