Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
All of the releases of Threat.Zone is listed here!

v2.8.0 - latest

v2.7.2

v2.7.1

v2.7.0

v2.6.1

v2.6.0

v2.5.2

v2.5.1

v2.5.0

v2.4.0

v2.3.0

v2.2.0

v2.1.0

v2.0.0

v1.4.0

v1.3.0

v1.2.0

v1.1.0

v1.0.0


We've expanded our Static Scan capabilities to include APK and ELF file formats. You can now analyze Android applications and Linux executables without execution, providing deeper insights into potential threats across multiple platforms.
Public API now provides access to behaviors! You can programmatically access submission behaviors, enabling better integration with your security workflows and automated analysis systems.
Concurrency issues that occasionally affected submissions have been resolved.
Threat.Zone is Launched!
Our newest platform is called Threat.Zone was launched on the 19th of August.
Open In Browser is here! Now, you can put a URL and open this URL in the dynamic scan environment to observe its behavior in a controlled setting.
Several important fixes have been implemented. We've fixed the URL Analysis IP Check, resolved submission chart performance issues, addressed URL Analysis protocol detection, and corrected User Agent problems affecting URL access.
We've completely revamped our network analysis capabilities with dedicated pages for different network protocols. These enhanced views provide much more detailed analysis of malware network communication patterns.
Our new network analysis pages provide comprehensive visibility into malware communications. View HTTP requests, monitor DNS queries for C2 detection, track TCP/UDP communications, identify network threats, and use our integrated Wireshark interface for detailed packet analysis.
Dynamic MIMEType check had some difficulties when determining the extension of some office (CFB) files. This issue has been resolved, ensuring more accurate file type detection and appropriate handling of various Microsoft Office formats.
We're excited to announce our new URL Analysis feature! Now you can easily analyze suspicious URLs directly in Threat.Zone, examining domain details, IP information, WHOIS data, and threat intelligence without risking your systems. The comprehensive dashboard provides detailed insights into website metadata, blacklist status, DNS records, SSL certificates, and extracted files.
Coming Soon: Virustotal URL Engine is on the way!
Public API now sanitizes filenames, which resolves initialization errors during submission start. This ensures smoother operation when handling files with special characters or problematic names.
We've added NSRL (National Software Reference Library) Database Check to Static Scan! This allows you to quickly identify known & benign files and focus on potentially malicious content.
Here is a quick review of how we show Real Filename & SHA256 of the given file, also "benign" tag is added after the file is found on the database!
Cookie Error in the Firefox browser has been resolved, improving the overall browsing experience within our analysis environment.
Since we’ve added new functionality to our system, which is Static Scan, we want our scan page to be much more flexible. Check it out at this link!
We had a search bar where you choose the hash type and type the hash, click the search button blah blah. Now just copy and paste the hash to the search table, and you are good to go!
Public and My Submissions pages are critical for us and our users cause’ it is the place where you discover new malware samples. So we thought that maybe we can create a better experience by adding filtering to labels and doing minor UI changes. You can check it out and give us feedback!
Since we add Static Scan to our system, it was obvious that re-analyze should change too. We changed the whole experience about it and right now you can scan both statically and dynamically a submission, depending on their size/extension too.
We had the functionality of downloading the sample from the UI but one of our API users told us that it would be awesome to have this functionality in Public API too, so we added it!
PCAP Analyzer is tracking network requests much more precisely right now.
There were some extension problems while trying to install additional files from Public API, fixed.
Listing submissions from the Public API functionality had some problems with MIMETypes, fixed.

Behaviour analysis performance has been significantly improved. Searches and other filters are now extremely fast, enabling more efficient threat investigation!




