VirusTotal - Premium (API v3)
VirusTotal Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 5.5.0 and later.
Use the premium API capabilities of VirusTotal to analyze retro hunts, read live hunt notifications, and download files from VirusTotal. The differences between VirusTotal's Public API and Premium API can be found in the VirusTotal v3 API documentation.
This integration was integrated and tested with VirusTotal - Premium (API v3)
#
Use Cases- Fetch live hunt notifications as incidents.
- Use retro hunt to analyze files with custom YARA rule.
- Download suspicious files from VirusTotal for further analysis.
- Group several files from VirusTotal into a password-protected ZIP file.
- Get a PCAP file generated from VirusTotal's sandbox for further analysis.
#
Configure VirusTotal - Premium (API v3) on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for VirusTotal - Premium (API v3).
Click Add instance to create and configure a new integration instance.
Parameter Required API Key API Key Fetch incidents False Incident type False Maximum number of incidents per fetch False First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days) or a date or epoch timestamp. False Tag: The ruleset's name or the identifier for the YARA rule matching the file to fetch its notifications. Leave blank to fetch all. False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
Acquire API KeyYour API key can be found in your VirusTotal account user menu. Your API key carries all your privileges, so keep it secure and don't share it with anyone.
#
Fetch IncidentsFetch incidents will fetch livehunt notifications of the given ruleset or identifier. As an example, you can fetch incidents that were created by the CyberGate ruleset by using the "cybergate" tag. The scope of the rule-set should be narrowed to catch only indicators that you want to analyze by a playbook. Defining a broad rule-set will cause the integration to create multiple redundant incidents.
#
VirusTotal - Private API compatibilityThe following 2 commands appear in both the VirusTotal - Private API and VirusTotal Premium - (API v3) integrations.
- vt-private-search-file
- vt-private-download-file
- It is recommended to use these commands in the VirusTotal Premium - (API v3) integration.
- For all other commands, you should use the VirusTotal - Private API integration.
#
Report commands alternatives / EnrichmentTo enrich indicators, you can use the VirusTotal (API v3) integration reputation commands.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
vt-private-download-fileDownloads file from VirusTotal
#
Base Commandvt-private-download-file
#
InputArgument Name | Description | Required |
---|---|---|
hash | SHA-256, SHA-1 or MD5 identifying the file. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
File | Unknown | The file details command results. |
File.Name | String | The full file name (including the file extension). |
File.EntryID | String | The ID for locating the file in the War Room. |
File.Size | Number | The size of the file in bytes. |
File.MD5 | String | The MD5 hash of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
File.SHA512 | String | The SHA512 hash of the file. |
File.Extension | String | The file extension. For example: "xls". |
File.Type | String | The file type, as determined by libmagic (same as displayed in file entries). |
#
Command Example!vt-private-download-file hash=0f555ed56bb78c5511f4e488cd37f24d1425fcfa
#
Context Example#
vt-private-zip-createCreates a password-protected ZIP file containing files from VirusTotal.
#
Base Commandvt-private-zip-create
#
InputArgument Name | Description | Required |
---|---|---|
file | A commma separated list of hashes (SHA-256, SHA-1, or MD5) for the files included in the ZIP. | Required |
password | A password to protect the zip. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.Zip.id | String | ID of the zip |
VirusTotal.Zip.type | String | Type of the ID (zip_file) |
VirusTotal.Zip.links.self | String | Self link to file |
VirusTotal.Zip.attributes.files_error | Number | The number of files resulted in error |
VirusTotal.Zip.attributes.files_ok | Number | The number of files resulted in success zipped. |
VirusTotal.Zip.attributes.progress | Number | Progress of the zipping command in percentage. |
VirusTotal.Zip.attributes.status | String | The status of the zip process. "finished" is the state when finished. |
#
Command Example!vt-private-zip-create file=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855,275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f password=apassword
#
Context Example#
Human Readable Output#
The request to create the ZIP was submitted successfully!
id status 6268237216776192 starting
#
vt-private-zip-getRetrieve information about a ZIP file.
#
Base Commandvt-private-zip-get
#
InputArgument Name | Description | Required |
---|---|---|
zip_id | A zip ID. Can be retrieved from the output of vt-private-zip-create. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.Zip.id | String | ID of the zip |
VirusTotal.Zip.type | String | Type of the ID (zip_file) |
VirusTotal.Zip.links.self | String | Self link to file |
VirusTotal.Zip.attributes.files_error | Number | The number of files resulted in error |
VirusTotal.Zip.attributes.files_ok | Number | The number of files resulted in success zipped. |
VirusTotal.Zip.attributes.progress | Number | Progress of the zipping command in percentage. |
VirusTotal.Zip.attributes.status | String | The status of the zip process. "finished" is the state when finished. |
#
Command Example!vt-private-zip-get zip_id=5548746369433600
#
Context Example#
Human Readable OutputZIP creation status is "finished"
#
vt-private-zip-downloadDownload a ZIP file.
#
Base Commandvt-private-zip-download
#
InputArgument Name | Description | Required |
---|---|---|
zip_id | A zip ID. Can be retrieved from the output of vt-private-zip-create. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
File | Unknown | The file details command results. |
File.Name | String | The full file name (including the file extension). |
File.EntryID | String | The ID for locating the file in the War Room. |
File.Size | Number | The size of the file in bytes. |
File.MD5 | String | The MD5 hash of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
File.SHA512 | String | The SHA512 hash of the file. |
File.Extension | String | The file extension. For example: "xls". |
File.Type | String | The file type, as determined by libmagic (same as displayed in file entries). |
#
Command Example!vt-private-zip-download zip_id=5548746369433600
#
vt-private-file-sandbox-pcapExtracted PCAP from a sandbox analysis.
