It’s Triage Thursday again! We’re back with another update roundup for you, and we’re always excited to share what our team has been up to this week. As usual, we’ve added more detections, behavioral signatures, and configuration extraction for recent trending families to make your malware hunting easier.
We hope that these updates make your work a lot easier, and we’re always here to support you in any way we can. Thank you so much for being a part of our awesome community!
Let’s check out what’s new this week:
New Families This Week
- Added detection and extraction for Kaiji botnet Linux family (intel x86 + x64 + ARM x86)
- Added detection and extraction for TruthSpy Android stalkerware
- Added detection and extraction for BabylonRat varian
- Added detection and signature for TiSPY Android stalkerware
Updates for Existing Families
- Updated detection and extraction for Systembc another variant
- Updated detection and extraction for RisePro for recent variant
- Fixed extraction for AsyncRat some random samples
Updates for Existing Behavioral Signatures
- Extended more Android signature and TTPs for discovery tactics
If you have any feedback, questions, or issues about Triage feel free to reach out to us any time - we do our best to respond to all feedback but even if we can`t get back to you straight away your files will go into our list of things to review and help us prioritize tasks.
You can find us directly through the website, or using the Feedback option on an analysis report page.
Not signed up yet? Head over to tria.ge to register for a free account.