Hunting:
- Objective: Develop techniques for collecting samples from diverse sources, initiating the profiling of malicious threat actors.
Extraction:
- Objective: Identify unique static features in malware binaries through Feature Extraction to classify them into distinct malicious groups.
Behavior Extraction:
- Objective: Identify unique dynamic features in binaries to classify them as malicious based on their behavior.
Correlation and Clustering:
- Method: Identify malware based on its behavior and features, using this information for effective classification.
Threat Actor Attribution:
- Objective: Locate the threat actors responsible for the identified malicious clusters.
Tracking:
- Objective: Proactively anticipate new attacks and identify new variants for enhanced threat awareness.