#
Base Commandvt-private-file-sandbox-pcap
#
InputArgument Name | Description | Required |
---|---|---|
report_id | Sandbox report ID. Can be aquired from vt-file-sandbox-report. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
File | Unknown | The file details command results. |
File.Name | String | The full file name (including the file extension). |
File.EntryID | String | The ID for locating the file in the War Room. |
File.Size | Number | The size of the file in bytes. |
File.MD5 | String | The MD5 hash of the file. |
File.SHA1 | String | The SHA1 hash of the file. |
File.SHA256 | String | The SHA256 hash of the file. |
File.SHA512 | String | The SHA512 hash of the file. |
File.Extension | String | The file extension. For example: "xls". |
File.Type | String | The file type, as determined by libmagic (same as displayed in file entries). |
#
Command Example!vt-private-file-sandbox-pcap report_id="699ec052ecc898bdbdafea0027c4ab44c3d01ae011c17745dd2b7fbddaa077f3_VirusTotal Jujubox"
#
vt-private-intelligence-searchSearch for files.
#
Base Commandvt-private-intelligence-search
#
InputArgument Name | Description | Required |
---|---|---|
query | Search query. | Required |
limit | Maximum number of results. Default is 10. | Optional |
order | The order value can be sorted depends on the query type. See documentation. https://docs.virustotal.com/reference/intelligence-search. | Optional |
cursor | Continuation cursor. | Optional |
descriptors_only | Whether to return full object information or just object descriptors. Possible values are: true, false. Default is false. | Optional |
extended_data | Whether to return full data information. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.IntelligenceSearch.attributes.last_analysis_stats.harmless | Number | number of reports saying that is harmless. |
VirusTotal.IntelligenceSearch.attributes.last_analysis_stats.malicious | Number | number of reports saying that is malicious |
VirusTotal.IntelligenceSearch.attributes.last_analysis_stats.suspicious | Number | number of reports saying that is suspicious. |
VirusTotal.IntelligenceSearch.attributes.last_analysis_stats.undetected | Number | number of reports saying that is undetected. |
VirusTotal.IntelligenceSearch.attributes.last_analysis_stats.timeout | Number | number of timeouts when analysing this URL/file. |
VirusTotal.IntelligenceSearch.attributes.reputation | Number | file's score calculated from all votes posted by the VirusTotal community. |
VirusTotal.IntelligenceSearch.attributes.last_modification_date | Number | date when the object itself was last modified. UTC timestamp. |
VirusTotal.IntelligenceSearch.attributes.total_votes.harmless | Number | number of positive votes. |
VirusTotal.IntelligenceSearch.attributes.total_votes.malicious | Number | number of negative votes. |
VirusTotal.IntelligenceSearch.type | String | The type of the indicator (ip_address, domain, url, file) |
VirusTotal.IntelligenceSearch.id | String | ID of the indicator |
VirusTotal.IntelligenceSearch.links.self | String | Link to the response |
#
Command Example!vt-private-intelligence-search query=699ec052ecc898bdbdafea0027c4ab44c3d01ae011c17745dd2b7fbddaa077f3
#
Context Example#
Human Readable Output#
Results
attributes id type_description: Win32 EXE 699ec052ecc898bdbdafea0027c4ab44c3d01ae011c17745dd2b7fbddaa077f3
#
vt-private-search-fileSearch for files.
#
Base Commandvt-private-search-file
#
InputArgument Name | Description | Required |
---|---|---|
query | File search query. For example, query="type:peexe size:90kb+ positives:5+ behaviour:'taskkill'". | Required |
fullResponse | Return all of the results, note that it can be thousands of results. Prefer not to use in playbooks. The default value is "false". Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.SearchFile.SearchResult | string | The hashes of files that fit the query |
VirusTotal.SearchFile.Query | string | Original search query |
#
Command Example!vt-private-search-file query="type:peexe size:90kb+ positives:5+ behaviour:'taskkill'"
#
Human Readable Output#
Found hashes for query: "type:peexe size:90kb+ positives:5+ behaviour:'taskkill'"
Found hashes 83bafb3147b885c78fbda8a4f6a7f9f58c82b86681da38f48232e0205c57774b
#
vt-private-livehunt-rules-get-by-idRetrieve VT Hunting livehunt rulesets.
#
Base Commandvt-private-livehunt-rules-get-by-id
#
InputArgument Name | Description | Required |
---|---|---|
id | Ruleset identifier. Can be retreived from the vt-private-livehunt-rules-list command. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.LiveHuntRule.attributes.name | String | The rule's name |
VirusTotal.LiveHuntRule.attributes.modification_date | Number | last modification date as UTC timestamp. |
VirusTotal.LiveHuntRule.attributes.rules | String | rule file contents |
VirusTotal.LiveHuntRule.attributes.enabled | Boolean | whether it's enabled or not |
VirusTotal.LiveHuntRule.attributes.creation_date | Number | Creation date as UTC timestamp. |
VirusTotal.LiveHuntRule.attributes.rule_names | String | contains the names of all rules in the ruleset. |
VirusTotal.LiveHuntRule.attributes.limit | Number | max number of notifications that will be generated by the ruleset in a 24h period. If a match is found, number of generated hunting notifications in the last 24h is looked up and if it's greater than this limit, that match is ignored. |
VirusTotal.LiveHuntRule.attributes.number_of_rules | Number | Number of rules presented in the set |
VirusTotal.LiveHuntRule.type | String | The type of the entry (hunting_ruleset) |
VirusTotal.LiveHuntRule.id | Date | ID of the ruleset |
VirusTotal.LiveHuntRule.links.self | String | Link to the ruleset |
#
Command Example!vt-private-livehunt-rules-get-by-id id=6360290934161408
#
Human Readable Output#
Livehunt Ruleset 5950298890469376
name enabled rule_names A rule name false foobar
#
vt-private-livehunt-rules-listRetrieve VT Hunting livehunt rulesets.
