FireHunter6300 (V100R001 C60) Series Sandbox

Using virus- and reputation-based scanning, static analysis, and virtual execution technologies, as well as Huawei’s unique behavior pattern library, the FireHunter6000 series is capable of detecting unknown malicious files and providing accurate detection reports accordingly. It interworks with other security devices to quickly block advanced malicious files, preventing unknown threats from spreading and protecting core information assets for enterprises. The FireHunter is especially applicable to finance and government agencies, energy providers, and high-tech enterprises.

Comprehensively and accurately detect unknown threats

Comprehensive detection, preventing unknown threats:

  • Response within seconds to rapidly block unknown threats
  • C&C connection anomaly detection to discover outbound abnormal communications
  • APT IOC intelligence sharing to rapidly and accurately detect and warn on known APTs in the industry/area
  • Detailed threat reports that assist in O&M and quick decision making

Specifications

Category Description Detailed Description
Supported Operating Systems Windows XP, Windows 7, and Windows 10 Simulation of multiple types of operating systems, dynamic detection in a virtual execution environment
Protocols Supported in Traffic Restoration Restoration of multiple protocols traffic Restoration of HTTP, SMTP, POP3, IMAP, and FTP traffic
File Types Supported in Detection Compressed files GZ, RAR, CAB, 7ZIP, TAR, BZ2, and ZIP files
PE EXE, DLL, and SYS files (detection of 32-bit PE files not supported)
Office 97 to Office 2003 DOC, XLS, and PPT files
Office 2007 and later DOCM, DOTX, and DOTM files
XMSM, XMTX, XLTM, and XLAM files
PPTM, POTX, POTM, PPSX, PPSM, and PPAM files
RTF RTF files
Image JPG, JPEG, PNG, TIF, GIF, and BMP files
WPS WPS, DT, and DPS files
Web page HTM, HTML, and JS files
Video SWF files
Java JAR and CLASS files
PDF PDF files
Python PY, PYC, and PYO files
Executable scripts CMD, BAT, VBS, VBE, RUBY, PS1, and PY files
Built-in Antivirus Detection The sandbox has the antivirus function built in and supports the detection of CHM, ASP, PHP, COM, and ELF files, in addition to the preceding file types
C&C Anomaly Detection C&C malicious server external connection detection DGA domain name detection, algorithm-based detection of random malicious domain names for C&C external connections
Report Output Output of detailed malicious file detection reports that contain the file detection details, threat behavior category, and dynamic behavior analysis
Machine-readable IOC Threat Intelligence Output of abundant machine-readable Indicators Of Compromise (IOC) for intelligence sharing between northbound and southbound interfaces

Algunas de nuestras REPRESENTACIONES