Saturday, May 3, 2025
HomeCyber Security NewsVirusTotal AI code Analysis Expanded to Spot Malicious Windows, and Linux Script...

VirusTotal AI code Analysis Expanded to Spot Malicious Windows, and Linux Script Files

Published on

SIEM as a Service

Follow Us on Google News

In April 2023, Google announced VirusTotal Code Insight to improve the capacity of its malware detection and analysis platform. This week, Google released an enhanced version of VirusTotal Code Insight, including support for more scripting languages.

Code Insight is an AI-based code analysis feature powered by the Google Cloud Security AI Workbench that uses the Sec-PaLM large language model (LLM) tailored for security use cases.

“Code Insight has broadened its support for script formats, moving beyond PowerShell to offer analysis for various scripting languages,” VirusTotal founder Bernardo Quintero said.

- Advertisement - Google News

Updates to VT Code Insight

Code Insight, which was once limited to analyzing a subset of PowerShell files, can currently detect malicious Batch (BAT), Command Prompt (CMD), Shell (SH), and VBScript (VBS) scripts.

The maximum file size limit for files handled by Code Insight has been doubled, allowing for an analysis of larger files.

Further, the model provides more brief and concentrated high-level explanations, emphasizing code behavior.

The user interface has been modified to display only the initial sentences of the report by default, with the option for users to expand the report as needed, preventing lengthy reports from overpowering the default view.

ESXiArgs sample analysis by VirusTotal Code Insight

The functionality is currently in active development and should be regarded as beta. In the upcoming months, VirusTotal intends to enhance it by supporting more file formats, bigger file sizes, and the analysis of executable file types like.exe.

For example, the team intends to provide the study with more context by granting the AI access to “any metadata related to the URLs and files linked in the code snippet.”

Security researchers and other users can utilize Code Insight to analyze the behavior of scripts, making it an intriguing feature. Its use will increase when the service is expanded to support more file types, particularly executable files.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...

Stealthy New NodeJS Backdoor Infects Users Through CAPTCHA Verifications

Security researchers have uncovered a sophisticated malware campaign utilizing fake CAPTCHA verification screens to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Taps SocGholish: WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often...

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem...

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...