#
Base Commandvt-private-livehunt-rules-list
#
InputArgument Name | Description | Required |
---|---|---|
filter | Return the rulesets matching the given criteria only. | Optional |
limit | Maximum number of results. Default is 10. | Optional |
order | Sort order. Possible values are: name-, creation_date-, modification_date-, name+, creation_date+, modification_date+. | Optional |
cursor | Continuation cursor. | Optional |
enabled | Should list only enabled or disabled rules. Possible values are: true, false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.LiveHuntRule.attributes.name | String | The rule's name |
VirusTotal.LiveHuntRule.attributes.modification_date | Number | last modification date as UTC timestamp. |
VirusTotal.LiveHuntRule.attributes.rules | String | rule file contents |
VirusTotal.LiveHuntRule.attributes.enabled | Boolean | whether it's enabled or not |
VirusTotal.LiveHuntRule.attributes.creation_date | Number | creation date as UTC timestamp. |
VirusTotal.LiveHuntRule.attributes.rule_names | String | contains the names of all rules in the ruleset. |
VirusTotal.LiveHuntRule.attributes.limit | Number | max number of notifications that will be generated by the ruleset in a 24h period. If a match is found, number of generated hunting notifications in the last 24h is looked up and if it's greater than this limit, that match is ignored. |
VirusTotal.LiveHuntRule.attributes.number_of_rules | Number | Number of rules presented in the set |
VirusTotal.LiveHuntRule.type | String | The type of the entry (hunting_ruleset) |
VirusTotal.LiveHuntRule.id | Date | ID of the ruleset |
VirusTotal.LiveHuntRule.links.self | String | Link to the ruleset |
#
Command Example!vt-private-livehunt-rules-list limit=1 enabled=false order="modification_date-"
#
Context Example#
Human Readable Output#
VT Hunting Livehunt rulesets
id name enabled rule_names 5551558908215296 a new rule false foobar
#
vt-private-livehunt-rules-createCreate a new VT Hunting Livehunt ruleset.
#
Base Commandvt-private-livehunt-rules-create
#
InputArgument Name | Description | Required |
---|---|---|
name | Name of the rule. | Required |
yara_rule | The rule itself. | Required |
enabled | Whatever to enable the rule. Possible values are: true, false. Default is false. | Optional |
notification_emails | A comma-separated list of emails to notify. | Optional |
limit | max number of notifications that will be generated by the ruleset in a 24h period. If a match is found, number of generated hunting notifications in the last 24h is looked up and if it's greater than this limit, that match is ignored. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.LiveHuntRule.attributes.name | String | The rule's name |
VirusTotal.LiveHuntRule.attributes.modification_date | Number | last modification date as UTC timestamp. |
VirusTotal.LiveHuntRule.attributes.rules | String | rule file contents |
VirusTotal.LiveHuntRule.attributes.enabled | Boolean | whether it's enabled or not |
VirusTotal.LiveHuntRule.attributes.creation_date | Number | creation date as UTC timestamp. |
VirusTotal.LiveHuntRule.attributes.rule_names | String | contains the names of all rules in the ruleset. |
VirusTotal.LiveHuntRule.attributes.limit | Number | max number of notifications that will be generated by the ruleset in a 24h period. If a match is found, number of generated hunting notifications in the last 24h is looked up and if it's greater than this limit, that match is ignored. |
VirusTotal.LiveHuntRule.attributes.number_of_rules | Number | Number of rules presented in the set |
VirusTotal.LiveHuntRule.type | String | The type of the entry (hunting_ruleset) |
VirusTotal.LiveHuntRule.id | Date | ID of the ruleset |
VirusTotal.LiveHuntRule.links.self | String | Link to the ruleset |
#
Command Example``!vt-private-livehunt-rules-create limit=100 name="a new rule" yara_rule=
rule foobar { strings: $ = "foobar" condition: all of them }````
#
Context Example#
Human Readable Output#
New rule "a new rule" was created successfully
id name number_of_rules 5551558908215296 a new rule 1
#
vt-private-livehunt-rules-updateUpdate a VT Hunting Livehunt ruleset.
#
Base Commandvt-private-livehunt-rules-update
#
InputArgument Name | Description | Required |
---|---|---|
id | Rule identifier. Can be retrieved from the vt-private-livehunt-rules-list command. | Required |
yara_rule | The rule itself. | Optional |
enabled | Whatever to enable the rule. Possible values are: true, false. Default is false. | Optional |
notification_emails | A comma-separated list of emails to notify. | Optional |
limit | max number of notifications that will be generated by the ruleset in a 24h period. If a match is found, number of generated hunting notifications in the last 24h is looked up and if it's greater than this limit, that match is ignored. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.LiveHuntRule.attributes.name | String | The rule's name |
VirusTotal.LiveHuntRule.attributes.modification_date | Number | last modification date as UTC timestamp. |
VirusTotal.LiveHuntRule.attributes.rules | String | rule file contents |
VirusTotal.LiveHuntRule.attributes.enabled | Boolean | whether it's enabled or not |
VirusTotal.LiveHuntRule.attributes.creation_date | Number | creation date as UTC timestamp. |
VirusTotal.LiveHuntRule.attributes.rule_names | String | contains the names of all rules in the ruleset. |
VirusTotal.LiveHuntRule.attributes.limit | Number | max number of notifications that will be generated by the ruleset in a 24h period. If a match is found, number of generated hunting notifications in the last 24h is looked up and if it's greater than this limit, that match is ignored. |
VirusTotal.LiveHuntRule.attributes.number_of_rules | Number | Number of rules presented in the set |
VirusTotal.LiveHuntRule.type | String | The type of the entry (hunting_ruleset) |
VirusTotal.LiveHuntRule.id | Date | ID of the ruleset |
VirusTotal.LiveHuntRule.links.self | String | Link to the ruleset |
#
Command Example!vt-private-livehunt-rules-update id=6360290934161408 enabled=false
#
Context Example#
Human Readable Output#
Rule "6360290934161408" has been updated!
