Threatray at Bsides 2022, Binary code as a searchable IOC

Key takeaways from our presentation @ Bsides Zurich by Carlos Rubio, our lead Malware Researcher and Jonas Wagner, co-founder and CTO.

Malicious binary code is frequently used in attacks and a highly valuable IOC

By making it searchable, you can leverage it in novel ways:

  • broad and resilient code-based signatures
  • that are easy to create
  • applicable back in time
  • discover fine-grained relations
  • Hunt through binary code the same way as you do through other types of data