Virus Total
Virustotal can be used to analyze suspicious files and URLs to detect types of malware including viruses, worms, and trojans.
Connect Virustotal with Devo SOAR
Navigate to Automations > Integrations.
Search for Virustotal.
Click Details, then the + icon. Enter the required information in the following fields.
Label: Enter a connection name.
Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
Remote Agent: Run this integration using the Devo SOAR Remote Agent.
API Key: The API key to connect to the Virustotal.
After you've entered all the details, click Connect.
Actions for Virustotal
Analyze Domain
Retrieves a domain report
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Column Name | Select the name of the column in the parent table containing the domain to submit to VirusTotal. | Required |
Output
A JSON object containing multiple rows of result:
has_error: True/False
error: message/null
result: analysis details
``` {json}{ "BitDefender category": "business", "domain_siblings": [ "msg.logichub.com", "info.logichub.com", "stg.logichub.com" ], "sophos category": "advertisements", "undetected_downloaded_samples": [ { "date": "2019-09-16 16:35:55", "positives": 0, "total": 70, "sha256": "5085cc9e65c2c0c473b7a92d7667a20daf58bef2f8961b4faefafb8d3468a2db" } ], "whois": "Admin City: Scottsdale\nAdmin Country: US\nAdmin Email: 005338d93d01f529s@domainsbyproxy.com\nAdmin Organization: Domains By Proxy, LLC\nAdmin Postal Code: 85260\nAdmin State/Province: Arizona\nCreation Date: 2010-03-31T18:05:17Z\nDNSSEC: unsigned\nDomain Name: LOGICHUB.COM\nDomain Name: logichub.com\nDomain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited\nDomain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited\nDomain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited\nDomain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited\nDomain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited\nDomain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited\nDomain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited\nDomain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited\nName Server: NS53.DOMAINCONTROL.COM\nName Server: NS54.DOMAINCONTROL.COM\nRegistrant City: 373f4980ad3d2d01\nRegistrant Country: US\nRegistrant Email: 005338d93d01f529s@domainsbyproxy.com\nRegistrant Fax Ext: 3432650ec337c945\nRegistrant Fax: 9fad764be0c7e95d\nRegistrant Name: 80315b2e6ac1a801\nRegistrant Organization: b46a98a26fe2fd9f\nRegistrant Phone Ext: 3432650ec337c945\nRegistrant Phone: d5f66d3a005b000d\nRegistrant Postal Code: b9448b1c75ff534d\nRegistrant State/Province: 30bdd2917a604c83\nRegistrant Street: 037792fd5a6fe619\nRegistrant Street: f38c0adea706dbc3\nRegistrar Abuse Contact Email: abuse@godaddy.com\nRegistrar Abuse Contact Phone: +1.4806242505\nRegistrar Abuse Contact Phone: 480-624-2505\nRegistrar IANA ID: 146\nRegistrar Registration Expiration Date: 2030-03-31T18:05:17Z\nRegistrar URL: http://www.godaddy.com\nRegistrar WHOIS Server: whois.godaddy.com\nRegistrar: GoDaddy.com, LLC\nRegistry Admin ID: Not Available From Registry\nRegistry Domain ID: 1590984107_DOMAIN_COM-VRSN\nRegistry Expiry Date: 2030-03-31T18:05:17Z\nRegistry Registrant ID: Not Available From Registry\nRegistry Tech ID: Not Available From Registry\nTech City: Scottsdale\nTech Country: US\nTech Email: 005338d93d01f529s@domainsbyproxy.com\nTech Organization: Domains By Proxy, LLC\nTech Postal Code: 85260\nTech State/Province: Arizona\nUpdated Date: 2020-04-05T17:12:07Z\nUpdated Date: 2020-04-05T17:12:10Z", "detected_downloaded_samples": [ { "date": "2020-05-05 15:52:49", "positives": 1, "total": 75, "sha256": "5085cc9e65c2c0c473b7a92d7667a20daf58bef2f8961b4faefafb8d3468a2db" } ], "response_code": 1, "detected_referrer_samples": [], "verbose_msg": "Domain found in dataset", "Forcepoint ThreatSeeker category": "information technology", "undetected_urls": [ [ "https://www.logichub.com/", "1101a118b616f943e890e9e8e8f49161f4336e0a7815ddee08d8a233e0ba7ff9", 0, 80, "2020-10-15 18:50:15" ] ], "Comodo Valkyrie Verdict category": "media sharing", "undetected_referrer_samples": [ { "date": "2020-04-22 14:21:44", "positives": 0, "total": 0, "sha256": "9388089e4a60d5cd88e2c99a2e060e8fa8cb897b123f5bac62290a925e7a022c" } ], "resolutions": [ { "last_resolved": "2017-02-07 00:00:00", "ip_address": "107.180.0.110" } ], "detected_urls": [], "lh_report_url": null, "error": null, "has_error": false }
