CLIENT
USER DOCUMENTATION
Registration
The Client must complete the registration form in order to create their account on the Ramagine Platform. The Client must also agree Terms and Service, and upon confirmation the Client will be directed to the Dashboard.
Dashboard
Once registration is completed the dashboard will appear prompting the Client to Create a New Project. Click the "Create a New Project” button to get started.
Getting Started
Client Project Flow
1. Create a Project
Once the client has clicked "Create a New Project", a new window will appear asking for a Project Name, and a brief description to provide the Ramagineers with some context for their analysis. After the details are entered a sample must be added in order to continue. The file can be uploaded either by the drag & drop mechanism, or browsing through your files. A file with any extension can be uploaded in this step.
Once uploaded as a secure sample the file is zipped and the password is added in the background. Once it follows through, the Client is asked to select the type of Project Plan that they want. Once chosen, the client is taken to the Stripe checkout page and upon completion the Project is created waiting to be assigned to a Ramagineer.
2. In Progress
Once accepted and assigned to a Ramagineer, they will be granted access to the sample to perform their analysis. Once their analysis is complete, it is submitted for a QA review.
3. QA Review
QA will perform it's review to provide additional assurances of the quality of report output.
4. Client Review
The Client will receive the finished analysis materials and is able to:
Approve the Project
Request further analysis - Upgraded Report (Only for T1 Reports)
Contact Ramagine - in case of any questions.
5. Project Completed
Upon completion of the Project, the Ramagineer will receive a payout within 7 days.
Ramagine currently offers 2 types of analysis:
1. Triage Analysis
To determine if the uploaded sample is malicious.
To be completed within 72 hours
2. Capabilities Analysis
To outline malware capabilities and client specific requirements
To be completed within 144 hours
Project Guide and Expectations
Capabilities Analysis
-
Key Observations
Implications
Analysis Date
OS
Hashes
Tags
Auto Signature
Indicators
Limitations
-
Strings
Functions
Libraries
Obfuscations
IOC’s
-
Eradication Steps
-
Unpacked Payloads
Screenshots
Videos
Functions Listings
Strings
Logs
Triage Analysis
-
Key Observations
Implications
Analysis Date
OS
Hashes
Tags
Auto Signature
Indicators
Limitations
-
Strings
Functions
Libraries
Obfuscations
IOC’s
-
Eradication Steps
Data Loss Advisory
-
Total Processes
Monitored Processes
Malicious Processes
Suspicious Processes
HTTP Requests Processes
TCP/UDP Connections
DNS Requests
Event Details
IOC’s
-
Infection Capabilities
Anti-Analysis Techniques
Anti-Bugging Techniques
Spreading Mechanics
Data Leakage
Remote Interactions
Persistent Mechanisms
-
Brief Description of desired focus area
-
Unpacked Payloads
Screenshots
Videos
Functions Listings
Strings
Logs