nice to see that something has changed in valkyrie . The new “Kill Chain Report Section” look’s very nice ! Still not quite “finished” yet, I believe, but i like it … !!! :-TU Very useful, additional, information for the experienced user or for those who want it to be .“Severity Rating” could be integrated in Valkyrie Verdicts for Sandboxed Application’s (?!) For example, a Alarm-Popup with a final verdict from valkyrie and extra “Severity Rating” indicator . It could be shown as additional information in all Applications who use Comodo’s Containment Technology . For files that could not be analyzed completly or correctly , this might be useful too . Maybe it’s nessesary to write a kind of “Valkyrie self checking algorithm”. >:-D If valkyrie does not find enough indicators to issue a safe or complete analysis, then a rating with regard to the number of found indicators make sense (As the Severity Rating Indicator already shows for successfully analyzed files) ! And for this case a another hint to wait for the human expert analysis would also be good . But I’m also not sure if there should be anything else between clean or malicious . 88)
Keep it up … !!!
p.s And thank you very much for integrating reporting information Mail’s and executed Application Screenshots !!! :-TU
p.s. yeah … I noticed that even more details were added to the reports . 64 Pages!Respekt ! :-TU
And I see the kill chain report is available under the valkyrie final verdict when looking at sample summary. Pretty cool feature and I’m sure it will take time for it to be available to more submissions.
I want to clarify this Kill-Chain report creation: currently, when you login to your account at http://valkyrie.comodo.com, you may choose a Malware sample from your list, and you’ll see a button as “Send to Kill Chain Analysis” (Screenshot by Lightshot). This button appears only for malware files.
When you click, the report is being generated automatically in the backend, and takes usually not more than 3-4 minutes. Then you may access the report through the sample’s main UI, where you’ll see a “Kill Chain Report” button (Screenshot by Lightshot).
User needs to manually trigger the report generation for now. With next hotfix, we’ll start the generation of the report in the backend, as soon as it’s marked as malware.
Hi guys, I previously informed about a hotfix that will automatically create the kill-chain report for malware files. On Saturday, Valkyrie team did a hotfix deployment and now we have this feature. All new detections as malware have kill-chain reports created as well.
The creation may take around 5 minutes, as we’re performing extensive dynamic analysis to get all details. So please be patient after you submit a malware sample and wait for kill-chain report.