Site icon TheCyberThrone

Malware Hunting Ecosystem

Advertisements

Investigations on malicious activity usually start with small crumbs and pieces of a puzzle. Analysts will never have a full picture of the attack under investigation, only attackers know, but probably that’s not necessary either. What is needed is to retrieve the context necessary to achieve the goal of the investigation.

Every piece of the puzzle can be used to obtain new pieces. Then, we repeat the process until we don’t find any more clues, or we are satisfied with the results. In this case, the pieces of the puzzle will be Indicators of Compromise (IOCs), usually hashes, domains and IPs.

IOC’s are identified of below source categories

You can use the have: modifier with the newly added relationships for your searches in the following

For URLs we also have the following new relationships:

In addition to all these relationships, we are also stepping up our passive DNS capabilities. As a result, you can now find the following records for domain resolutions in VirusTotal:

Exit mobile version