Maltrail verdicts on Validin Threat Hunting and DNS Enrichment Platform - stamparm/maltrail GitHub Wiki
This article explains how to read and interpretate Maltrail's verdicts on Validin Threat Hunting and DNS Enrichment Platform.
Also, please, take a couple of minutes to learn Maltrail detection nuances before reading current article.
- Example 1:
This example is based on paragraph 1 of Maltrail detection nuances.
How to read/interpretate: there are two detections in Maltrail: explicit for cdn.sovber.shop and for its parent domain sovber.shop .
In case of detection for cdn. subdomain is missed, hence one single for parent domain would be present:
- Example 2:
Maltrail IP:port detection for various types of malware on one single IP:
- Example 3:
In case of http:// detection Validin would display it as Scheme: http:
- Example 4: This example shows how Validin Threat Hunting and DNS Enrichment Platform displays Maltrail full-path detections for legit compromised sites.
Let's see the https://x.com/1ZRR4H/status/1797809897800687796. As one can see, there are legit compromised domains are listed. And detection just for domain is incorrect by default, because domain is not malicious itself. Full-path detection is the single way how to keep suchlike cases.
Validin Threat Hunting and DNS Enrichment Platform uses Path sign to display respective Maltrail detections for legit compromised sites:
How to read/interpretate: dsestimation.com domain is a clean/legit one, but path dsestimation.com/wp-content/uploads/2015/10/ was in use by malware attack.