
Original Threat Intelligence Research
Hands-on malware analysis turned into structured, evidence-based intelligence — technically deep enough to trust, clear enough to act on. Published by a solo analyst for the defender community.
Latest Reports
HijackLoader / Penguish / Rugmi to AsyncRAT Multi-Vector Phishing Campaign
AdaptixC2 Open Directory Exposure — 45.130.148.125 Operator Toolkit
Mission
Most threat intelligence fails defenders in one of two ways. It is either too shallow to be actionable — headlines dressed up as analysis — or technically rigorous but locked behind paywalls, stripped of indicators, and written for researchers rather than the people responding at 2am.
The Hunter's Ledger exists to fill that gap. Every report here is built from original research: real samples, real infrastructure, real detections. The goal is intelligence that a defender can open, read, and act on the same day — with IOCs ready to ingest, detection rules ready to deploy, and analysis deep enough to actually understand what a threat does and how to stop it.
All of it is free. Defenders should not have to pay to defend.
The Hunter's Ledger exists to fill that gap. Every report here is built from original research: real samples, real infrastructure, real detections. The goal is intelligence that a defender can open, read, and act on the same day — with IOCs ready to ingest, detection rules ready to deploy, and analysis deep enough to actually understand what a threat does and how to stop it.
All of it is free. Defenders should not have to pay to defend.
Note
This is not a collection of open source intel reports, IOCs, or TTPs. Findings are from original research, though they may overlap with known threats.
Navigate
Reports →
Malware analysis & reverse engineering notes
Hunting Detections →
Sigma, YARA, and Suricata rules
IOC Feeds →
Indicators ready for your SIEM or EDR
Behind the Reports →
How the intelligence is produced
Contributing
Have original research, detections, or IOCs you'd like to share with the community? Reach out at intel@the-hunters-ledger.com — findings can be posted on your behalf as a co-author or attributed however you prefer.
About the Analyst
Resources