Detecting the STRRAT Malware Family
In recent months STRRAT has become one of the top malware families submitted to Any.Run. Here's how to detect it.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
In recent months STRRAT has become one of the top malware families submitted to Any.Run. Here's how to detect it.
Hunt of the Month: Detecting AsyncRAT Malware Over HTTPS
Corelight announces the release of a new detection package “Sliver”, which identifies and raises alerts related to the Sliver C2 framework.
Corelight Labs installed the last version of Boa in a lab environment and released a Zeek package to identify machines running a vulnerable Boa web...
Corelight Labs looks at three APT toolsets that have been linked to five threat actors, detecting each using relatively simple search logic.
In this blog post, the Corelight Labs team shares some of the detection methods available for the Manjusaka C2 framework.
This post shows how a Microsoft NFS exploit (CVE-2022-26937) can be detected using Zeek.
In this post Corelight Labs reviewed a proof of concept exploit for this vulnerability and wrote a Zeek-based detection for it.
In this post, we share simple ways to detect evidence of CVE-2022-22954 in Zeek logs, which can be adapted to other data stores (e.g., a SIEM).
The Corelight Labs team investigates CVE-2022-26809 and open-sources a Zeek package that detects attempts and successful exploitation in unencrypted...