FireHunter6300 (V100R001 C60) Series Sandbox
Using virus- and reputation-based scanning, static analysis, and virtual execution technologies, as well as Huawei’s unique behavior pattern library, the FireHunter6000 series is capable of detecting unknown malicious files and providing accurate detection reports accordingly. It interworks with other security devices to quickly block advanced malicious files, preventing unknown threats from spreading and protecting core information assets for enterprises. The FireHunter is especially applicable to finance and government agencies, energy providers, and high-tech enterprises.
Comprehensively and accurately detect unknown threats
Comprehensive detection, preventing unknown threats:
- Response within seconds to rapidly block unknown threats
- C&C connection anomaly detection to discover outbound abnormal communications
- APT IOC intelligence sharing to rapidly and accurately detect and warn on known APTs in the industry/area
- Detailed threat reports that assist in O&M and quick decision making
Specifications
Category | Description | Detailed Description |
Supported Operating Systems | Windows XP, Windows 7, and Windows 10 | Simulation of multiple types of operating systems, dynamic detection in a virtual execution environment |
Protocols Supported in Traffic Restoration | Restoration of multiple protocols traffic | Restoration of HTTP, SMTP, POP3, IMAP, and FTP traffic |
File Types Supported in Detection | Compressed files | GZ, RAR, CAB, 7ZIP, TAR, BZ2, and ZIP files |
PE | EXE, DLL, and SYS files (detection of 32-bit PE files not supported) | |
Office 97 to Office 2003 | DOC, XLS, and PPT files | |
Office 2007 and later | DOCM, DOTX, and DOTM files XMSM, XMTX, XLTM, and XLAM files PPTM, POTX, POTM, PPSX, PPSM, and PPAM files |
|
RTF | RTF files | |
Image | JPG, JPEG, PNG, TIF, GIF, and BMP files | |
WPS | WPS, DT, and DPS files | |
Web page | HTM, HTML, and JS files | |
Video | SWF files | |
Java | JAR and CLASS files | |
PDF files | ||
Python | PY, PYC, and PYO files | |
Executable scripts | CMD, BAT, VBS, VBE, RUBY, PS1, and PY files | |
Built-in Antivirus Detection | The sandbox has the antivirus function built in and supports the detection of CHM, ASP, PHP, COM, and ELF files, in addition to the preceding file types | |
C&C Anomaly Detection | C&C malicious server external connection detection | DGA domain name detection, algorithm-based detection of random malicious domain names for C&C external connections |
Report Output | Output of detailed malicious file detection reports that contain the file detection details, threat behavior category, and dynamic behavior analysis | |
Machine-readable IOC Threat Intelligence | Output of abundant machine-readable Indicators Of Compromise (IOC) for intelligence sharing between northbound and southbound interfaces |