Tag: IOC detection

AI-Powered IOC Parsing for WRECKSTEEL Detection in CrowdStrike
AI-Powered IOC Parsing for WRECKSTEEL Detection in CrowdStrike

How It Works Uncoder AI automates the decomposition of complex IOC-driven detection logic authored in CrowdStrike Endpoint Query Language (EQL). This example centers around the CERT-UA#14283 report, targeting WRECKSTEEL — a PowerShell-based infostealer. The AI engine interprets an extensive detection rule designed to match various execution chains linked to WRECKSTEEL, enabling analysts to quickly understand […]

Read More
IOC-to-Query Conversion for SentinelOne in Uncoder AI
IOC-to-Query Conversion for SentinelOne in Uncoder AI

How It Works 1. IOC Extraction from Threat Report Uncoder AI automatically parses and categorizes indicators from the incident report (on the left), including: Malicious domains, such as: mail.zhblz.com docs.google.com.spreadsheets.d.l1p6eeakedbmwteh36vana6hu-glaekssht-boujdk.zhblz.com doc.gmail.com.gyehdhhrggdi1323sdnhnsiwvh2uhdqjwdhhfjcjeuejcj.zhblz.com These domains are linked to phishing documents, spoofed login portals, and data exfiltration endpoints. Explore Uncoder AI 2. SentinelOne-Compatible Query Generation On the right, […]

Read More