MalNet™ Malware Data, Graphing, and Threat Intelligence

MalNet

Malware is more than code. It's bad code in motion.

When malware strikes, you need to quickly find, identify, and mitigate its effect. MalNet™ speeds up your investigation, allowing you to start with any artifact and pivot through its network and activity to find the source threat actors or identify related infections.

Malware is more than bad
code. It’s bad code in motion.

When malware strikes, you need to quickly find, identify, and mitigate its effect. MalNet speeds up your investigation, allowing you to start with any artifact and pivot through its network and activity to find the source threat actors or identify related infections.

 Visually explore and uncover 
 malware connections in seconds. 

1
Play Video

features

Search and view attacks in motion or go back in time:

icon computer graphs blue

Proofpoint ET Intelligence

Access industry-leading current and historical intelligence.

icon switches

Transform

Analyze data using 100+ commercially-supported transforms

icon puzzle blue

Make Connections

Connect specific attacks to billions of available indicators and visualize campaigns of records in the 1000s.

icon pin blue

Geographical Information

Create a map of suspicious activity and follow your suspect’s trail.

Start anywhere. Arrive at the source.

MalNet Diagram

anti-malware investigations
& response

MalNet brings together the industry’s most extensive malware threat information from Proofpoint ET Intelligence with Maltego link analysis capabilities from ShadowDragon®. MalNet enables incident responders, threat analysts and law enforcement to identify and visualize malware connections in just seconds to expedite investigations, response, and malware protection.

expose cyber espionage

CaseStudy expose cyber espionage@2x

ClearSky and Trend Micro exposed CopyKittens as an active cyber espionage actor who has targeted governments and large companies in the United States, Europe and Middle East. MalNet was used to help identify an infrastructure that used known malware and newly uncovered code and tools.

uncover and attribute

CaseStudy uncover and attribute@2x

From 2016 – 2017, attackers used malware in continual attempts to breach IEC – Israel’s largest source of electrical power. Clearsky Security is investigating the attribution behind these attacks, using MalNet to support their process and attribute artifacts.

See malware in motion. Schedule a demo and see what it could do for your prevention and incident response.

What our SocialNet customers are saying

MalNet [is a] tremendous resources for incidents investigation.
[It allows] for unparalleled pivoting, malicious infrastructure detection and categorization and attribution.”

divider MalNet@2x

with malnet:

icon arrows

No more wasted time and energy context switching between data collection and analysis

icon booklet red

Produce better, more focused reports without the hassle of manual collection effort.

icon network red

Map large and complex
malware campaigns and their
C2 infrastructure.

icon malware

Discover additional malware from a compromised domain
or correlate dates.

icon search code

Uncover IDS signatures that
key on traffic and IOC from
specific malware samples.

icon computer cyber 1

Gain cyber threat Intelligence
relating to malware artifacts.

MalNet is used by:

MSSP Teams
SOC Teams
Cyber Threat Intelligence

DFIR Consultants
Legal Professionals
Forensic Detectives and Investigators

Corporate Security
Cyber Threat Intelligence Teams

integrations

And our stuff works with your stuff.

With its Restful API, MalNet is built to work easily with your other investigation and data tools, like Maltego and Proofpoint ET. OEM developers, contact us for information on adding MalNet’smonitoring and alerting to your platform.

maltego logo
proofpoint 1

dossier template:

Whether you use MalNet or another collection tool, presenting your intelligence clearly inspires confidence and supports action.

Check out our custom template
that includes the 7 essential elements every target dossier needs.

Getting started with the
right answers is easy.

Getting started with the
right answers is easy.

Getting started with the right answers is easy.

_1

Schedule your demo

See how MalNet speed up your anti-malware or response efforts.

_2

start your free trial

Experience the power of MalNet, for free.

_3

go beyond the profile

Pivot through reliable, high quality data.

Get started by scheduling your demo today.

Scroll to Top