"[ Insert a short atmospheric or biblical opener relevant to the campaign — one sentence. ]"

Executive Summary

One to three paragraphs. Written for a technical audience but accessible to a non-specialist. Cover:

  • What the attack was
  • Who it targeted and how
  • What made it technically notable
  • Confidence level on attribution (if any)

Attack Overview

Initial Contact

How the victim was approached. Platform, lure type, social engineering pretext. Include screenshots or reconstructed timeline where available.

Kill Chain

Step-by-step execution flow from initial contact to full compromise. Keep it tight — this should be scannable.

  1. Step one
  2. Step two
  3. Step three

Technical Analysis

[Component 1 — e.g. Stage 1: Delivery Mechanism]

Detailed technical breakdown. Include code blocks where relevant.

// Annotated code sample

[Component 2 — e.g. Stage 2: Payload Staging]

Continue for each distinct technical component.

[Component 3 — e.g. C2 Communication]


MITRE ATT&CK Mapping

Technique IDNameTacticNotes
T1566.002Spearphishing LinkInitial AccessLinkedIn recruitment lure
T1059.007JavaScriptExecutionNode.js Function constructor
T1071.001Web ProtocolsC2Plain HTTP beacon every 5s

Full mapping: ATT&CK Navigator Layer (optional)


Infrastructure Analysis

Network Infrastructure

IndicatorTypeNotes
163.245.194.216IPC2 server, TCP/3000
vscodesettingtask.vercel.appDomainStage 1 delivery, inactive

Blockchain Infrastructure

AddressChainRole
0xE251b37B…BSCPayload staging contract

Indicators of Compromise

All indicators assessed High confidence unless noted.

Network Indicators

IndicatorTypeConfidence
163.245.194.216IPv4High

File Indicators

Hash (SHA256)FilenameNotes
abc123...server.jsMalicious server component

Repository Indicators

IndicatorTypeNotes
github.com/LuckyKat1001GitHub AccountConfirmed operator

Attribution Assessment

Assessed confidence: Low / Medium / High

Summary of attribution indicators. Always caveat: TTP similarity is not confirmed attribution.

Relevant prior reporting:


Remediation

If You Ran the Code

Brief prioritized action list for victims.

Network-Level Detection

Specific detection rules, signatures, or queries.

Host-Level Hardening

Preventive configuration changes.


Appendix: Evidence Artifacts

Artifact IDDescriptionSHA256
EX-001LinkedIn screenshotabc123...
EX-002Malicious tasks.jsondef456...

TLP:CLEAR — This report may be freely shared. Attribution assessments are tentative and based on TTP similarity only. All IOCs are provided for defensive purposes.

Report ID: TP-2026-001 | Published: 2026-02-24 | Author: ThreatProphet