Infrastructure Evolution Analysis

Analyze how malware families evolve their infrastructure usage over time

Analysis Configuration