id name number_of_rules 6360290934161408 a new rule 1
#
vt-private-livehunt-rules-deleteDelete a VT Hunting Livehunt ruleset.
#
Base Commandvt-private-livehunt-rules-delete
#
InputArgument Name | Description | Required |
---|---|---|
id | Ruleset identifier. Can be retreived from the vt-private-livehunt-rules-list. | Required |
#
Context OutputThere is no context output for this command.
#
Command Example!vt-private-livehunt-rules-delete id=5030439520337920
#
Human Readable OutputRule "5030439520337920" was deleted successfully
#
vt-private-livehunt-notifications-listRetrieve VT Hunting Livehunt notifications.
#
Base Commandvt-private-livehunt-notifications-list
#
InputArgument Name | Description | Required |
---|---|---|
limit | Maximum number of notifications to retrieve. Maximum can be up to 40. Default is 10. | Optional |
from_time | Fetch notification from given time. Can be epoch time, a date or time range (3 days, 1 year). | Optional |
to_time | Fetch notification from given time. Can be epoch time or a date. | Optional |
cursor | Continuation cursor. | Optional |
tag | Filter notifications by tag. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.LiveHuntNotification.meta.count | Number | Notification count |
VirusTotal.LiveHuntNotification.meta.cursor | String | The cursor of the list |
VirusTotal.LiveHuntNotification.data.attributes.tags | String | notification tags. |
VirusTotal.LiveHuntNotification.data.attributes.source_country | String | Source country of the notification |
VirusTotal.LiveHuntNotification.data.attributes.source_key | String | Source key of the notificaton |
VirusTotal.LiveHuntNotification.data.attributes.snippet | String | The snippet ID (if exists) |
VirusTotal.LiveHuntNotification.data.attributes.rule_name | String | contains the names of all rules in the ruleset. |
VirusTotal.LiveHuntNotification.data.attributes.date | Number | The date of the notification in epoch |
VirusTotal.LiveHuntNotification.data.attributes.match_in_subfile | Boolean | whether the match was in a subfile or not. |
VirusTotal.LiveHuntNotification.data.type | String | Type of the notification (hunting_notification) |
VirusTotal.LiveHuntNotification.data.id | String | The ID of the notification |
VirusTotal.LiveHuntNotification.data.links.self | String | The link to the notificaton |
VirusTotal.LiveHuntNotification.links.self | String | The link to the current page |
VirusTotal.LiveHuntNotification.links.next | String | The link to the next page |
#
Command Example!vt-private-livehunt-notifications-list filter=malicious_executables limit=1
#
Context Example#
Human Readable Output#
Notifications found:
id 5883562783178752-e3df8c66cef961b7ddcb0d21a4d1eabc-843bdd8f7843fd1f9ce488666dd6cf88e79c6b098e9c9aada96af1d802aab7e2-1617025081
#
vt-private-livehunt-notifications-files-listRetrieve file objects for VT Hunting Livehunt notifications.
#
Base Commandvt-private-livehunt-notifications-files-list
#
InputArgument Name | Description | Required |
---|---|---|
filter | String to search within the hunting notification tags. | Optional |
cursor | Continuation cursor. | Optional |
limit | Maximum number of notifications to retrieve. Default is 10. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.LiveHuntFiles.meta.count | Number | Total file's count. |
VirusTotal.LiveHuntFiles.meta.cursor | String | Cursor of the call |
VirusTotal.LiveHuntFiles.data.attributes.type_description | String | describes the file type. |
VirusTotal.LiveHuntFiles.data.attributes.tlsh | String | Trend Micro's TLSH hash |
VirusTotal.LiveHuntFiles.data.attributes.vhash | String | in-house similarity clustering algorithm value, based on a simple structural feature hash allows you to find similar files. |
VirusTotal.LiveHuntFiles.data.attributes.exiftool | String | exiftool is a program for extracting Exif metadata from different file formats. Metadata shown may vary depending on the file type, and given the nature of Exif metadata, some fields may appear or not. |
VirusTotal.LiveHuntFiles.data.attributes.trid.file_type | String | TrID is a utility designed to identify file types from their binary signatures. |
VirusTotal.LiveHuntFiles.data.attributes.trid.probability | Number | probability of file format identification (given as percentage). |
VirusTotal.LiveHuntFiles.data.attributes.creation_date | Number | extracted when possible from the file's metadata. Indicates when it was built or compiled. It can also be faked by malware creators. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.reputation | Number | file's score calculated from all votes posted by the VirusTotal community. |
VirusTotal.LiveHuntFiles.data.attributes.names | String | all file names associated with the file. |
VirusTotal.LiveHuntFiles.data.attributes.last_modification_date | Number | date when the object itself was last modified. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.type_tag | String | tag representing the file type. Can be used in vt-private-intelligence-search |
