Skip to main content

GLIMPS Detect

This Integration is part of the GLIMPS Detect Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

Use the GLIMPS Detect Integration to send files to GLIMPS Malware and get results from it This integration was integrated and tested with version 0.2.0 of gdetect client.

Configure GLIMPS Detect on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for GLIMPS Detect.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    API TokenTrue
    URLTrue
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
    Incident typeFalse
    Fetch incidentsFalse
    First Fetch TimeFirst fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days, 3 months, 1 year)False
    Fetch LimitMaximum number of alerts per fetch. Default and recommended is 50False
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

gdetect-send#


send file to gDetect API.

Base Command#

gdetect-send

Input#

Argument NameDescriptionRequired
entryIDEntryID of the file to send.Required

Context Output#

PathTypeDescription
GLIMPS.Gdetect.Send.UUIDstringGLIMPS Detect Binary UUID.
GLIMPS.Gdetect.Send.entryIDstringXSOAR file entryID.

Command example#

!gdetect-send entryID=1@042262f2-6a12-44da-8e11-74cf4bc67063

Context Example#

{
"GLIMPS": {
"GDetect": {
"Send": {
"entryID": "1@042262f2-6a12-44da-8e11-74cf4bc67063",
"uuid": "23465d22-3464-39ce-b8b3-bc2ee7d6eecf"
}
}
}
}

Human Readable Output#

GLIMPS.GDetect.UUID: 23465d22-3464-39ce-b8b3-bc2ee7d6eecf#

gdetect-get-all#


get all file analysis from gDetect API.

Base Command#

gdetect-get-all

Input#

Argument NameDescriptionRequired
uuidGLIMPS Detect Binary UUID.Required

Context Output#

PathTypeDescription
GLIMPS.GDetect.All.uuidStringUnique analysis identifier
GLIMPS.GDetect.All.sha256Stringstring hex encoded input file SHA256
GLIMPS.GDetect.All.sha1Stringstring hex encoded input file SHA1
GLIMPS.GDetect.All.md5Stringstring hex encoded input file MD5
GLIMPS.GDetect.All.ssdeepStringstring input file SSDeep
GLIMPS.GDetect.All.is_malwareBooleananalysis result, is a malware or not
GLIMPS.GDetect.All.scoreNumberhighest score given by probes
GLIMPS.GDetect.All.doneBooleanis the analysis finished
GLIMPS.GDetect.All.timestampNumbertimestamp of the start of analysis in milliseconds
GLIMPS.GDetect.All.filetypeStringinput file type
GLIMPS.GDetect.All.sizeNumberinput file size (in bytes)
GLIMPS.GDetect.All.filenamesStringlist of analysed filename
GLIMPS.GDetect.All.malwaresStringlist of malware names found in analysis
GLIMPS.GDetect.All.filesStringarray of submission files (input file and extracted sub-files)
GLIMPS.GDetect.All.files.sha256Stringstring hex encoded input file SHA256
GLIMPS.GDetect.All.files.sha1Stringstring hex encoded input file SHA1
GLIMPS.GDetect.All.files.md5Stringstring hex encoded input file MD5
GLIMPS.GDetect.All.files.ssdeepStringstring hex encoded input file MD5
GLIMPS.GDetect.All.files.magicStringfile magic - file type
GLIMPS.GDetect.All.files.sizeNumberinput file size (in bytes)
GLIMPS.GDetect.All.files.is_malwareBooleananalysis result, is a malware or not
GLIMPS.GDetect.All.files.av_results.avStringprobe name
GLIMPS.GDetect.All.files.av_results.resultStringmalware name indicated by probe
GLIMPS.GDetect.All.files.av_results.scoreNumberamount of point added by the probe
GLIMPS.GDetect.All.linkStringa link to the analysis in the GLIMPS Malware Expert interface
GLIMPS.GDetect.All.file_countNumberamount of file in the submission (input + extracted)
GLIMPS.GDetect.All.durationNumberduration of the analysis in milliseconds
GLIMPS.GDetect.All.tokenStringAuthentication token for the lite api
GLIMPS.GDetect.All.threats.filenamesStringlist of analysed filename
GLIMPS.GDetect.All.threatsStringSummary of threats found in submission. Each submission file reaching threshold score will add an entry. Entry keys are the SHA256 of files
GLIMPS.GDetect.All.threats.tagsStringSummary of threats found in submission. Each submission file reaching threshold score will add an entry. Entry keys are the SHA256 of files
GLIMPS.GDetect.All.threats.tags.nameStringtag name
GLIMPS.GDetect.All.threats.tags.valueStringtag value
GLIMPS.GDetect.All.threats.scoreNumberhighest score given by probes
GLIMPS.GDetect.All.threats.magicStringfile magic - file type
GLIMPS.GDetect.All.threats.sha256Stringstring hex encoded input file SHA256
GLIMPS.GDetect.All.threats.sha1Stringstring hex encoded input file SHA1
GLIMPS.GDetect.All.threats.md5Stringstring hex encoded input file MD5
GLIMPS.GDetect.All.threats.ssdeepStringstring input file SSDeep
GLIMPS.GDetect.All.threats.file_sizeNumberinput file size (in bytes)
GLIMPS.GDetect.All.threats.mimeStringfile mime type
GLIMPS.GDetect.All.statusBooleantrue => no error to report, false => an error occurred

Command example#

!gdetect-get-all uuid=23465d22-3464-39ce-b8b3-bc2ee7d6eecf

Context Example#

{
"GLIMPS": {
"GDetect": {
"All": {
"uuid": "23465d22-3464-39ce-b8b3-bc2ee7d6eecf",
"sha256": "005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b31",
"sha1": "2159b8d8b985f32641314220bb24126747b71d13",
"md5": "c24d410c7e7d4b6066e09ceee057fbf9",
"ssdeep": "6153:KyJE1yd7WHJmcyfjtPWna8DQFu/U3buRKlemZ9DnGAevIhdi++:KU/d7WsvBPWa9DQFu/U3buRKlemZ9DnG",
"is_malware": True,
"score": 4000,
"done": True,
"timestamp": 1651157541588,
"filetype": "exe",
"size": 219648,
"filenames": [
"sha256"
],
"malwares": [
"Win.Ransomware.Buhtrap-9865977-0",
"TR/Redcap.ltkcp",
"Mal/Behav-010"
],
"files": [
{
"sha256": "005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b31",
"sha1": "2159b8d8b985f32641314220bb24126747b71d13",
"md5": "c24d410c7e7d4b6066e09ceee057fbf9",
"ssdeep": "6153:KyJE1yd7WHJmcyfjtPWna8DQFu/U3buRKlemZ9DnGAevIhdi++:KU/d7WsvBPWa9DQFu/U3buRKlemZ9DnG",
"magic": "PE32 executable (GUI) Intel 80386, for MS Windows",
"av_results": [
{
"av": "SignatureOyster",
"result": "Win.Ransomware.Buhtrap-9865977-0",
"score": 1000
},
{
"av": "SignatureUmbrella",
"result": "TR/Redcap.ltkcp",
"score": 1000
},
{
"av": "SignatureSophos",
"result": "Mal/Behav-010",
"score": 1000
}
],
"size": 219648,
"is_malware": True
},
{
"sha256": "bd52eb164e64e6316791a8c260689b8ca0bf54440fa629edc05f6d4c301faec",
"sha1": "d0333bf36f7bd1bdc1b2110e0a55e608ec378577",
"md5": "5edb7d7e63f80d657e975628add89cd3",
"ssdeep": "99:JKXtFmZan3KNhTP+5oXlNbAuC5mDDtUEDPUmgXSM:JMFkNhy1qlNkPDDzPcF",
"magic": "data",
"size": 6144,
"is_malware": False
},
{
"sha256": "f9c00d396b73fc4b4d05c518a7c9eddbed35462270d2ae5e31380fe5ca0f0c67",
"sha1": "d5cfd73469f053c4ec8cd34d7a81baaf4e6d5068",
"md5": "5a58f4825aa4cc6ce9098c20dcc99448",
"ssdeep": "98:WuuR8iHj18usiDdeKvg3nbNqCH7FazFT3jCDomhCuorfhHSEdP2pVUVi7P1uH:Q6ijDUsEg0nf5CCo0Cu054VUViCu",
"magic": "data",
"size": 6144,
"is_malware": False
}
],
"link": "http://gdetect-instance.lan/expert/en/analysis-redirect/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ6.J1c2VybmFtZSI6ImFwaS10YW8ndWl0ZXN0IiwiZ7JvdXBzIjpbInRhbmd1aXRlc3QiXSwic2lkIjoiN2d6WUNzWDRSNmp6bHlaQzNpZXJLWSIsImV4cCI4MTY1MzgwNzgwOSwiaWF3IjoxNjUxMjE3ODA2fQ.EGk75tKwAq70TPCjClnOp_2_339XqMXk0TbPJhSN2uE",
