Skip to main content

MetaDefender Aether

This Integration is part of the MetaDefender Aether Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

Next-generation unified Zero-Day detection solution, combining the proven capabilities of MetaDefender Sandbox with built-in Threat Intelligence, Threat Scoring and Threat Hunting - all delivered as a single adaptive detection pipeline. (previously known as MetaDefender Sandbox)

Configure MetaDefender Aether on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for MetaDefender Aether.

  3. Click Add instance to create and configure a new integration instance.

    ParameterRequired
    Server URL (e.g. https://www.filescan.io/api)True
    API KeyTrue
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
  4. Click Test to validate the URLs, the API Key and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

metadefender-aether-scan-url#


Scan URL with MetaDefender Aether

Note: MetaDefender Aether handles URL scanning as a file scan.

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.

Base Command#

metadefender-aether-scan-url

Input#

Argument NameDescriptionRequired
urlThe URL to submitRequired
timeoutThe timeout for the polling in secondsOptional
hide_polling_outputHide polling outputOptional
descriptionUploaded file/url descriptionOptional
tagsTags array to propagateOptional
passwordCustom password, in case uploaded archive is protectedOptional
is_privateIf file should not be available for download by other usersOptional

Context Output#

PathTypeDescription
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.ScoreNumberThe actual score.
File.NameStringThe full file name.
File.SHA256StringThe SHA256 hash of the file.
File.Malicious.VendorStringThe vendor that reported the file as malicious.
MetaDefender.Aether.Analysis.finalVerdict.verdictStringThe final verdict.
MetaDefender.Aether.Analysis.allTagsUnknownAll tags.
MetaDefender.Aether.Analysis.overallStateStringOverall state of the scan.
MetaDefender.Aether.Analysis.taskReference.nameStringName of the main scan task.
MetaDefender.Aether.Analysis.taskReference.additionalInfoUnknownAdditional information about the main scan task.
MetaDefender.Aether.Analysis.taskReference.IDStringID of the main scan task.
MetaDefender.Aether.Analysis.taskReference.stateStringState of the main scan task.
MetaDefender.Aether.Analysis.taskReference.resourceReferenceUnknownResource reference of the main scan task.
MetaDefender.Aether.Analysis.taskReference.opcountNumberCounter.
MetaDefender.Aether.Analysis.taskReference.processTimeNumberprocessTime.
MetaDefender.Aether.Analysis.subtaskReferencesUnknownStatus of scan subtasks.
MetaDefender.Aether.Analysis.allSignalGroupsUnknownAll signal groups.
MetaDefender.Aether.Analysis.resourcesUnknownResources.
MetaDefender.Aether.Analysis.file.nameStringThe name of the file.
MetaDefender.Aether.Analysis.file.hashStringThe SHA256 of the file.
MetaDefender.Aether.Analysis.file.typeStringThe type of the submission.

Command example#

!metadefender-aether-scan-url url=https://www.test.com

Context Example#

{
"DBotScore":
[
{
"Indicator": "1111111111111111111111111111111111111111111111111111111111111111",
"Score": 1,
"Type": "file",
"Vendor": "MetaDefender Aether"
}
],
"File":
[
{
"Name": "https://www.test.com",
"SHA256": "1111111111111111111111111111111111111111111111111111111111111111"
}
],
"MetaDefender":
{
"Aether":
{
"Analysis":
[
{
"finalVerdict":
{
"verdict": "BENIGN"
},
"allTags":
[
{
"source": "MEDIA_TYPE",
"sourceIdentifier": "12345678",
"isRootTag": true,
"tag":
{
"name": "html",
"synonyms":
[],
"descriptions":
[],
"verdict":
{
"verdict": "INFORMATIONAL",
"threatLevel": 0.1,
"confidence": 1
}
}
}
],
"overallState": "success_partial",
"taskReference":
{
"name": "transform-file",
"additionalInfo":
{
"submitName": "https://www.test.com",
"submitTime": 1679014774270,
"digests":
{
"SHA-256": "1111111111111111111111111111111111111111111111111111111111111111"
}
},
"ID": "abcd-1234",
"state": "SUCCESS",
"resourceReference":
{
"type": "TRANSFORM_FILE",
"name": "file",
"ID": "abcd-5678"
},
"opcount": 1,
"processTime": 20350
},
"subtaskReferences":
[
{
"name": "domain-resolve",
"additionalInfo": 72,
"ID": "12345678",
"state": "SUCCESS",
"resourceReference":
{
"type": "DOMAIN_RESOLVE",
"name": "domain-resolve",
"ID": "123456789"
},
"opcount": 20,
"processTime": 11309
}
],
"allSignalGroups":
[
{
"identifier": "I000",
"description": "OSINT source detected malicious resource",
"averageSignalStrength": 0.75,
"peakSignalStrength": 0.75,
"finalSignalStrength": 0.75,
"verdict":
{
"verdict": "LIKELY_MALICIOUS",
"threatLevel": 0.75,
"confidence": 1
},
"allTags":
[],
"signals":
[
{
"strength": 0.75,
"isStrictlyBasedOnInputData": false,
"signalReadable": "OSINT provider TEST provider (2/93)",
"additionalInfo": "https://www.google.com",
"originPath": "osint.results.verdict",
"originType": "INPUT_FILE",
"originIdentifier": "1234"
}
]
}
],
"resources":
{
"00f1e4d6-27fb-45e8-8a02-dc53818044ec":
{
"resourceReference":
{
"name": "osint"
},
"results":
[]
}
},
"file":
{
"name": "https://www.test.com",
"hash": "1111111111111111111111111111111111111111111111111111111111111111",
"type": "other"
}
}
]
}
}
}

