Behavioral Indicators : Descriptions of unusual or malicious behaviors exhibited by malware, helping organizations identify and respond to threats based on behavior.
Command and Control (C&C/C2) : URLs or domain names used by malware to communicate with its control servers.
Email Addresses : Email addresses associated with phishing campaigns, spam, or other malicious activities.
File Hashes : Hashes like MD5, SHA-1, and SHA-256 of known malware files or suspicious executables.
Filenames and File Paths : Suspicious or malicious filenames and file paths that might indicate the presence of malware.
Malicious Domains : Domain names that are linked to phishing campaigns, malware hosting, or other malicious activities.
Malicious IP Addresses : IP addresses associated with known command and control servers, malware distribution, or other malicious activities.
Malicious File Extensions : File extensions commonly associated with malware, such as .exe, .dll, .vbs, .js, etc.
Malicious SSL/TLS Certificates : SSL/TLS certificates used to facilitate secure communication but issued with malicious intent, compromising the security of data transmission.
Mutex Names : Unusual or malicious named mutexes used by malware for synchronization purposes.
Network Signatures : Signatures and patterns in network traffic that are indicative of malicious activity, including protocols and communication methods.
Packers and Crypters : Signatures of known packers and crypters used to obfuscate malware.
Phishing Campaign Details : Indicators and information related to active or recent phishing campaigns, including email subjects, sender addresses, and campaign themes.
Registry Key Indicators : Information about registry keys and values associated with malware persistence or other malicious activities.
Credential Dumps : Lists of compromised usernames and passwords that have been leaked or dumped by threat actors.
Script Artifacts : Unique identifiers used by malware for synchronization or to ensure single execution.
Strings and Keywords : Specific strings or keywords that are indicative of malicious activity or commonly found in malware.
User-Agent Strings : Unusual or suspicious user-agent strings in HTTP requests.
URLs : Specific URLs that are known to host malicious content, exploit kits, or participate in phishing attacks.
YARA Rules : Custom YARA rules created to identify specific patterns or characteristics of malware.
Close