VirusTotal.LiveHuntFiles.data.attributes.times_submitted | Number | number of times the file has been posted to VirusTotal. |
VirusTotal.LiveHuntFiles.data.attributes.total_votes.harmless | Number | number of positive votes. |
VirusTotal.LiveHuntFiles.data.attributes.total_votes.malicious | Number | number of negative votes. |
VirusTotal.LiveHuntFiles.data.attributes.size | Number | file size in bytes. |
VirusTotal.LiveHuntFiles.data.attributes.type_extension | String | specifies file extension. |
VirusTotal.LiveHuntFiles.data.attributes.last_submission_date | Number | most recent date the file was posted to VirusTotal. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.downloadable | Boolean | true if the file can be downloaded, false otherwise. (use vt-private-file-download to download the file) |
VirusTotal.LiveHuntFiles.data.attributes.sha256 | String | SHA-256 of the file. |
VirusTotal.LiveHuntFiles.data.attributes.tags | String | The file's tags. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_date | Number | most recent scan date. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.unique_sources | Number | indicates from how many different sources the file has been posted from. |
VirusTotal.LiveHuntFiles.data.attributes.first_submission_date | Number | date when the file was first seen in VirusTotal. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.ssdeep | String | SSDeep of the file. |
VirusTotal.LiveHuntFiles.data.attributes.md5 | String | MD5 of the file. |
VirusTotal.LiveHuntFiles.data.attributes.sha1 | String | SHA-1 if the file |
VirusTotal.LiveHuntFiles.data.attributes.magic | String | magic identifier of this app in hex format. |
VirusTotal.LiveHuntFiles.data.attributes.main_icon.raw_md5 | String | MD5 of the file's icon. |
VirusTotal.LiveHuntFiles.data.attributes.main_icon.dhash | Date | The dhash of the file's icon |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.harmless | Number | number of reports saying that is harmless. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.type-unsupported | Number | number of AV engines that don't support that type of file. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.suspicious | Number | number of reports saying that is suspicious. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.confirmed-timeout | Number | number of AV engines that reach a timeout when analysing that file. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.timeout | Number | number of timeouts when analysing this URL/file. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.failure | Number | number of AV engines that fail when analysing that file. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.malicious | Number | number of reports saying that is malicious |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.undetected | Number | number of reports saying that is undetected. |
VirusTotal.LiveHuntFiles.data.attributes.meaningful_name | String | the most interesting name out of all file's names. |
VirusTotal.LiveHuntFiles.data.type | String | Type of the entry (file) |
VirusTotal.LiveHuntFiles.data.id | String | file ID |
VirusTotal.LiveHuntFiles.data.links.self | String | link to the file |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_id | String | The notification ID the file is connected to |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_source_key | String | The notification's source key |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_tags | String | notification tags. |
VirusTotal.LiveHuntFiles.data.context_attributes.ruleset_name | String | matched rule's ruleset name. |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_source_country | String | The notification's source country of the notification |
VirusTotal.LiveHuntFiles.data.context_attributes.rule_name | String | contains the names of all rules in the ruleset. |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_snippet | String | The notification snippet ID |
VirusTotal.LiveHuntFiles.data.context_attributes.ruleset_id | Date | VirusTotal's ruleset ID. |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_date | Number | The notification date in epch. |
VirusTotal.LiveHuntFiles.data.context_attributes.match_in_subfile | Boolean | whether the match was in a subfile or not. |
VirusTotal.LiveHuntFiles.links.self | String | Link to the current apge |
VirusTotal.LiveHuntFiles.links.next | String | Link to the next page |
#
Command Example!vt-private-livehunt-notifications-files-list limit=1
#
Context Example#
Human Readable Output#
Notifications file listed:
id meaningful_name last_analysis_stats 843bdd8f7843fd1f9ce488666dd6cf88e79c6b098e9c9aada96af1d802aab7e2 Warface Repair Assistent.exe harmless: 0
type-unsupported: 5
suspicious: 0
confirmed-timeout: 0
timeout: 0
failure: 0
malicious: 64
undetected: 6
#
vt-private-livehunt-notifications-files-get-by-hashRetrieve file objects for VT Hunting Livehunt notifications.