Human Readable Output#

Scan Result (digest)#

FileHashFileNameFileTypeFinalVerdictSubtaskReferencesTags
1111111111111111111111111111111111111111111111111111111111111111https://www.test.comotherBENIGNosint, url-render, domain-resolvehtml, png

metadefender-aether-scan-file#


Scan File with MetaDefender Aether

Base Command#

metadefender-aether-scan-file

Input#

Argument NameDescriptionRequired
entry_idThe War Room entry ID of the file to submitRequired
timeoutThe timeout for the polling in secondsOptional
hide_polling_outputHide polling outputOptional
descriptionUploaded file/url descriptionOptional
tagsTags array to propagateOptional
passwordCustom password, in case uploaded archive is protectedOptional
is_privateIf file should not be available for download by other usersOptional

Context Output#

PathTypeDescription
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.ScoreNumberThe actual score.
File.NameStringThe full file name.
File.SHA256StringThe SHA256 hash of the file.
File.Malicious.VendorStringThe vendor that reported the file as malicious.
MetaDefender.Aether.Analysis.finalVerdict.verdictStringThe final verdict.
MetaDefender.Aether.Analysis.allTagsUnknownAll tags.
MetaDefender.Aether.Analysis.overallStateStringOverall state of the scan.
MetaDefender.Aether.Analysis.taskReference.nameStringName of the main scan task.
MetaDefender.Aether.Analysis.taskReference.additionalInfoUnknownAdditional information about the main scan task.
MetaDefender.Aether.Analysis.taskReference.IDStringID of the main scan task.
MetaDefender.Aether.Analysis.taskReference.stateStringState of the main scan task.
MetaDefender.Aether.Analysis.taskReference.resourceReferenceUnknownResource reference of the main scan task.
MetaDefender.Aether.Analysis.taskReference.opcountNumberCounter.
MetaDefender.Aether.Analysis.taskReference.processTimeNumberprocessTime.
MetaDefender.Aether.Analysis.subtaskReferencesUnknownStatus of scan subtasks.
MetaDefender.Aether.Analysis.allSignalGroupsUnknownAll signal groups.
MetaDefender.Aether.Analysis.resourcesUnknownResources.
MetaDefender.Aether.Analysis.file.nameStringThe name of the file.
MetaDefender.Aether.Analysis.file.hashStringThe SHA256 of the file.
MetaDefender.Aether.Analysis.file.typeStringThe type of the submission.

