Similarity Search - Introduction

Our ML-Based Similarity Search leverages advanced feature extraction techniques to identify and correlate unknown threats with known malware families. By analyzing behavioral patterns, code structures, and static attributes, our machine learning models detect even evasive or zero-day threats that traditional signature-based methods may miss.

This capability enables security teams to quickly pivot between related threats, uncover hidden malware clusters, and enhance threat hunting efficiency—making it a powerful tool for identifying and responding to emerging cyber threats.

Portable Executable type

These features are carefully selected based on their ability to provide accurate and relevant results, and they are continuously updated to stay current with the latest malware trends and techniques.

Binary metadata
Certificates
Characteristic
Disassembly sections
Dotnet info
Header info
Extracted
Threat Indicators
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Pdb guid
Resources
Rich Header Compiler Ids
Sections
Strings
Imports
Version info
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard

Similarity Search Filters

In addition to advanced technology, Similarity Search provides multi filtering search parameters. This feature offers greater flexibility and ensures that users receive the most accurate and relevant results for their specific needs.

Query filters
Non Query filters
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard