Qintel QWatch
Qintel Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
Qintel's QWatch system contains credentials obtained from dump sites, hacker collaboratives, and command and control infrastructures of eCrime- and APT-related malware. With this integration, users can fetch exposure alerts as incidents and discover exposed credentials associated with their organization. This integration was integrated and tested with version 1.1.6 of QWatch
#
Configure QintelQWatch on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for QintelQWatch.
Click Add instance to create and configure a new integration instance.
Parameter Required QWatch API URL (optional) False Qintel Credentials True Password True Trust any certificate (not secure) False Use system proxy settings False Fetch incidents False Fetch plaintext passwords False Limit number of records per fetch False First fetch time False Incidents Fetch Interval False Default Incident Severity True Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
qintel-qwatch-exposuresSearch QWatch for exposed credentials
#
Base Commandqintel-qwatch-exposures
#
InputArgument Name | Description | Required |
---|---|---|
Email to search. | Optional | |
domain | Domain to search. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Qintel.QWatch.Exposures | String | QWatch Exposure Records |
#
Command Example!qintel-qwatch-exposures email=test@example.local
#
Context Example#
Human Readable Outputtest@example.local#
Qintel QWatch exposures for:
Password Source Loaded First Seen Last Seen test@example.local SuperSecretPassword combo-BigComboList 2021-02-05 04:35:33 2020-03-25 09:38:40 2021-02-05 04:35:33 test@example.local SuperSecretPassword dump-example.local 2020-08-10 02:10:11 2020-03-25 09:38:40 2021-02-05 04:35:33 test@example.local SuperSecretPassword malware-evilbot_March_22_2020 2020-03-25 09:38:40 2020-03-25 09:38:40 2021-02-05 04:35:33