RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Products & TechnologyDecember 2, 2025

RL Threat Intelligence: Context Changes Everything

Learn how the ReversingLabs Browser Extension operationalizes RL threat intelligence cloud in powerful ways.

Jim Wojno
Jim Wojno, Director of Product Management, Integrations Jim Wojno
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
ReversingLabs Threat Intelligence: Context Changes Everything

ReversingLabs was founded by a group of forward-thinking malware analysis and reverse engineering experts on the principle of building trust and assurance across every digital asset. This guiding mission has manifested itself into the world’s largest and most powerful threat intelligence cloud, with a repository of over 422 billion analysis results of both malware and goodware samples.

The knowledge and insights provided by our authoritative threat intelligence arms ReversingLabs customers with up-to-the second visibility into the latest and most impactful threats, driving more efficient detection and prevention while also empowering threat hunting and remediation efforts. 

Introducing the ReversingLabs Browser Extension

The newly-released ReversingLabs Browser Extension empowers customers to operationalize the RL threat intelligence cloud in new and powerful ways. In this blog series, I explore several use cases to demonstrate how the ReversingLabs Browser Extension strengthens security and delivers customer value. The use cases include:

Introducing the ReversingLabs Browser Extension

So many incidents, so little time…

Use Case 1: Enabling faster and more effective alert triage and threat hunting. 

Customers I’ve worked with have repeatedly expressed frustration over the manual effort involved in alert triage: 

  • Is this alert a true or a false Positive? 
  • Is the alert appropriately prioritized? 
  • Is this triggering process benign or malicious?
  • If it’s malicious, how dangerous is it? Is this some random adware annoyance or is this something that’s really sinister and dangerous?

Most security solutions expect you to take their word for it when they trigger an alert. Inherent trust isn’t an effective strategy and can lead to wasted time and resources. Other tools used for alert triage and validation require the analyst to shift their focus away from their investigation tool and lack a clear, concise verdict requiring the analyst to make a judgement call on whether the triggering file or process is malicious or not. 

In my experience, unclear verdicts only generate more questions from security leadership:

  • If 3 out of 40 AV engines list a file as malicious, does that mean it definitely is malicious?
  • Why only 3 and not all 40?
  • If it’s less than 5 does that mean it’s probably ok or is it possible those 3 detection engines are just better than the others at identifying malware and the others haven’t caught up yet? 

These exercises are usually reactive, require manual effort and multiple tools — all of which adds time and cost to security investigations where every second and dollar counts.

Empowering Incident Responders and Threat Hunters

What if your analysts could instantly access the industry’s largest and most trusted source of threat intelligence to perform alert triage and validation without ever shifting focus away from their investigation tool. Sounds good, right?

A capability like this would drive faster mean time to detect (MTTD), and mean time to respond (MTTR), and allow immediate validated prioritization of the alert being triaged. This ensures incident response efforts are focused on the issues with the greatest potential for harm.

Most modern security tools used by SOC analysts and threat hunters are browser based. ReversingLabs’ Browser Extension automatically highlights Indicators of Compromise (IoCs) displayed on-screen (hash, URL, domain, IP address), providing deep contextual threat intelligence with a single click, without leaving the screen the analyst is working in. Additionally, the ReversingLabs Browser Extension provides:

  • Clear and specific verdicts: Malicious or Benign - no guessing needed.
  • Clear and concise risk score: Drives decisive and accurate prioritization.
  • Malware family assignment: Allows accurate classification.
  • Classification reason: Exposed how and why ReversingLabs came to a verdict.
  • Deeper analysis: Allows teams to drill into results with a single click.

When combined with Spectra Analyze integrations for industry leading EDRs and XDRs like Crowdstrike Falcon and Palo Alto Cortex (more coming), the extension becomes even more powerful. Spectra Analyze automatically retrieves suspicious files from quarantine and performs deep analysis proactively, so the full analysis results are available before the investigation even begins, ensuring the analyst has the latest contextual threat intelligence at their fingertips in the crucial initial moments.

Here's a look at a real world example.

A real world example

Our SOC analyst has received a malware alert in Crowdstrike. In reviewing the available information (see highlighted items), there’s really not that much to go on. We can see the following:

  • The detection is rated “High”
  • A file was written to a user’s Downloads folder under the “cool-game\lets-play” directory
  • The file was quarantined due to a Machine Learning alert

The alert gives us no indication if this is something serious or if this is just generic malware which is more of an annoyance. Crowdstrike provides a “Copy to Clipboard” function for the quarantined hash so what happens if our SOC analyst decides to check it on VirusTotal? After opening a new browser window and pasting it into the search function we get the following:

A malware alert in Crowdstrike

Not super helpful, is it? This is where the ReversingLabs Browser Extension comes through. 

