In this session we’ll discuss how to:
• Query the ReversingLabs malware repository for any previous classifications
• Manage your file analysis to automatically upload samples from other tools for analysis
• Search for file samples leveraging the pre-correlated relationships between file samples and the associated meta-data generated.
• Pivot to search for URI’s, stolen certificates, and functionally similar samples.