Demonstration: Tracking Malware Campaigns and Domains Using MalNet - ShadowDragon.io

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

Featured Demonstration Tracking Malware Campaigns and Domains Using MalNet v2

MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and researchers to identify and visualize malware connections in just minutes to expedite investigations and response.

In this short 4 minute video we will demonstrate how MalNet enables analysts to track malware campaigns and domains using malnet. By starting with just an malware artifact, we’ll show you how you can identify new domains, ip addresses and additional malware all related to this original artifact.

Technical Audiences

In this example we start off with the hash 7e537c106d370c7622a4d80b4830896f, mapping related domain names, ip addresses, related malware families, correlated campaign periods, related intrusion detection signatures and ip reputation information.

Demo-Tracking_Malware_Campaigns_with_MalNet-Screenshot-1

About the Transforms

MalNet transforms can be purchased through ShadowDragon, enabling users access to visualize ProofPoint Malware Threat intelligence data.

In addition to commercial purchases, Government (GSA) procurement is offered.

SaveSave

SaveSave

SaveSave

SaveSave

SaveSave

SaveSave

SaveSave

SaveSave

DanielImage

Daniel Clemens

Daniel Clemens is the founder and CEO of both ShadowDragon and Packet Ninjas, a niche cyber security consulting and services company.

With extensive experience in defensive and offensive security, Daniel has been a quiet trailblazer in digital intel gathering long before cyber intelligence became a discipline. More than a decade ago he was inventing and applying his own intelligence tools in support of companies and governments around the world facing urgent threats. Using this deep understanding of web technologies and the behaviors of cybercriminals, he has enhanced, updated and packaged these tools under ShadowDragon.

Daniel is a member of the Odonata Holdings, Inc.
Scroll to Top