## Analyze File Hash
Retrieves a file hash report
### Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required |
| :---------- | :----------------------------------------------------------------------------------- | :------- |
| Column Name | Name of the column in the parent table containing file hash to submit to VirusTotal. | Required |
### Output
A JSON object containing multiple rows of result:
- has_error: True/False
- error: message/null
- result: analysis details
``` {json}{
"scans": {
"Alibaba": {
"detected": true,
"version": "0.3.0.5",
"result": "Backdoor:Win32/Nepoe.530869dc",
"update": "20190527"
},
"Cybereason": {
"detected": true,
"version": "1.2.449",
"result": "malicious.69043a",
"update": "20190616"
}
},
"scan_id": "b018706f57937136a2f61421c5a7a9f4ce8c89c3670ae4814491473184545962-1604018059",
"sha1": "5b63d3bf46aec2126932d8a683ca971c56f7d717",
"resource": "cbed16069043a0bf3c92fff9a99cccdc",
"response_code": 1,
"scan_date": "2020-10-30 00:34:19",
"permalink": "https://www.virustotal.com/gui/file/b018706f57937136a2f61421c5a7a9f4ce8c89c3670ae4814491473184545962/detection/f-b018706f57937136a2f61421c5a7a9f4ce8c89c3670ae4814491473184545962-1604018059",
"verbose_msg": "Scan finished, information embedded",
"total": 72,
"positives": 63,
"sha256": "b018706f57937136a2f61421c5a7a9f4ce8c89c3670ae4814491473184545962",
"md5": "cbed16069043a0bf3c92fff9a99cccdc",
"lh_report_url": "https://www.virustotal.com/gui/file/b018706f57937136a2f61421c5a7a9f4ce8c89c3670ae4814491473184545962/detection/f-b018706f57937136a2f61421c5a7a9f4ce8c89c3670ae4814491473184545962-1604018059",
"error": null,
"has_error": false
}
Analyze IP Address
Retrieves an IP address report
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Column Name | Name of the column in the parent table containing IP address to submit to VirusTotal. | Required |
Output
A JSON object containing multiple rows of result:
has_error: True/False
error: message/null
result: analysis details
``` {json}{ "asn": 7922, "undetected_urls": [ [ "http://cet-nat.comcastcntr.pa.bo.comcast.net/", "2521651e23393ea13e2817a4afee4847b3d35f4d2df2b5917ca332294b5aafd2", 0, 70, "2019-07-11 10:00:22" ] ], "undetected_downloaded_samples": [], "country": "US", "response_code": 1, "as_owner": "Comcast Cable Communications, LLC", "detected_referrer_samples": [], "verbose_msg": "IP address in dataset", "detected_downloaded_samples": [], "undetected_referrer_samples": [ { "date": "2020-04-22 23:08:01", "positives": 0, "total": 75, "sha256": "7206af0ae424df1f3eddf9198a38e24facfa3fb87fd0cff1d3991141efc1e7b7" } ], "detected_urls": [], "resolutions": [ { "last_resolved": "2019-07-11 10:03:20", "hostname": "cet-nat.comcastcntr.pa.bo.comcast.net" } ], "error": null, "has_error": false }
## Analyze URL
Analyze URL by VirusTotal
### Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required |
| :---------- | :----------------------------------------------------------------------------------------------- | :------- |
| Action Type | Select an action type. | Required |
| Column Name | Select the name of the column in the parent table containing the domain to submit to VirusTotal. | Required |
### Output
A JSON object containing multiple rows of result:
- has_error: True/False
- error: message/null
- result: analysis details
``` {json}{
"permalink": "https://www.virustotal.com/gui/url/34fd16559c0caee40f3941c391900a36de23a3031c3ebddc52c1986145724553/detection/u-34fd16559c0caee40f3941c391900a36de23a3031c3ebddc52c1986145724553-1601641706",
"resource": "34fd16559c0caee40f3941c391900a36de23a3031c3ebddc52c1986145724553-1601641706",
"url": "https://playground.dev.logichub.com/",
"response_code": 1,
"scan_date": "2020-10-02 12:28:26",
"scan_id": "34fd16559c0caee40f3941c391900a36de23a3031c3ebddc52c1986145724553-1601641706",
"verbose_msg": "Scan finished, scan information embedded in this object",
"has_error": false,
"error": null,
"filescan_id": null,
"positives": 0,
"total": 79,
"scans": {
"MalwareDomainList": {
"detected": false,
"result": "clean site",
"detail": "http://www.malwaredomainlist.com/mdl.php?search=playground.dev.logichub.com"
},
"Web Security Guard": {
"detected": false,
"result": "clean site"
},
"OpenPhish": {
"detected": false,
"result": "clean site"
}
}
}
Analyze File
Analyze File by VirusTotal
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
Action Type | Select an action type. | Required |
