Purpose

This section provides a standardized template for creating new reports in The Hunter’s Ledger.
All reports can follow this format to ensure consistency, reproducibility, and presentation. Feel free to contribute your own report templates!


Report Structure

Executive Summary

High‑level overview for quick triage.

Technical Details

  • File structure analysis (PE headers, offsets, payloads)
  • Reverse engineering notes (entry points, obfuscation, persistence)
  • Behavior observed (networking, privilege escalation, anti‑analysis)
  • MITRE ATT&CK mapping to observed behaviors

IOCs - Put Into IOCs Section

SHA256

  • HASH1
  • HASH2

Domain

  • malicious-example[.]com
  • another-malicious[.]net

IP

  • 192.168.1.50
  • 10.0.0.25

Detection Opportunities - Put Into Detections Section

  • Sigma/YARA rules
  • Splunk/Elastic queries

Usage

  • Copy this template into a new folder under /reports/ (e.g., /reports/malware-sample-1/index.md).
  • Replace placeholder content with your actual findings.
  • Add cross‑links to related IOC feeds and detections.

License

  • Reports are © 2025 Joseph. All rights reserved.
  • Free to read, but reuse requires written permission.