This repository comprises scripts, signatures, and additional IOCs of our blog posts at the telekom.com blog as well as of our Twitter account. 2021-05-17: Let’s set ice on fire: Hunting and detecting IcedID infections (IcedID) 2021-07-14: LOCKDATA Auction – Another leak marketplace showing the recent shift of ransomware operators (CryLock) 2021-09-14: Flubot's Smishing Campaigns under the Microscope (Flubot/Teabot) 2021-10-29: #YARA rule for hunting XOR encrypted #PlugX / #Korplug payloads(PlugX) 2022-01-14: #100DaysOfYara Detect Hacktools that modify RDP settings (Hacktools) 2022-03-11: SystemBC YARA rule and extractor (SystemBC) 2022-03-18: #100DaysOfYara Detect Vatet Loader in backedoored Rufus([Defray777])(https://github.com/telekom-security/malware_analysis/tree/main/defray777) 2022-09-02: Raspberry Robin(IOCs)
Common questions about Telekom Security Malware Analysis Repository including features, pricing, alternatives, and user reviews.
Telekom Security Malware Analysis Repository is Repository of scripts, signatures, and IOCs related to various malware analysis topics. It is a Security Operations solution designed to help security teams with IOC, YARA, Cyber Threat Intelligence.
Telekom Security Malware Analysis Repository is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/telekom-security/malware_analysis/ for download and installation instructions.
Popular alternatives to Telekom Security Malware Analysis Repository include:
Compare all Telekom Security Malware Analysis Repository alternatives at https://cybersectools.com/alternatives/telekom-security-malware-analysis-repository
Telekom Security Malware Analysis Repository is for security teams and organizations that need IOC, YARA, Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
Expands a single malware hash into full family visibility via structural analysis.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.