Hybrid Analysis Description
These are common 'how to' and 'troubleshooting guides for the Falcon Sandbox platform and community platform. You can navigate through the articles by using the menu on the left. Hybrid Analysis requires users to go through the Hybrid Analysis Vetting Process before they can obtain an API key or download malware samples. Please be aware that you must adhere to the Hybrid Analysis Terms & Conditions and only use these samples as research purposes. It is not allowed to share your API key or user credentials with anyone else. If you suspect that your API key, or user credentials, have been compromised, please notify Hybrid Analysis immediately. Sometimes, a vetting request may be rejected because of incomplete data, missing real name, real company name, or any other means of validating cybersecurity credentials. It is possible to submit a vetting request again in this instance.