"file_count": 3,
"duration": 8268,
"token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ6.J1c2VybmFtZSI6ImFwaS10YW8ndWl0ZXN0IiwiZ7JvdXBzIjpbInRhbmd1aXRlc3QiXSwic2lkIjoiN2d6WUNzWDRSNmp6bHlaQzNpZXJLWSIsImV4cCI4MTY1MzgwNzgwOSwiaWF3IjoxNjUxMjE3ODA2fQ.EGk75tKwAq70TPCjClnOp_2_339XqMXk0TbPJhSN2uE",
"threats": {
"005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b31": {
"filenames": [
"23465d22-3464-39ce-b8b3-bc2ee7d6eecf"
],
"tags": [
{
"name": "av.virus_name",
"value": "Mal/Behav-010"
},
{
"name": "attribution.family",
"value": "win_vegalocker_auto"
},
{
"name": "av.virus_name",
"value": "win_vegalocker_auto"
},
{
"name": "av.virus_name",
"value": "Win.Ransomware.Buhtrap-9865977-0"
},
{
"name": "av.virus_name",
"value": "TR/Redcap.ltkcp"
}
],
"score": 4000,
"magic": "PE32 executable (GUI) Intel 80386, for MS Windows",
"sha256": "005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b31",
"sha1": "2159b8d8b985f32641314220bb24126747b71d13",
"md5": "c24d410c7e7d4b6066e09ceee057fbf9",
"ssdeep": "6153:KyJE1yd7WHJmcyfjtPWna8DQFu/U3buRKlemZ9DnGAevIhdi++:KU/d7WsvBPWa9DQFu/U3buRKlemZ9DnG",
"file_size": 219648,
"mime": "application/x-dosexec"
}
},
"status": True
}
}
}
}

Human Readable Output#

Results#

donedurationfile_countfilenamesfiletypeis_malwarelinkmalwaresmd5scoresha1sha256sizessdeepstatustimestamptokenuuid
true82683sha256exetruehttps://gdetect-instance.lan/expert/en/analysis-redirect/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ6.J1c2VybmFtZSI6ImFwaS10YW8ndWl0ZXN0IiwiZ7JvdXBzIjpbInRhbmd1aXRlc3QiXSwic2lkIjoiN2d6WUNzWDRSNmp6bHlaQzNpZXJLWSIsImV4cCI4MTY1MzgwNzgwOSwiaWF3IjoxNjUxMjE3ODA2fQ.EGk75tKwAq70TPCjClnOp_2_339XqMXk0TbPJhSN2uEWin.Ransomware.Buhtrap-9865977-0,
TTR/Redcap.ltkcp,
Mal/Behav-010
c24d410c7e7d4b6066e09ceee057fbf940002159b8d8b985f32641314220bb24126747b71d13005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b312196486153:KyJE1yd7WHJmcyfjtPWna8DQFu/U3buRKlemZ9DnGAevIhdi++:KU/d7WsvBPWa9DQFu/U3buRKlemZ9DnGKtrue1651157541588eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ6.J1c2VybmFtZSI6ImFwaS10YW8ndWl0ZXN0IiwiZ7JvdXBzIjpbInRhbmd1aXRlc3QiXSwic2lkIjoiN2d6WUNzWDRSNmp6bHlaQzNpZXJLWSIsImV4cCI4MTY1MzgwNzgwOSwiaWF3IjoxNjUxMjE3ODA2fQ.EGk75tKwAq70TPCjClnOp_2_339XqMXk0TbPJhSN2uE23465d22-3464-39ce-b8b3-bc2ee7d6eecf

