Threatray at Bsides 2022, Binary code as a searchable IOC
Key takeaways from our presentation @ Bsides Zurich by Carlos Rubio, our lead Malware Researcher and Jonas Wagner, co-founder and CTO.
Malicious binary code is frequently used in attacks and a highly valuable IOC
● By making it searchable, you can leverage it in novel ways
… broad and resilient code-based signatures
… that are easy to create
… applicable back in time
… discover fine-grained relations
● Hunt through binary code the same way as you do through other types of data