Register for our next deep dive! Who is Behind Portal Kombat? Exposing the Pravda Disinformation Machine with OSINT on Thursday, June 27, 2024, at 16:00 CET. Grab your spot now! close
home Transform Hub data categories - Malware

MalNet with ProofPoint

By ShadowDragon LLC
Correlate IOCs, campaign dates, malware hash relations, C2 infrastructure, and more.
MalNet with ProofPoint integration in Maltego
Malware Cybercrime Incident Response

MalNet Transforms for Maltego

MalNet with ProofPoint brings together the industry’s most extensive malware threat information from Proofpoint with link analysis from Maltego.

With these Transforms, investigators can identify and visualize malware connections to expedite investigations, response, and malware protection. Correlate IOCs, campaign dates, IDS to malware hash relations, C2 infrastructure identification, and much more.


  • With 100+ Transforms, visualize uncovering points of origin, covert channels, exploits kits, malware hashes, command control systems and more
  • Connect specific attack campaigns to billions of available individual indicators
  • Visualize malware connections and campaigns into thousands of records

Typical Users of This Data

  • Law Enforcement Agencies
  • Incident Responders
  • Threat Analysts
  • MSSP Teams
  • SOC Teams
  • Threat Intelligence Teams

Pricing & Access

Community Hub

Available only with a Maltego commercial license.

Commercial Hub

Users with Maltego One have the following access or purchase options:

  • Bring Your Own Key (Purchase Separately): For full solution access, plug in your existing API key or reach out to us using the form below for purchase inquiry.


By clicking on "Send Message", you agree to the processing of the data you entered and you allow us to contact you for the purpose selected in the form. For further information, see our Data Privacy Policy.

About ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies. Developed by seasoned cyber investigators, these solutions strengthen the capabilities of in-house teams by enabling the easy and safe collection, correlation and verification of diverse artifacts on the open, deep and dark web.

For more information, visit

Pick the right product and get started.