File#

sha256sha1md5ssdeepmagicsizeis_malware
005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b312159b8d8b985f32641314220bb24126747b71d13c24d410c7e7d4b6066e09ceee057fbf96153:KyJE1yd7WHJmcyfjtPWna8DQFu/U3buRKlemZ9DnGAevIhdi++:KU/d7WsvBPWa9DQFu/U3buRKlemZ9DnGE32 executable (GUI) Intel 80386, for MS Windowss219648true

AV Result for 020dac2b02fd8df13e8782aa3aa85eb28f3dba4193dd5fecacee4905ede8fa6a#

avresultscore
SignatureOysterWin.Ransomware.Buhtrap-9865977-01000
SignatureUmbrellaTR/Redcap.ltkcp1000
SignatureSophosMal/Behav-0101000

File#

sha256sha1md5ssdeepmagicsizeis_malware
bd52eb164e64e6316791a8c260689b8ca0bf54440fa629edc05f6d4c301faecd0333bf36f7bd1bdc1b2110e0a55e608ec3785775edb7d7e63f80d657e975628add89cd399:JKXtFmZan3KNhTP+5oXlNbAuC5mDDtUEDPUmgXSM:JMFkNhy1qlNkPDDzPcFdata6144false

File#

sha256sha1md5ssdeepmagicsizeis_malware
f9c00d396b73fc4b4d05c518a7c9eddbed35462270d2ae5e31380fe5ca0f0c67d5cfd73469f053c4ec8cd34d7a81baaf4e6d50685a58f4825aa4cc6ce9098c20dcc9944898:WuuR8iHj18usiDdeKvg3nbNqCH7FazFT3jCDomhCuorfhHSEdP2pVUVi7P1uH:Q6ijDUsEg0nf5CCo0Cu054VUViCudata6144false

Threat 005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b31#

filenamesscoremagicsha256sha1md5ssdeepfile_sizemime
23465d22-3464-39ce-b8b3-bc2ee7d6eecf4000PE32 executable (GUI) Intel 80386, for MS Windows005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b312159b8d8b985f32641314220bb24126747b71d13c24d410c7e7d4b6066e09ceee057fbf96153:KyJE1yd7WHJmcyfjtPWna8DQFu/U3buRKlemZ9DnGAevIhdi++:KU/d7WsvBPWa9DQFu/U3buRKlemZ9DnG219648application/x-dosexec

Tags of threat 005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b31#

namevalue
av.virus_nameTroj/Krypt-DY
attribution.familywin_vegalocker_auto
av.virus_namewin_vegalocker_auto
av.virus_nameWin.Ransomware.Buhtrap-9865977-0
av.virus_nameTR/Redcap.ltkcp

gdetect-get-threats#


get threats results for file analysis from gDetect API.