#
Base Commandvt-private-livehunt-notifications-files-get-by-hash
#
InputArgument Name | Description | Required |
---|---|---|
hash | Hashes to search within VirusTotal. Will search only hashes and will ignore any other value. | Required |
cursor | Continuation cursor. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.LiveHuntFiles.meta.count | Number | Total file's count. |
VirusTotal.LiveHuntFiles.meta.cursor | String | Cursor of the call |
VirusTotal.LiveHuntFiles.data.attributes.type_description | String | describes the file type. |
VirusTotal.LiveHuntFiles.data.attributes.tlsh | String | Trend Micro's TLSH hash |
VirusTotal.LiveHuntFiles.data.attributes.vhash | String | in-house similarity clustering algorithm value, based on a simple structural feature hash allows you to find similar files. |
VirusTotal.LiveHuntFiles.data.attributes.exiftool | String | exiftool is a program for extracting Exif metadata from different file formats. Metadata shown may vary depending on the file type, and given the nature of Exif metadata, some fields may appear or not. |
VirusTotal.LiveHuntFiles.data.attributes.trid.file_type | String | TrID is a utility designed to identify file types from their binary signatures. |
VirusTotal.LiveHuntFiles.data.attributes.trid.probability | Number | probability of file format identification (given as percentage). |
VirusTotal.LiveHuntFiles.data.attributes.creation_date | Number | extracted when possible from the file's metadata. Indicates when it was built or compiled. It can also be faked by malware creators. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.reputation | Number | file's score calculated from all votes posted by the VirusTotal community. |
VirusTotal.LiveHuntFiles.data.attributes.names | String | all file names associated with the file. |
VirusTotal.LiveHuntFiles.data.attributes.last_modification_date | Number | date when the object itself was last modified. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.type_tag | String | tag representing the file type. Can be used in vt-private-intelligence-search |
VirusTotal.LiveHuntFiles.data.attributes.times_submitted | Number | number of times the file has been posted to VirusTotal. |
VirusTotal.LiveHuntFiles.data.attributes.total_votes.harmless | Number | number of positive votes. |
VirusTotal.LiveHuntFiles.data.attributes.total_votes.malicious | Number | number of negative votes. |
VirusTotal.LiveHuntFiles.data.attributes.size | Number | file size in bytes. |
VirusTotal.LiveHuntFiles.data.attributes.type_extension | String | specifies file extension. |
VirusTotal.LiveHuntFiles.data.attributes.last_submission_date | Number | most recent date the file was posted to VirusTotal. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.downloadable | Boolean | true if the file can be downloaded, false otherwise. (use vt-private-file-download to download the file) |
VirusTotal.LiveHuntFiles.data.attributes.sha256 | String | SHA-256 of the file. |
VirusTotal.LiveHuntFiles.data.attributes.tags | String | The file's tags. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_date | Number | most recent scan date. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.unique_sources | Number | indicates from how many different sources the file has been posted from. |
VirusTotal.LiveHuntFiles.data.attributes.first_submission_date | Number | date when the file was first seen in VirusTotal. UTC timestamp. |
VirusTotal.LiveHuntFiles.data.attributes.ssdeep | String | SSDeep of the file. |
VirusTotal.LiveHuntFiles.data.attributes.md5 | String | MD5 of the file. |
VirusTotal.LiveHuntFiles.data.attributes.sha1 | String | SHA-1 if the file |
VirusTotal.LiveHuntFiles.data.attributes.magic | String | magic identifier of this app in hex format. |
VirusTotal.LiveHuntFiles.data.attributes.main_icon.raw_md5 | String | MD5 of the file's icon. |
VirusTotal.LiveHuntFiles.data.attributes.main_icon.dhash | Date | The dhash of the file's icon |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.harmless | Number | number of reports saying that is harmless. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.type-unsupported | Number | number of AV engines that don't support that type of file. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.suspicious | Number | number of reports saying that is suspicious. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.confirmed-timeout | Number | number of AV engines that reach a timeout when analysing that file. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.timeout | Number | number of timeouts when analysing this URL/file. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.failure | Number | number of AV engines that fail when analysing that file. |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.malicious | Number | number of reports saying that is malicious |
VirusTotal.LiveHuntFiles.data.attributes.last_analysis_stats.undetected | Number | number of reports saying that is undetected. |
VirusTotal.LiveHuntFiles.data.attributes.meaningful_name | String | the most interesting name out of all file's names. |
VirusTotal.LiveHuntFiles.data.type | String | Type of the entry (file) |
VirusTotal.LiveHuntFiles.data.id | String | file ID |
VirusTotal.LiveHuntFiles.data.links.self | String | link to the file |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_id | String | The notification ID the file is connected to |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_source_key | String | The notification's source key |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_tags | String | notification tags. |
VirusTotal.LiveHuntFiles.data.context_attributes.ruleset_name | String | matched rule's ruleset name. |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_source_country | String | The notification's source country of the notification |
VirusTotal.LiveHuntFiles.data.context_attributes.rule_name | String | contains the names of all rules in the ruleset. |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_snippet | String | The notification snippet ID |
VirusTotal.LiveHuntFiles.data.context_attributes.ruleset_id | Date | VirusTotal's ruleset ID. |
VirusTotal.LiveHuntFiles.data.context_attributes.notification_date | Number | The notification date in epch. |
VirusTotal.LiveHuntFiles.data.context_attributes.match_in_subfile | Boolean | whether the match was in a subfile or not. |
VirusTotal.LiveHuntFiles.links.self | String | Link to the current apge |
VirusTotal.LiveHuntFiles.links.next | String | Link to the next page |
#
Command Example!vt-private-livehunt-notifications-files-get-by-hash hash=389647cfa6f2ffd56601f6f18f69e6874d2068486d1c72d19fc5f2a2571eda79
#
Human Readable Output#
Notifications file listed:
id meaningful_name last_analysis_stats 389647cfa6f2ffd56601f6f18f69e6874d2068486d1c72d19fc5f2a2571eda79 /tmp/eml_attach_for_scan/c1726acd63066eeabfb9af65d1e7c3ba.file harmless: 0
type-unsupported: 12
suspicious: 0
confirmed-timeout: 0
timeout: 1
failure: 1
malicious: 0
undetected: 59
#
vt-private-livehunt-rule-list-filesGet a VT Hunting Livehunt ruleset by hunting notification files relationship.
#
Base Commandvt-private-livehunt-rule-list-files
#
InputArgument Name | Description | Required |
---|---|---|
id | Rule identifier. Can be retrieved from the vt-private-livehunt-rules-list command. | Required |
cursor | Continuation cursor. | Optional |
limit | Maximum number of notifications to retrieve. Default is 10. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.LiveHuntFiles.id | String | ID of the file |
VirusTotal.LiveHuntFiles.type | String | Type of the entry (file) |
#
Command Example!vt-private-livehunt-rule-list-files id=6393327418376192
#
Human Readable Output#
Files found by rule 6393327418376192
context_attributes id type notification_id: 6393327418376192-9d90aa797c1c16ea7afac7368c53cc0b-389647cfa6f2ffd56601f6f18f69e6874d2068486d1c72d19fc5f2a2571eda79-1617876439
notification_source_key: 9d712fef
notification_tags: new_file_from_china,
389647cfa6f2ffd56601f6f18f69e6874d2068486d1c72d19fc5f2a2571eda79,
chinese_files
ruleset_name: Chinese Files
notification_source_country: CN
rule_name: new_file_from_china
notification_snippet:
ruleset_id: 6393327418376192
rule_tags:
notification_date: 1617880045
match_in_subfile: false389647cfa6f2ffd56601f6f18f69e6874d2068486d1c72d19fc5f2a2571eda79 file
#
vt-private-retrohunt-jobs-listGet a VT Hunting Livehunt ruleset by hunting notification files relationship.
