Security alerts and lists of Indicators of Compromise (IOCs) are a common starting point for many cybersecurity teams. Recently, a report from Cybercom provided a list of IOCs—an IP address, a few domains, and a handful of file hashes. While this information is valuable, relying solely on these static indicators for threat hunting can leave organizations vulnerable.
Let’s explore how to elevate your threat hunting program by transforming these IOCs into more dynamic, behavior-focused searches.
A typical first step upon receiving IOCs is to conduct an “indicator sweep”—checking your environment for those exact IPs, domains, or file hashes. However, this approach has significant limitations:
Statistically, just running through a list of known bad indicators puts you at a disadvantage. So, how do we move beyond this reactive posture?
The key is to use IOCs as a launchpad for deeper investigation, aiming to understand the behaviors and TTPs (Tactics, Techniques, and Procedures) of the actors behind them. We can start by asking three critical questions about the provided IOCs:
Answering these questions can rapidly expand your hunt from a simple checklist to a robust, behavior-driven investigation.
Let’s take one IP address from the Cybercom report: 195.154.255.211
. A quick check in a threat intelligence platform like VirusTotal reveals a significant history. This particular IP has been heavily associated with a group known as InvisiMole since at least 2019.
This immediately gives us a potential lead. While we can’t definitively say the IP still belongs to InvisiMole in the context of the new Cybercom report, the historical link is a strong starting point for forming a hunting hypothesis: “What if the activity Cybercom flagged is related to InvisiMole or actors using similar TTPs?”
Further digging in VirusTotal might show malware samples associated with this IP, such as RC2FM
, a known piece of InvisiMole’s toolkit. We might also uncover domains previously resolved by this IP, like statad.de
, which has been identified in the past as an InvisiMole command-and-control (C2) domain. Suddenly, a single IP address has opened a door to a wealth of potential behavioral indicators.
Understanding the potential actor is crucial. According to extensive research by ESET (who first detailed the group in 2018, though they’ve been active since at least 2013), InvisiMole is a sophisticated cyber espionage group primarily targeting entities in Russia and Ukraine. After a brief hiatus, they re-emerged in 2019, focusing on military and government targets in Eastern Ukraine.
Their operational toolkit is a mix of custom-built malware (like the RC2FM
and RC2CL
backdoors, which MITRE ATT&CK refers to as the “InvisiMole” toolset) and publicly available exploits or techniques. They’ve been known to use:
Importantly, ESET also found evidence of collaboration between InvisiMole and another group known as Gamaredon (also tracked as PrimitiveBear or Shuckworm). This connection becomes vital as we expand our hunt. The Ukrainian government has also pointed to InvisiMole’s ties with Russian state-sponsored actors, adding another layer of context.
Knowing who might be behind an indicator helps us move beyond that specific IP or hash. The detailed reports from ESET and the MITRE ATT&CK framework’s documentation on InvisiMole provide a treasure trove of behavioral clues:
RC2FM
, pre-existing YARA rules (such as those available on Malpedia) can be deployed to scan files on disk or network traffic captures, potentially identifying variants not on the original IOC list.By forming the hypothesis that InvisiMole (or a similar actor) might be involved, we can proactively search for these more nuanced behaviors rather than just the initial, limited set of IOCs.
The plot thickens when we consider InvisiMole’s reported collaboration with Gamaredon. ESET’s research shows instances where InvisiMole’s malware was delivered using Gamaredon’s implants. Unit 42 (Palo Alto Networks) and Ukraine’s SBU have linked Gamaredon to the Russian FSB.
This association allows us to create a second hypothesis: “If InvisiMole is involved, their collaborators like Gamaredon might also be active, or their TTPs might be in use.”
Even if InvisiMole isn’t directly responsible for the activity Cybercom highlighted, hunting for Gamaredon’s TTPs could still be fruitful. Gamaredon might be providing initial access or other support to various groups. Fortunately, Gamaredon also has a well-documented presence on MITRE ATT&CK, providing another list of behaviors, registry keys, and techniques to search for.
The journey from a simple IP address to a comprehensive behavioral hunt involves several key shifts in thinking:
By adopting this approach, your threat hunting program can move beyond simply reacting to lists and start proactively identifying malicious activity based on a deeper understanding of adversary behaviors. The goal isn’t just to find the needle in the haystack that Cybercom pointed out but to understand how such needles are made and where else they might be hiding.
Start building these hypotheses, dive into the rich resources available, and transform your threat hunting from a checklist exercise into a dynamic and effective defense strategy.
Our products are designed to work with
you and keep your network protected.
Insane Cyber © All Rights Reserved 2025