Without requiring a copy to your clipboard, or shifting focus away from the investigation, you simply click the red RL logo next to the highlighted hash to expose a side panel containing rich contextual ReversingLabs threat intelligence on the offending hash.

ReversingLabs threat intelligence

And that's usable threat intelligence. At a glance you now know (see highlighted sections above):

  • This is a bona fide Critical True Positive with a Risk Score of 10.
  • The Threat Name tells us that it’s not some generic malware — it’s ransomware that could cause immense damage to our organization.
  • Only half of enterprise AV engines recognize this as a threat (which could explain why the original alert was so generic). This threat can evade other defenses and may even be on other workstations — you just don’t know it yet.
  • This threat was first seen only a few days ago so this is either a brand new threat or a new variant of an existing threat (which helps explain the lack of AV engine coverage).
  • You now have multiple IOCs — md5, sha1, sha256 and imphash — that you can use to create blocking and detection rules to prevent this threat from being downloaded or executed by anyone else.
  • You can also use these IOCs to sweep your endpoints and determine if it’s anywhere else, so that you can properly scope the incident.
  • You also know the file type and size, so if this is detected on any other systems you can compare this, along with the hashes, to ensure it’s a match.

All of this comes from one mouse-click.

Now that you know this is serious with a click in the browser extension side panel, you can open the full report in Spectra Analyze and dive even deeper.

The full report in Spectra Analyze

Because of the integration between Spectra Analyze and Crowdstrike, this sample was analyzed before the alert was opened, and you can see some really important information from this, including:

  • Low prevalence — this is a targeted threat crafted to stay under the radar.
  • Decisive true positive from both static and dynamic analysis.
  • Risk score of 10. With a slider showing this is the highest possible rating from ReversingLabs, this is a very serious threat.
  • Multiple YARA rule hits, which can be used to identify and mitigate other, similar threats.
  • MITRE ATT&CK analysis showing some really concerning capabilities like Defense Evasion, Credential Access, and Lateral Movement to name just a few.
  • Network references including IOCs (domains, emails and IP addresses) which can be used to identify and block network traffic related to this threat.
  • And a number of artifacts you can pivot on to drill deeper: Tags (Actor, Techniques), Certificates, Functionally Similar Files, Interesting Strings, etc.

With the ReversingLabs Browser Extension, you have all of this rich contextual information at your fingertips — without ever shifting focus away from the investigation. In seconds, the investigation went from a poorly prioritized “Generic Malware” to a critical “5-Alarm-Fire Red-Alert Ransomware” with the crucial intelligence needed to not only mitigate this threat but identify and stop similar variants. 

This powerful capability can be leveraged in any EDR, SIEM, XDR or other investigative tool for highlighted IOCs on screen (hash, URL, domain, IP address) to provide the meaningful context needed to speed MTTD/MTTR and stop attacks before they can get a foothold.

In our next installment of this blog series, I’ll dive into detail on how the ReversingLabs Browser Extension can add an additional layer of protection above your EDR to prevent security incidents before they happen at the point of impact: the browser.

Driver

Description

Alert triage

Go from poorly prioritized “Generic Malware” to critical priority ransomware with a single click

Threat hunting

On the fly IOC look ups to perform instant verification of artifacts as benign or malicious, which drives faster MTTD/MTTR

The ReversingLabs Browser Extension is available now in the Microsoft Edge and Google Chrome stores at the links below. Please share your feedback and click the “Talk to an Expert” button if you’d like to learn more about how ReversingLabs can make your security operations more effective.

Google ChromeMicrosoft Edge

Talk with an Expert


Learn more with RL's Browser Extension Setup and Feature Preview video:


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Products & Technology

More Blog Posts

QR Code Phishing Is Evolving: Here’s How Your Detection Can Keep Up

QR Code Phishing Evolves: How to Keep Up

Here's what you need to know about the rise of quishing — and how your threat hunting team can get out in front of it.

Learn More about QR Code Phishing Evolves: How to Keep Up
QR Code Phishing Evolves: How to Keep Up
Why RL Built Spectra Assure Community

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Learn More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community
How a Simple YARA Rule Catches What AV Misses

ClickFix: YARA Rules Catch What AV Misses

Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze.

Learn More about ClickFix: YARA Rules Catch What AV Misses
ClickFix: YARA Rules Catch What AV Misses
Polyglot File Examination with Spectra Analyze

How to Examine Polyglot Files with Spectra Analyze

Here's how to assess a sample using Spectra Analyze in your environment — and create a YARA rule.

Learn More about How to Examine Polyglot Files with Spectra Analyze
How to Examine Polyglot Files with Spectra Analyze

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top