Command example#

!metadefender-aether-scan-file entry_id=1234@abcd-efgh-ijkl-mnop-xyz

Context Example#

{
"DBotScore":
[
{
"Indicator": "1111111111111111111111111111111111111111111111111111111111111111",
"Score": 1,
"Type": "file",
"Vendor": "MetaDefender Aether"
}
],
"File":
[
{
"Name": "1234@abcd-efgh-ijkl-mnop-xyz",
"SHA256": "1111111111111111111111111111111111111111111111111111111111111111"
}
],
"MetaDefender":
{
"Aether":
{
"Analysis":
[
{
"finalVerdict":
{
"verdict": "MALICIOUS"
},
"allTags":
[
{
"source": "SIGNAL",
"sourceIdentifier": "1234",
"isRootTag": false,
"tag":
{
"name": "packed",
"synonyms": [],
"descriptions": [],
"verdict": {
"verdict": "SUSPICIOUS",
"threatLevel": 0.5,
"confidence": 1
}
}
}
],
"overallState": "success_partial",
"taskReference":
{
"name": "transform-file",
"additionalInfo": {
"submitName": "bad_file.exe",
"submitTime": 1679011634945,
"digests": {
"SHA-256": "1111111111111111111111111111111111111111111111111111111111111111"
}
},
"ID": "1234",
"state": "SUCCESS",
"resourceReference": {
"type": "TRANSFORM_FILE",
"name": "file",
"ID": "0101010101"
},
"opcount": 1,
"processTime": 7180
},
"subtaskReferences":
[
{
"name": "domain-resolve",
"additionalInfo": 72,
"ID": "12345678",
"state": "SUCCESS",
"resourceReference":
{
"type": "DOMAIN_RESOLVE",
"name": "domain-resolve",
"ID": "123456789"
},
"opcount": 20,
"processTime": 11309
}
],
"allSignalGroups":
[
{
"identifier": "Y002",
"description": "Matched a malicious YARA rule",
"averageSignalStrength": 1,
"peakSignalStrength": 1,
"finalSignalStrength": 1,
"verdict": {
"verdict": "MALICIOUS",
"threatLevel": 1,
"confidence": 1
},
"allTags": [],
"signals": [
{
"strength": 1,
"isStrictlyBasedOnInputData": true,
"signalReadable": "Matched YARA with strength \"0.75\"",
"additionalInfo": "PUP_InstallRex_AntiFWb",
"originPath": "file.yaraMatches",
"originType": "INPUT_FILE",
"originIdentifier": "111111111111111111111111111"
}
]
}
],
"resources":
{
"00f1e4d6-27fb-45e8-8a02-dc53818044ec":
{
"resourceReference":
{
"name": "osint"
},
"results":
[]
}
},
"file":
{
"name": "1234@abcd-efgh-ijkl-mnop-xyz",
"hash": "1111111111111111111111111111111111111111111111111111111111111111",
"type": "other"
}
}
]
}
}
}

Human Readable Output#

Scan Result (digest)#

FileHashFileNameFileTypeFinalVerdictSubtaskReferencesTags
11111111111111111111111111111111111111111111111111111111111111111234@abcd-efgh-ijkl-mnop-xyzpeMALICIOUSvisualization, osint, domain-resolvehtml, peexe

metadefender-aether-search-query#


Search for reports. Finds reports and uploaded files by various tokens.

Base Command#

metadefender-aether-search-query

Input#

Argument NameDescriptionRequired
queryThe query stringRequired
limitNumber of total results. Maximum 50Optional
pagePage number, starting from 1Optional
page_sizeThe page size. Can be 5, 10 or 20Optional

Context Output#

PathTypeDescription
MetaDefender.Aether.Analysis.idStringThe analysis id.
MetaDefender.Aether.Analysis.file.nameStringThe name of the file.
MetaDefender.Aether.Analysis.file.sha256StringThe SHA256 of the file.
MetaDefender.Aether.Analysis.verdictStringThe final verdict.
MetaDefender.Aether.Analysis.stateStringOverall state of the scan.
MetaDefender.Aether.Analysis.dateDateThe scan date.
MetaDefender.Aether.Analysis.file.mime_typeStringThe file MimeType.
MetaDefender.Aether.Analysis.file.short_typeStringThe type of the submission.
MetaDefender.Aether.Analysis.tagsUnknownAll tags.

Command example#

!metadefender-aether-search-query query="834d1dbfab8330ea5f1844f6e905ed0ac19d1033ee9a9f1122ad2051c56783dc"

Context Example#

{
"MetaDefender":
{
"Aether":
{
"Analysis":
[
{
"id": "b4f92c03-0fc2-4a40-9d34-8f2b05dd240c",
"file": {
"name": "bad_file.exe",
"mime_type": "application/x-msdownload",
"short_type": "peexe",
"sha256": "834d1dbfab8330ea5f1844f6e905ed0ac19d1033ee9a9f1122ad2051c56783dc"
},
"state": "success",
"verdict": "malicious",
"tags": [
{
"source": "MEDIA_TYPE",
"sourceIdentifier": "834d1dbfab8330ea5f1844f6e905ed0ac19d1033ee9a9f1122ad2051c56783dc",
"isRootTag": true,
"tag": {
"name": "peexe",
"synonyms": [],
"descriptions": [],
"verdict": {
"verdict": "INFORMATIONAL",
"threatLevel": 0.1,
"confidence": 1
}
}
}
],
"date": "03/20/2023, 14:28:09"
}
]
}
}
}

Human Readable Output#

Analysis Result#

IdSampleNameSHA256VerdictStateDate
8c38be8c-7cfd-4d64-be41-c98a795c9ce0bad_file.exe834d1dbfab8330ea5f1844f6e905ed0ac19d1033ee9a9f1122ad2051c56783dcMALICIOUSsuccess_partial03/14/2023, 15:07:07
e334d27f-e2b1-46c9-9936-7d3155eb3706bad_file.exe834d1dbfab8330ea5f1844f6e905ed0ac19d1033ee9a9f1122ad2051c56783dcUNKNOWNsuccess03/14/2020, 15:03:48