OrionMalware
This Integration is part of the OrionMalware Pack.#
Supported versions
Supported Cortex XSOAR versions: 8.0.0 and later.
This is the Orion Malware integration. Analyzes hash and files with static and dynamic analysis This integration was integrated and tested with version 5.3.0 of OrionMalware.
Use Cases#
- Detonate File with OrionMalware - static and dynamic analysis Search hash and retrieve indicators from OrionMalware
Configure OrionMalware in Cortex#
| Parameter | Description | Required |
|---|---|---|
| Server URL | True | |
| API Key | True | |
| Use system proxy settings | False | |
| Trust any certificate (not secure) | False | |
| Source Reliability | Reliability of the source providing intelligence data | False |
Commands#
You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
hash-scan#
Check hash value against Orion Malware database
Base Command#
hash-scan
Input#
| Argument Name | Description | Required |
|---|---|---|
| file_hash | hash field, supports md5, sha1, sha256. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Orion.File.antivirus.antivirus_name | string | antivirus_name analysis |
| Orion.File.antivirus.threat_name | string | threat detected by antivirus |
| Orion.File.end_analysis | date | end_analysis |
| Orion.File.first_submission | date | first_submission |
| Orion.File.identification.filename | string | filename of the file corresponding to the hash |
| Orion.File.identification.md5 | string | md5 hash of the file |
| Orion.File.identification.sha1 | string | sha1 hash of the file |
| Orion.File.identification.sha256 | string | sha256 hash of the file |
| Orion.File.identification.size | number | Byte size |
| Orion.File.identification.type | string | type of file |
| Orion.File.last_updated | date | last_updated |
| Orion.File.matched_mitre_attacks.description | string | mitre description |
| Orion.File.matched_mitre_attacks.id | string | mitre ttp |
| Orion.File.matched_mitre_attacks.kill_chain_phases | unknown | mitre tactics |
| Orion.File.matched_mitre_attacks.name | string | technique name |
| Orion.File.networks.address | string | network address detected |
| Orion.File.payloads | unknown | payloads |
| Orion.File.risk.dynamic.descriptions.files | unknown | dynmaic file analysis |
| Orion.File.risk.dynamic.descriptions.network | unknown | network dynamic analysis |
| Orion.File.risk.dynamic.descriptions.persistence | unknown | persistence dynamic analysis |
| Orion.File.risk.dynamic.descriptions.processes | unknown | processes dynamic analysis |
| Orion.File.risk.dynamic.descriptions.system | unknown | system dynamic analysis |
| Orion.File.risk.dynamic.scores | unknown | dynamic risk scoring |
| Orion.File.risk.level | string | dynamic risk |
| Orion.File.risk.scanner.descriptions.system | unknown | system static analysis |
| Orion.File.risk.scanner.descriptions.processes | unknown | processes static analysis |
| Orion.File.risk.scanner.descriptions.persistence | unknown | persistence static analysis |
| Orion.File.risk.scanner.descriptions.files | unknown | files static analysis |
| Orion.File.risk.scanner.descriptions.network | unknown | network static analysis |
| Orion.File.risk.scanner.scores | unknown | static risk scoring |
| Orion.File.rules | unknown | rules |
| Orion.File.start_analysis | date | start analysis date |
| File.MD5 | string | Bad MD5 hash |
| File.SHA1 | string | bad SHA1 has h |
| File.SHA256 | string | bad SHA256 has h |
| File.Orion.EngineDetections | string | Number of engines that flagged the file as malicious |
| File.Orion.EngineVendors | string | engines |
| File.Orion.EngineDetectionNames | string | threat name |
| IP.Address | string | IP Linked to hash |
| Orion.IP.Address | string | IP Linked to hash |
| File.Relationships.EntityA | string | Source of relationship |
| File.Relationships.EntityB | string | Destination of relationship |
| File.Relationships.EntityAType | string | Source type of relationship |
| File.Relationships.EntityBType | string | Destination type of relationship |
| File.Relationships.Relationship | string | Kind of relation |
| Orion.File.report_url | string | report url |
Command example#
!hash-scan file_hash="765DB004261F6CF2E5E42248D6831044"
Context Example#
Human Readable Output#
Metrics reported successfully.