Base Command#

gdetect-get-threats

Input#

Argument NameDescriptionRequired
uuidGLIMPS Detect Binary UUID.Required

Context Output#

PathTypeDescription
GLIMPS.GDetect.Threats.filenamesStringlist of analysed filename
GLIMPS.GDetect.Threats.linkStringa link to the analysis in the GLIMPS Malware Expert interface
GLIMPS.GDetect.ThreatsStringSummary of threats found in submission. Each submission file reaching threshold score will add an entry. Entry keys are the SHA256 of files
GLIMPS.GDetect.Threats.tagsStringSummary of threats found in submission. Each submission file reaching threshold score will add an entry. Entry keys are the SHA256 of files
GLIMPS.GDetect.Threats.tags.nameStringtag name
GLIMPS.GDetect.Threats.tags.valueStringtag value
GLIMPS.GDetect.Threats.scoreNumberhighest score given by probes
GLIMPS.GDetect.Threats.magicStringfile magic - file type
GLIMPS.GDetect.Threats.sha256Stringstring hex encoded input file SHA256
GLIMPS.GDetect.Threats.sha1Stringstring hex encoded input file SHA1
GLIMPS.GDetect.Threats.md5Stringstring hex encoded input file MD5
GLIMPS.GDetect.Threats.ssdeepStringstring input file SSDeep
GLIMPS.GDetect.Threats.file_sizeNumberinput file size (in bytes)
GLIMPS.GDetect.Threats.mimeStringfile mime type

Command example#

!gdetect-get-threats uuid=23465d22-3464-39ce-b8b3-bc2ee7d6eecf

Context Example#

{
"GLIMPS": {
"GDetect": {
"Threats": {
"005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b31": {
"filenames": [
"23465d22-3464-39ce-b8b3-bc2ee7d6eecf"
],
"tags": [
{
"name": "av.virus_name",
"value": "Mal/Behav-010"
},
{
"name": "attribution.family",
"value": "win_vegalocker_auto"
},
{
"name": "av.virus_name",
"value": "win_vegalocker_auto"
},
{
"name": "av.virus_name",
"value": "Win.Ransomware.Buhtrap-9865977-0"
},
{
"name": "av.virus_name",
"value": "TR/Redcap.ltkcp"
}
],
"score": 4000,
"magic": "PE32 executable (GUI) Intel 80386, for MS Windows",
"sha256": "005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b31",
"sha1": "2159b8d8b985f32641314220bb24126747b71d13",
"md5": "c24d410c7e7d4b6066e09ceee057fbf9",
"ssdeep": "6153:KyJE1yd7WHJmcyfjtPWna8DQFu/U3buRKlemZ9DnGAevIhdi++:KU/d7WsvBPWa9DQFu/U3buRKlemZ9DnG",
"file_size": 219648,
"mime": "application/x-dosexec"
},
"link": "http://gdetect-instance.lan/expert/en/analysis-redirect/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ6.J1c2VybmFtZSI6ImFwaS10YW8ndWl0ZXN0IiwiZ7JvdXBzIjpbInRhbmd1aXRlc3QiXSwic2lkIjoiN2d6WUNzWDRSNmp6bHlaQzNpZXJLWSIsImV4cCI4MTY1MzgwNzgwOSwiaWF3IjoxNjUxMjE3ODA2fQ.EGk75tKwAq70TPCjClnOp_2_339XqMXk0TbPJhSN2uE",
"uuid": "23465d22-3464-39ce-b8b3-bc2ee7d6eecf"
}
}
}
}

Human Readable Output#

Threat 020dac2b02fd8df13e8782aa3aa85eb28f3dba4193dd5fecacee4905ede8fa6a#

filenamesscoremagicsha256sha1md5ssdeepfile_sizemime
23465d22-3464-39ce-b8b3-bc2ee7d6eecf4000PE32 executable (GUI) Intel 80386, for MS Windows005b00d41749f7b0336d4d5fe0402dcfc95ae0df44a2231a89a59919eeb30b312159b8d8b985f32641314220bb24126747b71d13c24d410c7e7d4b6066e09ceee057fbf96153:KyJE1yd7WHJmcyfjtPWna8DQFu/U3buRKlemZ9DnGAevIhdi++:KU/d7WsvBPWa9DQFu/U3buRKlemZ9DnG219648application/x-dosexec

Tags of threat 020dac2b02fd8df13e8782aa3aa85eb28f3dba4193dd5fecacee4905ede8fa6a#

namevalue
av.virus_nameMal/Behav-010
attribution.familywin_vegalocker_auto
av.virus_namewin_vegalocker_auto
av.virus_nameWin.Ransomware.Buhtrap-9865977-0
av.virus_nameTR/Redcap.ltkcp

Link to the analysis in the GLIMPS Malware Expert interface