Skip to content

Malware

ShadowMap provides intelligence on malware families, including their type, target platforms, associated threat actors, and linked campaigns. This module helps security teams understand the tools used by adversaries so they can build appropriate detections and assess whether specific malware poses a risk to their environment.

Overview

Malware

Understanding the Data

The malware list displays the following columns:

ColumnDescription
NamePrimary name of the malware family (e.g., Cobalt Strike, Emotet, TrickBot)
TypeClassification of the malware: RAT, backdoor, trojan, ransomware, worm, loader, info-stealer, rootkit, exploit kit, etc. (displayed as a tag)
PlatformsOperating systems and platforms the malware targets (shows top 3; e.g., Windows, Linux, macOS)
ActorsCount of threat actors known to use this malware family
CampaignsCount of campaigns in which this malware has been observed
First SeenEarliest known appearance of this malware in the wild

Click any row to view the full malware profile, including detailed descriptions, full platform lists, all associated threat actors, campaigns, and related IOCs.

Filters

Use the filter bar to narrow the list:

FilterOptions
TypeFilter by malware classification (RAT, backdoor, trojan, ransomware, etc.)
PlatformFilter by target platform (Windows, Linux, macOS, Android, etc.)
SearchFree-text search across malware names and descriptions

Export

Click the export button to download the current filtered view as an Excel file. The export respects all applied filters and search terms.

How to Use Malware Intelligence

  • Detection engineering -- Use malware names and types to search for corresponding YARA rules, Sigma rules, and Snort signatures in public repositories. Cross-reference with the IOC Search for associated indicators.
  • Risk assessment -- Filter by platforms matching your environment. If your organization runs Windows servers and Linux workloads, filter for malware targeting those platforms and assess your detection coverage.
  • Actor attribution -- Click through to associated threat actors to understand who uses this malware and whether they target your sector.
  • Campaign tracking -- The campaigns count shows how actively the malware is being used. High campaign counts indicate widespread or ongoing use.
  • Vendor evaluation -- When assessing EDR or AV products, use this list to verify whether your chosen solution detects the malware families most relevant to your threat landscape.

Understanding Malware Types

TypeDescription
RATRemote Access Trojan -- provides persistent remote control of the infected system
BackdoorProvides unauthorized access, often simpler than a full RAT
TrojanDisguises as legitimate software to deliver malicious payloads
RansomwareEncrypts files and demands payment (also tracked in the dedicated Ransomware module)
Loader/DropperDownloads and executes additional malware payloads
Info-stealerHarvests credentials, cookies, and personal data (related to Stealer Logs)
WormSelf-propagates across networks without user interaction
RootkitHides malware presence by modifying the operating system
Exploit KitAutomates exploitation of browser and plugin vulnerabilities

ShadowMap by Security Brigade