file-scan#
Detonate file in Orion Malware
Base Command#
file-scan
Input#
| Argument Name | Description | Required |
|---|---|---|
| entryID | the file entry id to submit. | Required |
Context Output#
| Path | Type | Description |
|---|---|---|
| Orion.File.antivirus.antivirus_name | string | antivirus_name analysis |
| Orion.File.antivirus.threat_name | string | threat detected by antivirus |
| Orion.File.end_analysis | date | end_analysis |
| Orion.File.first_submission | date | first_submission |
| Orion.File.identification.filename | string | filename of the file corresponding to the hash |
| Orion.File.identification.md5 | string | md5 hash of the file |
| Orion.File.identification.sha1 | string | sha1 hash of the file |
| Orion.File.identification.sha256 | string | sha256 hash of the file |
| Orion.File.identification.size | number | Byte size |
| Orion.File.identification.type | string | type of file |
| Orion.File.last_updated | date | last_updated |
| Orion.File.matched_mitre_attacks.description | string | mitre description |
| Orion.File.matched_mitre_attacks.id | string | mitre ttp |
| Orion.File.matched_mitre_attacks.kill_chain_phases | unknown | mitre tactics |
| Orion.File.matched_mitre_attacks.name | string | technique name |
| Orion.File.networks.address | string | network address detected |
| Orion.File.payloads | unknown | payloads |
| Orion.File.risk.dynamic.descriptions.files | unknown | dynmaic file analysis |
| Orion.File.risk.dynamic.descriptions.network | unknown | network dynamic analysis |
| Orion.File.risk.dynamic.descriptions.persistence | unknown | persistence dynamic analysis |
| Orion.File.risk.dynamic.descriptions.processes | unknown | processes dynamic analysis |
| Orion.File.risk.dynamic.descriptions.system | unknown | system dynamic analysis |
| Orion.File.risk.dynamic.scores | unknown | dynamic risk scoring |
| Orion.File.risk.level | string | dynamic risk |
| Orion.File.risk.scanner.descriptions.system | unknown | system static analysis |
| Orion.File.risk.scanner.descriptions.processes | unknown | processes static analysis |
| Orion.File.risk.scanner.descriptions.persistence | unknown | persistence static analysis |
| Orion.File.risk.scanner.descriptions.files | unknown | files static analysis |
| Orion.File.risk.scanner.descriptions.network | unknown | network static analysis |
| Orion.File.risk.scanner.scores | unknown | static risk scoring |
| Orion.File.rules | unknown | rules |
| Orion.File.start_analysis | date | start analysis date |
| File.MD5 | string | Bad MD5 hash |
| File.SHA1 | string | bad SHA1 has h |
| File.SHA256 | string | bad SHA256 has h |
| File.Orion.EngineDetections | string | Number of engines that flagged the file as malicious |
| File.Orion.EngineVendors | string | engines |
| File.Orion.EngineDetectionNames | string | threat name |
| IP.Address | string | IP Linked to hash |
| Orion.IP.Address | string | IP Linked to hash |
| File.Relationships.EntityA | string | Source of relationship |
| File.Relationships.EntityB | string | Destination of relationship |
| File.Relationships.EntityAType | string | Source type of relationship |
| File.Relationships.EntityBType | string | Destination type of relationship |
| File.Relationships.Relationship | string | Kind of relation |
| Orion.File.report_url | string | report url |
Command example#
!file-scan entryID="n6yXmHmQ8Pn2MAzpgocuRN@4103b4f7-d3a7-402d-8cb0-0d76f10e3ff4"
Context Example#
Human Readable Output#
Metrics reported successfully.