Some of our customers had problems while trying to register to our system, so we’ve created a brand new system. Right now users are getting verification code to their mails, which is much more easier!
Now files that you’ve sent is can be double checked by Dynamic MIMEType Checker! Enable it to analyze file by its real extension!
Last release we have released Threat.Zone Static Scanner and it is loved by our users. But extension limitation was there and it really bothered us. Now Threat.Zone Static Scanner accepts all kinds of files!
We had the functionality of downloading the HTML Report from the UI but one of our API users told us that it would be awesome to have this functionality in Public API too, so we added it!
Two Factor Modal’s look has changed!
CSI Module had a Start Action problem, fixed.
Login modal had a problem that it was appearing to the authenticated users, fixed.
500 page was appearing on not-buggy situations, fixed.
URL Analysis capability is now available through our Public API! Integrate URL scanning directly into your security workflows and applications. You can access the docs here: https://app.threat.zone/public-api/docs
Public API sandbox requests now have an "auto" option, which enables you to automatically fill the configuration for dynamic scan. This simplifies the submission process and ensures optimal scan settings.
Submission report configuration is now visible in the submission page! Get complete transparency into how your scans are configured.
Submission entrypoint is now available in the submission page! You can see which file has been selected in ZIP, RAR, TAR.GZ, and other countless compressed files to be executed in the dynamic scan environment and other analysis
Old plans page had a much more boring look, so we decided to change that. We also added the much popular plan that our users use!
Some of our users told us that submission cycle page (the page that you see after submitting a file) is too big for little data. Now it has a much more fresh look, check it with submitting a file to the !
Now you are able to see strings part as a infinite scroll page! All you have to do is scroll at the strings part, you can see all of the strings that file has.
Now you can try research plan for 14 days! Just go to the page and click the button, and charm happens!
Since the previous version released users are able to download files about the submission but not the report itself. Now you can download the report parts just by clicking the button next to the report part headings!
CSI Module has a timer now! You can see the remaining time of your session at the top-right corner.
Modules at the Market section has videos! Now you can see the modules in the action before buying them.
Navigator at the top-right is updated.
A bug at the behaviour part, which results in users couldn’t type after coming from the Mitre ATT&CK table, fixed.
Filename regex had a special character problem, fixed.
Threat.Zone Public API had a wrong date issue while submitting files, fixed.
Previously, the entrypoint selected via the UI was used only for determining which file within a compressed archive to execute during Dynamic Scan analysis. However, the entire compressed file was sent to other analysis engines such as Static Scan, Emulations, and YARA Generator. With this latest update, we've enhanced our system so that the user-selected entrypoint is now also utilized by these analysis engines. This improvement simplifies and streamlines your analysis workflow, particularly when handling compressed files.
We've made a quite big update on our landing page! Check it out from here:
When zip files are uploaded to our system, we now check the MIMETypes of the files inside the zip and set the extensions based on it. This ensures proper analysis of compressed content and improves detection accuracy.
Now you can search through submissions with their tags! This powerful filtering option makes it easier to find and organize related samples for more efficient threat analysis.
With the new Advanced Malware Traffic Analysis feature, you will be able to access incredible amount of data regarding the malwares’ network related actions. You can access this feature after you go to the Dynamic Scan report, network tab.
You can now inspect the packets within the Dynamic Scan VM and apply filters. For guidance on filtering, check out the filtering guide here: Wireshark Filtering Guide
While developing Threat.Zone, we have focused on both preemptive measures and post-incident responses. Alongside our detailed submission page for gathering submission details, we have also introduced a new module called "Hunting.”
In the Hunting module, we began development with the YARA Generator Engine. Now, for every submission sent to Threat.Zone, a YARA Rule will be automatically generated.
This allows you to view YARA Rule generated for the sample and download it!
Malware often checks the victim's region, utilizing this information in diverse ways. With the new Network Configuration page on Threat.Zone, you now have the freedom to use Proxy or VPN configuration you prefer in your Dynamic Analysis.
Once you click on the configurations tab, you can view your existing network configurations and create new ones. We provide three options for changing the network configuration for your analysis VM, Proxy OpenVPN and Wireguard.
Once you've created a configuration, when you start a new scan process, you'll find your created network configurations at the bottom. Upon selection and submission, your interactive VM will utilize this configuration for its network settings.
We've made significant enhancements to the scoring capabilities of Threat.Zone's Static Scan. By refining the YARA rules, we've seen a remarkable increase in scoring accuracy and matching capabilities.
Additionally, when you submit samples to Threat.Zone's Static Scan, you'll now notice that your submission is tagged with possible malware families and types.
These updates are designed to equip you with amazing tools and insights to enhance your threat analysis endeavors. We remain dedicated to continually improving Threat.Zone to better address your security requirements. If you haven't registered yet, you can do so .
Starting from today, you will be able to get promotions if you buy a plan! Right now Researcher plan comes with CDR and CSI modules, Hunter Plan is coming with all of our 3 modules, which are MemProcFS, CDR and CSI.
From now on, we’ve enabled our Free Plan users to download Additional Files(Memory Dumps, PCAP Dumps), Submission Sample and HTML Report!
We got some feedback from our users that was about the charts above the public/my submissions tables. They told us that it would be awesome if pie chart become clickable and has filtering function, we thought the same and did it, check it out from !
Now you can install additional files from our Public API! Check our page to see which of our plans have API Support!
In submission cycle, we have a part that you can connect to the VM environment via VNC and see what is going on inside the VM, now you can see how many time remains before VM is killed! Experience it by submitting a file to the !
Added Plan & Modules to the Settings Section! Now you can see how many modules you have, details about your plan and modules.
Now you can undo filters at Submissions section!
Public API had a problem about sending document links, fixed.
There was an error about public submissions order in Public API, fixed.
Threat.Zone Public API had a wrong date issue while submitting files, fixed.
Public API had a mimetype problem, fixed.
Submissions Search Bar had a problem that results in disfunctionality in “enter” key, fixed.
Search historical analysis data and trends.
git clone https://github.com/threat-zone/threatzonemcp






