Most teams commonly utilize a particular set of tools to perform analysis on suspicious files. When reviewing a new tool, the team can see where it will help them in their day-to-day tasks, yet there is always the big “if”. This tool will help me a lot IF I can make it work with my existing tools and processes. No one wants to rebuild everything each time a new tool is introduced. In this blog post I’m going to show you an example where the Malware Analyzer G2, a behavioral analysis tool, can apply a static analysis tool that already exists in most tool kits.