US 12,483,570 B2
Malware traffic analyzer with direct malware detonation
Cirlig Constantin Gabriel, London (GB)
Assigned to HUMAN SECURITY, INC., New York, NY (US)
Filed by HUMAN SECURITY, INC., New York, NY (US)
Filed on Oct. 19, 2022, as Appl. No. 17/969,462.
Prior Publication US 2024/0137374 A1, Apr. 25, 2024
Prior Publication US 2024/0236123 A9, Jul. 11, 2024
Int. Cl. H04L 9/40 (2022.01); G06F 8/61 (2018.01)
CPC H04L 63/1425 (2013.01) [G06F 8/61 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A method, comprising:
retrieving a data package from a source database;
invoking an auto tester to generate indicators of compromise corresponding to types of malicious behavior on the data package;
triggering the malicious behavior on a user equipment by installing, in response to the invocation, the data package on the user equipment;
implementing an emulation of at least one user event on the data package during the malicious behavior; and
extracting a uniform resource locator, a header, or a request body generated by the user equipment,
wherein the malicious behavior comprises at least one of
setting a clock of the auto tester for a future date;
rebooting the user equipment;
turning on or off a screen of the user equipment; or
activating an idle mode of the user equipment.