Irondefence Malware Analysis Lab

Cyber Threat Intelligence

iron defence

Malware Analyst / CTI Researcher

Tracking adversaries. Dissecting malware. Publishing open-source threat intelligence to help defenders stay ahead.

01 / About

Analyst Profile

Security researcher focused on understanding the adversary: how malware operates, how campaigns are structured, and how threat actors evolve their tradecraft over time.

Every report published here is the result of hands-on reverse engineering, sandbox analysis, and OSINT research. Technical findings are translated into actionable intelligence.

// No vendor hype. No marketing fluff. Just raw analysis.

Malware Samples analyzed
IOC Sets published
YARA Rules written

Malware Analysis

Static & dynamic analysis of PE, scripts, and fileless threats.

Threat Hunting

Proactive hunting across telemetry using ATT&CK framework TTPs.

CTI Production

Structured threat reports, IOC extraction, and actor profiling.

OSINT Research

Open-source intelligence gathering and infrastructure tracking.

02 / Reports

Threat Intelligence

All reports >

Each report documents a real-world malware sample or campaign from initial triage through full reverse engineering. IOCs, YARA rules and ATT&CK TTPs are included.