Column Name | Select the name of the column in the parent table containing the domain to submit to VirusTotal. | Required |
Output
A JSON object containing multiple rows of result:
has_error: True/False
error: message/null
result: analysis details
``` {json}{ "scans": { "Kaspersky": { "detected": false, "version": "15.0.1.13", "result": null, "update": "20201120" }, "MaxSecure": { "detected": false, "version": "1.0.0.1", "result": null, "update": "20201119" }, "AVG": { "detected": false, "version": "20.10.5736.0", "result": null, "update": "20201120" } }, "scan_id": "32d3638fc2a2b8c5ad85839e5ea4dffbab701c08f7cb8c305f11e51189d81231-1605867145", "sha1": "714c804de08df5f6852a6470773f4edba31c83d9", "resource": "32d3638fc2a2b8c5ad85839e5ea4dffbab701c08f7cb8c305f11e51189d81231-1605867145", "response_code": 1, "scan_date": "2020-11-20 10:12:25", "permalink": "https://www.virustotal.com/gui/file/32d3638fc2a2b8c5ad85839e5ea4dffbab701c08f7cb8c305f11e51189d81231/detection/f-32d3638fc2a2b8c5ad85839e5ea4dffbab701c08f7cb8c305f11e51189d81231-1605867145", "verbose_msg": "Scan finished, information embedded", "total": 61, "positives": 0, "sha256": "32d3638fc2a2b8c5ad85839e5ea4dffbab701c08f7cb8c305f11e51189d81231", "md5": "c9cd2d0f3cee5961b579e7a5e9fd123e", "lh_report_url": "https://www.virustotal.com/gui/file/32d3638fc2a2b8c5ad85839e5ea4dffbab701c08f7cb8c305f11e51189d81231/detection/f-32d3638fc2a2b8c5ad85839e5ea4dffbab701c08f7cb8c305f11e51189d81231-1605867145", "error": null, "has_error": false }
## Intelligence Search
Search for files (the action is data-heavy, so please try to reduce the limit or increase action timeout in case of timeout error).
### Input
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Argument Name | Description | Required |
| :------------ | :----------------------------------------------------------------------------------------- | :------- |
| Search Query | [Jinja-Templated](doc:jinja-template) text containing the Search Query. Example: {{query}} | Required |
| Limit | Number of results to return (Default is 100000) | Optional |
### Output
A JSON object containing multiple rows of result.
``` {json}{
"attributes": {
"creation_date": 51351,
"downloadable": true,
"exiftool": {
"Trapped": "False",
},
"first_submission_date": 1638251100,
"last_analysis_date": 1638257416,
"last_analysis_results": "some_object",
"last_modification_date": 1638258704,
"last_submission_date": 1638257416,
"magic": "PDF document, version 1.7",
"md5": "md5_hash",
"meaningful_name": "/tmp/meaning.tmp",
"names": "name_array",
"pdf_info": "info_object",
"reputation": 0,
"sha1": "sha1_example",
"sha256": "sha256_example",
"size": 2303072,
"ssdeep": "example",
"tags": [
"pdf",
"autoaction"
],
"times_submitted": 2,
"tlsh": "some_text",
"total_votes": {
"harmless": 0,
"malicious": 0
},
"links": {
"self": "https://www.virustotal.com/api/v3/files/sample_id"
},
"has_error": false,
"id": "sample_id",
"error": null,
"type": "file"
}
Additional Information
If you face a timeout error please increase the Action Timeout (Default is 360 seconds).
File Behavior Reports
Get all behavioural information from each sandbox about the file.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
Input Name | Description | Required |
---|---|---|
File Hash | Jinja-templated text containing the File Hash | Required |
Output
JSON containing the following items:
``` {json}{ "data": [ { "attributes": { "verdicts": [ "UNKNOWN_VERDICT" ], "has_pcap": false, "analysis_date": 1669409515, "processes_tree": [ { "process_id": "2248", "name": "%windir%\System32\svchost.exe -k WerSvcGroup" }, { "process_id": "2940", "name": "wmiadap.exe /F /T /R" }, { "process_id": "2988", "name": "%windir%\system32\wbem\wmiprvse.exe" }, { "process_id": "2676", "name": "%SAMPLEPATH%" } ], "sandbox_name": "C2AE", "has_html_report": false, "processes_terminated": [ "%windir%\System32\svchost.exe -k WerSvcGroup", "wmiadap.exe /F /T /R" ], "behash": "7eb58e30b74038daa9b31b5d9df78cf2", "has_evtx": false, "last_modification_date": 1669495931, "has_memdump": false }, "type": "file_behaviour", "id": "hash", "links": { "self": "https://www.virustotal.com/api/v3/file_behaviours/{hash}}" } }, ], "links": { "self": "https://www.virustotal.com/api/v3/files/{hash}/behaviours?limit=10" } }
Release Notes
v4.1.1
- Added 2 new actionsFile Behavior Reports
andSummarise File Behavior Reports
.v4.0.0
- Updated architecture to support IO via filesystem