#
Base Commandvt-private-retrohunt-jobs-list
#
InputArgument Name | Description | Required |
---|---|---|
filter | Return the jobs matching the given criteria only. | Optional |
cursor | Continuation cursor. | Optional |
limit | Maximum number jobs to retrieve. Default is 10. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.RetroHuntJob.attributes.status | String | can be either "starting", "running", "aborting", "aborted" or "finished". |
VirusTotal.RetroHuntJob.attributes.finish_date | Number | date when the Retrohunt job finished |
VirusTotal.RetroHuntJob.attributes.rules | String | The ruleset in the job |
VirusTotal.RetroHuntJob.attributes.num_matches_outside_time_range | Number | Matches outside time range |
VirusTotal.RetroHuntJob.attributes.scanned_bytes | Date | Total scanned bytes |
VirusTotal.RetroHuntJob.attributes.time_range.start | Number | Start of job's time range |
VirusTotal.RetroHuntJob.attributes.time_range.end | Number | End of job's time range |
VirusTotal.RetroHuntJob.attributes.num_matches | Number | Number of matches. |
VirusTotal.RetroHuntJob.attributes.progress | Number | The progress in percentage |
VirusTotal.RetroHuntJob.attributes.corpus | String | Corpus of the job (main/goodware) |
VirusTotal.RetroHuntJob.attributes.creation_date | Number | Job's creation date as UTC timestamp. |
VirusTotal.RetroHuntJob.attributes.start_date | Number | The start date of the job in epch. |
VirusTotal.RetroHuntJob.type | String | Type of the entry (retrohunt_job) |
VirusTotal.RetroHuntJob.id | String | ID of the retro job. |
VirusTotal.RetroHuntJob.links.self | String | Link to the entry |
#
Command Example!vt-private-retrohunt-jobs-list limit=1
#
Context Example#
Human Readable Output#
Retrohunt jobs listed:
id corpus status rules akrupnik_panw-1617056777 goodware starting rule foobar { strings: $ = "foobar" condition: all of them }
#
vt-private-retrohunt-jobs-get-by-idRetrieve a retrohunt job.
#
Base Commandvt-private-retrohunt-jobs-get-by-id
#
InputArgument Name | Description | Required |
---|---|---|
id | Job identifier. Can be acquired from vt-private-retrohunt-jobs-list. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.RetroHuntJob.attributes.status | String | can be either "starting", "running", "aborting", "aborted" or "finished". |
VirusTotal.RetroHuntJob.attributes.finish_date | Number | date when the Retrohunt job finished |
VirusTotal.RetroHuntJob.attributes.rules | String | The ruleset in the job |
VirusTotal.RetroHuntJob.attributes.num_matches_outside_time_range | Number | Matches outside time range |
VirusTotal.RetroHuntJob.attributes.scanned_bytes | Date | Total scanned bytes |
VirusTotal.RetroHuntJob.attributes.time_range.start | Number | Start of job's time range |
VirusTotal.RetroHuntJob.attributes.time_range.end | Number | End of job's time range |
VirusTotal.RetroHuntJob.attributes.num_matches | Number | Number of matches. |
VirusTotal.RetroHuntJob.attributes.progress | Number | The progress in percentage |
VirusTotal.RetroHuntJob.attributes.corpus | String | Corpus of the job (main/goodware) |
VirusTotal.RetroHuntJob.attributes.creation_date | Number | Job's creation date as UTC timestamp. |
VirusTotal.RetroHuntJob.attributes.start_date | Number | The start date of the job in epch. |
VirusTotal.RetroHuntJob.type | String | Type of the entry (retrohunt_job) |
VirusTotal.RetroHuntJob.id | String | ID of the retro job. |
VirusTotal.RetroHuntJob.links.self | String | Link to the entry |
#
Command Example!vt-private-retrohunt-jobs-get-by-id id=akrupnik_panw-1615822819
#
Context Example#
Human Readable Output#
Retrohunt job: akrupnik_panw-1615822819
attributes corpus creation_date finish_date id links num_matches num_matches_outside_time_range progress rules scanned_bytes start_date status time_range type status: finished
finish_date: 1615822869
rules: rule foobar { strings: $ = "foobar" condition: all of them }
num_matches_outside_time_range: 556
scanned_bytes: 146897923532
time_range: {"start": 1615563618, "end": 1615822818}
num_matches: 0
progress: 100.0
corpus: goodware
creation_date: 1615822819
start_date: 1615822824goodware 1615822819 1615822869 akrupnik_panw-1615822819 self: https://www.virustotal.com/api/v3/intelligence/retrohunt_jobs/akrupnik_panw-1615822819 0 556 100.0 rule foobar { strings: $ = "foobar" condition: all of them } 146897923532 1615822824 finished start: 1615563618
end: 1615822818retrohunt_job
#
vt-private-retrohunt-jobs-get-matching-filesRetrieve matches for a retrohunt job matching file relationship.
