Threat Intelligence Investigation Using MISP – PupyRAT Malware Analysis

Deployed and configured MISP on Ubuntu using Docker to centralize threat intelligence. Investigated a published CIRCL event on PupyRAT malware, analyzed its behavior, and identified indicators of compromise such as command-and-control server IPs.

Steps

Step 1: Installed and configured MISP using Docker containers on an Ubuntu system to enable centralized threat intelligence sharing and analysis.

Step 2: Searched for CIRCL event ID 1582 in MISP, confirming details of the PupyRAT malware and its behavior.

Step 3: Identified PupyRAT's command-and-control server IP (43.32.186.33) and confirmed that the malware gained ADMIN-level access to compromised systems.

Step 4: Documented IOCs (IP, behavior patterns) and mapped them to MITRE ATT&CK techniques for incident response readiness.

Tools

MISP, Docker, Ubuntu

Frameworks

Threat Intelligence Sharing, Malware Analysis

Standards

MITRE ATT&CK (TA0001 – Initial Access, TA0002 – Execution), NIST CSF (DE.CM – Security Continuous Monitoring)