Threat Assessment & IOC Analysis

Analyse a suspicious file or email and produce a structured threat assessment with indicators of compromise and recommended containment actions.

Cyber Security AnalystClaudeCo-PilotChatGPTGeminiLowUpdated Mar-26
258·

Prompt

I need you to analyse the following : Please produce a structured threat assessment covering: 1. Summary of what this appears to be (malware type, phishing kit, exploit, etc.) 2. Indicators of Compromise (IOCs) — hashes, IPs, domains, URLs 3. Tactics, Techniques and Procedures (TTPs) mapped to MITRE ATT&CK where applicable 4. Confidence level in your assessment (High / Medium / Low) with reasoning 5. Immediate containment and remediation recommendations If anything is unclear or would benefit from more context, ask me now before diving in.

Sign in to save the prompt