Detection Beginner Threat Intelligence / OSINT / IOC Analysis

Threat Intelligence & IOC Analysis

A practical guide to threat intelligence � IOC types, enrichment tools, OSINT sources, threat feeds, and a structured workflow for investigating suspicious indicators.

15 min read 12+ tools Blue Team

// What is Threat Intelligence?

Threat intelligence (TI) is evidence-based knowledge about threats � who is attacking, how they operate, what infrastructure they use, and what their objectives are. For SOC analysts, practical TI primarily means enriching indicators of compromise (IOCs) to understand whether a suspicious IP, domain, hash, or email address is malicious and what threat actor or campaign it belongs to.

TI is commonly split into three tiers: strategic (APT reports, industry trends � for management), operational (TTPs, campaign analysis � for security architects), and tactical (IOCs, YARA rules, Sigma rules � for analysts).

IOCs have a short shelf life. IP addresses used by C2 servers rotate within days. Focus on TTPs (how attackers behave) for durable detection value, not just raw IOC lists.

// IOC Types

IOC TypeExamplesDurabilityNotes
File Hash (MD5/SHA256)d41d8cd98f00b204e9800998ecf8427eLowSingle-byte change defeats hash matching; use fuzzy hashing (ssdeep) for variants
IP Address185.220.101.47Very LowShared hosting means false positives; cloud IPs rotate rapidly
Domainevil-c2.example.comLowDGAs generate thousands of domains; focus on registrar/WHOIS patterns
URLhttp://evil.com/payload.ps1LowMore specific than domain alone; useful for phishing lure detection
Email Addressattacker@phish.comLowTrivial to change; useful within a campaign window
Registry KeyHKCU\...\Run\PersistMalwareMediumMore durable than network IOCs; specific persistence locations are reused
MutexGlobal\\ControlMutex01MediumMalware families often reuse mutexes across versions
User-AgentMozilla/5.0 (compatible; MSIE 9.0)MediumCustom UAs in malware C2 are often reused; useful in proxy logs
JARM / JA3TLS fingerprintMedium�HighTLS fingerprints are harder to change; effective for C2 detection in encrypted traffic
TTP (MITRE ATT&CK)T1059.001 PowerShellHighBehavioural patterns persist across campaigns and tool changes

// Enrichment Tools

ToolBest ForFree Tier?
VirusTotalFile hashes, IPs, domains, URLs � multi-engine scanning and historical dataYes (limited)
ShodanBanner grabbing IPs, finding C2 infrastructure, exposed servicesYes (limited)
AbuseIPDBIP reputation, abuse reports with categories and confidence scoresYes
URLScan.ioScanning URLs, screenshots, DOM analysis, redirect chainsYes
MXToolboxEmail header analysis, SPF/DKIM/DMARC lookups, blacklist checksYes
AlienVault OTXCommunity threat feeds, pulse reports, IOC correlationYes
CensysInternet-wide scan data, certificate transparency, C2 infra huntingYes (limited)
Any.RunInteractive malware sandbox with behaviour analysis and IOC extractionYes (public)
Hybrid AnalysisFree malware sandbox, links to CrowdStrike threat intelYes
MalwareBazaarMalware sample repository with hash lookup and YARA searchYes
PulsediveRisk-scored IOC enrichment, linked feeds, threat contextYes
MISPSelf-hosted threat intelligence sharing platformOpen source

// Threat Feeds

Threat feeds provide continuously updated lists of malicious indicators. Most SIEM platforms support automatic ingestion of these feeds for alerting and enrichment.

FeedTypeSource
abuse.ch URLhausMalicious URLsCommunity-reported malware delivery URLs
abuse.ch ThreatFoxIPs, domains, hashesIOCs from malware analysis
Feodo TrackerC2 IPsBotnet C2 infrastructure tracking
EmergingThreatsIDS rules, IPsSnort/Suricata rule sets for known threats
CISA KEVVulnerabilitiesKnown Exploited Vulnerabilities catalogue
SpamhausIPs, domainsSpam and malware hosting infrastructure
OpenPhishURLsPhishing URL feed

// Investigation Workflow

When an alert fires or a suspicious indicator appears, follow a consistent enrichment workflow before deciding on a response action.

StepActionTool
1Identify indicator type (IP / domain / hash / URL)Alert context
2Check reputation and detection rateVirusTotal, AbuseIPDB
3Look up WHOIS / registration history for domainsWhois lookup, DomainTools
4Check hosting provider and geo for IPsShodan, ipinfo.io
5Search for the IOC in threat intel platformsOTX, MISP, Pulsedive
6Pivot � what else is hosted on that IP/domain?Censys, Shodan, VirusTotal graph
7Correlate with internal logs � who touched it?SIEM, EDR
8Determine if indicator is internal or ISP-sharedRFC 1918 check, ASN lookup
9Document findings and assign confidence levelTicket / SOAR platform
10Share enriched IOCs with team / block if confirmedMISP, EDR, firewall

// TI Frameworks

Diamond Model

The Diamond Model represents an intrusion event across four axes: Adversary (who), Capability (what tool/exploit), Infrastructure (IP, domain, C2), and Victim (who was targeted). Pivoting between axes reveals related infrastructure and campaigns.

Pyramid of Pain

Created by David Bianco, the Pyramid of Pain ranks IOC types by how much pain they cause an adversary when blocked. Hash ? IP ? Domain ? Artefact ? TTP � blocking TTPs (the top) forces adversaries to fundamentally change how they operate, while blocking hashes (the bottom) is trivially bypassed.

LevelIOC TypePain to Attacker
6 (top)TTPsTough � forces fundamental changes to how they operate
5Tools (YARA/signatures)Challenging � must find or build new tools
4Network / Host ArtefactsAnnoying � registry keys, mutexes, filenames
3Domain NamesSimple � register new domain in minutes
2IP AddressesEasy � spin up new VPS
1 (bottom)File HashesTrivial � change one byte

// Tips

Never submit sensitive samples to public sandboxes. Any.Run and Hybrid Analysis are public by default. A document with internal company data or a customer's file could be indexed and visible to anyone. Use private submission or an on-premises sandbox.

Low VT detection count doesn't mean benign. Fresh malware or targeted samples may have 0/70 detections on VirusTotal for days. Use behavioural analysis and context � a file dropped by mshta.exe with 0 detections is still suspicious.

Shared IPs cause false positives. Cloudflare, AWS, and Azure IPs are used by thousands of organisations. An IP flagged as malicious may also host legitimate services. Always check whether the specific domain or path is malicious, not just the IP.

Use MISP or OpenCTI for sharing threat intelligence within a team. Structured sharing using STIX/TAXII standards allows automated ingestion by SIEM and SOAR platforms.