Report Verdict

The table provided below offers a high-level overview of submission classifications based on their potential threat levels and a summarized overview within your report verdicts.

From Sandbox 2.5.0, the displayed verdicts will use the new, human-friendly variants from the table below. The old, risk score based verdicts can still be enabled through the Admin Panel, see the Configuration options under General Settings.

The final verdict is an aggregate of the detected threat indicators based on our proprietary verdict calculation logic, which is tuned to mitigate the occurrence of both false negative and false positive results, ensuring a more accurate and reliable assessment of potential threats.

The threatLevel field contains a numeric representation that corresponds to a given verdict. For some verdicts, the threatLevel is a range, not a single value. See the exact values below.

Human Friendly Verdict (New)Risk Score Based Verdict (Old)DescriptionActionThreat Level Values
TrustedBenignThe file has been whitelisted based on a hash match with the National Software Reference Library (NSRL), custom whitelists, or valid certificates from reputable software vendors.No Action-1
UndeterminedUnknownThe file is unsupported, contains insufficient data, or the analysis is inconclusive.Malware Analysis0
No Threat DetectedNo ThreatAlthough the file is supported, its reputation data and threat indicators do not indicate any known capability typically associated with malware.No Action0.1-0.25
Low RiskSuspiciousThe file contains some threat indicators commonly found in malware. To address this, please ensure that the MD Cloud Reputation service is enabled and perform an AV engine scan with MetaDefender Multiscanning.Perform AV engine/reputation check0.5
High RiskLikely Malicious

The file exhibits numerous threat indicators commonly associated with malware, and there is no compelling evidence from the AV engine or reputation services to suggest otherwise.

Note: Behaviors often associated with malware—such as code injection, process manipulation, or network communication—can also occur in legitimate applications, making definitive conclusions challenging. In air-gapped environments, where certificate-based whitelisting and external reputation lookups are unavailable, legitimate application presenting such capabilities may be classified as "High Risk". See how Adaptive Threat Context helps to mitigate these false positives.

Block file0.75
Confirmed ThreatMaliciousThe file provides clear evidence of being malware, either due to a critical mass of threat indicators, a true positive indicator, or validation from a first-tier AV engine or reputable source.Block File1
System ErrorN/AThe verdict could not be determined due to an internal malfunction (e.g., engine crash).Retry or Report IssueN/A

Verdict Visualization

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
On This Page
Report Verdict