Stay ahead of the latest mobile threats with Corellium’s advanced capabilities

Quickly and easily identify potential security threats on your mobile devices, and take action to protect your organization from harm.


IOC Gathering and Threat Hunting

Augment static mobile malware and threat research with advanced dynamic analysis. Detonate mobile malware or actively engage with smishing and phishing scams directly from a virtual iOS or Android device. Easily change the device’s physical location (GPS) to examine location-based threats, and use a local proxy with VPN connectivity to gain network connectivity anywhere in the world.


Sandboxed Mobile Malware Detonation

Safely detonate mobile malware on sandboxed Corellium virtual devices. For mobile threat hunting, use built-in visualization tools for root access, evidence and IoC analysis, filesystem access, SSL/TLS stripped network monitoring, and mobile app debugging. A comprehensive API and USBFlux technology enables integration with leading development and security research tools such as IDA Pro, Frida, and Burp Suite

Solution Highlights

Arm your Security, IT and SOC teams with the cutting edge tools they need to stay ahead of cyber threats.

01 Malware Detonation

Built-in network monitoring tools let you analyze encrypted C2 and app traffic instantly. CoreTrace gives you access to app syscall tracing during execution.

Corellium Virtual Hardware platform

CHARM™ is our custom type-1 hypervisor designed to run multiple complex devices, peripherals and chipsets on a single, cutting-edge Arm server, allowing us to virtualize devices on their native architecture.