Analyzing Threat Intel and Malware logs presents a crucial opportunity for security teams to improve their knowledge of current threats . These files often contain useful information regarding malicious activity tactics, procedures, and processes (TTPs). By thoroughly analyzing FireIntel reports alongside InfoStealer log information, investigators