#
Base Commandvt-private-retrohunt-jobs-get-matching-files
#
InputArgument Name | Description | Required |
---|---|---|
id | Job identifier. Can be acquired from vt-private-retrohunt-jobs-list. | Required |
extended_data | Whether to return full data information. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.RetroHuntJobFiles.attributes.type_description | String | describes the file type. |
VirusTotal.RetroHuntJobFiles.attributes.tlsh | String | Trend Micro's TLSH hash |
VirusTotal.RetroHuntJobFiles.attributes.vhash | String | in-house similarity clustering algorithm value, based on a simple structural feature hash allows you to find similar files. |
VirusTotal.RetroHuntJobFiles.attributes.exiftool | String | exiftool is a program for extracting Exif metadata from different file formats. Metadata shown may vary depending on the file type, and given the nature of Exif metadata, some fields may appear or not. |
VirusTotal.RetroHuntJobFiles.attributes.trid.file_type | String | TrID is a utility designed to identify file types from their binary signatures. |
VirusTotal.RetroHuntJobFiles.attributes.trid.probability | Number | probability of file format identification (given as percentage). |
VirusTotal.RetroHuntJobFiles.attributes.crowdsourced_yara_results.rule_name | String | contains the names of all rules in the ruleset. |
VirusTotal.RetroHuntJobFiles.attributes.crowdsourced_yara_results.description | String | matched rule description. |
VirusTotal.RetroHuntJobFiles.attributes.crowdsourced_yara_results.author | String | rule author. |
VirusTotal.RetroHuntJobFiles.attributes.crowdsourced_yara_results.ruleset_id | String | VirusTotal's ruleset ID. |
VirusTotal.RetroHuntJobFiles.attributes.crowdsourced_yara_results.ruleset_name | String | matched rule's ruleset name. |
VirusTotal.RetroHuntJobFiles.attributes.crowdsourced_yara_results.match_in_subfile | Boolean | whether the match was in a subfile or not. |
VirusTotal.RetroHuntJobFiles.attributes.crowdsourced_yara_results.source | String | ruleset source. |
VirusTotal.RetroHuntJobFiles.attributes.creation_date | Number | extracted when possible from the file's metadata. Indicates when it was built or compiled. It can also be faked by malware creators. UTC timestamp. |
VirusTotal.RetroHuntJobFiles.attributes.names | String | all file names associated with the file. |
VirusTotal.RetroHuntJobFiles.attributes.last_modification_date | Number | date when the object itself was last modified. UTC timestamp. |
VirusTotal.RetroHuntJobFiles.attributes.type_tag | String | tag representing the file type. Can be used in vt-private-intelligence-search |
VirusTotal.RetroHuntJobFiles.attributes.capabilities_tags | String | list of representative tags related to the file's capabilities |
VirusTotal.RetroHuntJobFiles.attributes.total_votes.harmless | Number | number of positive votes. |
VirusTotal.RetroHuntJobFiles.attributes.total_votes.malicious | Number | number of negative votes. |
VirusTotal.RetroHuntJobFiles.attributes.size | Number | file size in bytes. |
VirusTotal.RetroHuntJobFiles.attributes.authentihash | String | sha256 hash used by Microsoft to verify that the relevant sections of a PE image file have not been altered. This specific type of hash is used by Microsoft AppLocker. |
VirusTotal.RetroHuntJobFiles.attributes.times_submitted | Number | number of times the file has been posted to VirusTotal. |
VirusTotal.RetroHuntJobFiles.attributes.last_submission_date | Number | most recent date the file was posted to VirusTotal. UTC timestamp. |
VirusTotal.RetroHuntJobFiles.attributes.meaningful_name | String | the most interesting name out of all file's names. |
VirusTotal.RetroHuntJobFiles.attributes.downloadable | Boolean | true if the file can be downloaded, false otherwise. |
VirusTotal.RetroHuntJobFiles.attributes.sha256 | String | SHA-256 of the file |
VirusTotal.RetroHuntJobFiles.attributes.type_extension | String | specifies file extension. |
VirusTotal.RetroHuntJobFiles.attributes.tags | String | list of representative tags related to the file's capabilities |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_date | Number | Most recent scan date. UTC timestamp. |
VirusTotal.RetroHuntJobFiles.attributes.unique_sources | Number | indicates from how many different sources the file has been posted from. |
VirusTotal.RetroHuntJobFiles.attributes.first_submission_date | Number | date when the file was first seen in VirusTotal. UTC timestamp. |
VirusTotal.RetroHuntJobFiles.attributes.sha1 | String | SHA-1 of the file |
VirusTotal.RetroHuntJobFiles.attributes.magic | String | magic identifier of this app in hex format. |
VirusTotal.RetroHuntJobFiles.attributes.ssdeep | String | SSDeep of the file |
VirusTotal.RetroHuntJobFiles.attributes.md5 | String | MD5 of the file |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_stats.harmless | Number | number of reports saying that is harmless. |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_stats.type-unsupported | Number | number of AV engines that don't support that type of file. |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_stats.suspicious | Number | number of reports saying that is suspicious. |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_stats.confirmed-timeout | Number | number of AV engines that reach a timeout when analysing that file. |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_stats.timeout | Number | number of timeouts when analysing this URL/file. |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_stats.failure | Number | number of AV engines that fail when analysing that file. |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_stats.malicious | Number | number of reports saying that is malicious |
VirusTotal.RetroHuntJobFiles.attributes.last_analysis_stats.undetected | Number | number of reports saying that is undetected. |
VirusTotal.RetroHuntJobFiles.attributes.reputation | Number | file's score calculated from all votes posted by the VirusTotal community. |
VirusTotal.RetroHuntJobFiles.attributes.sigma_analysis_stats.high | Number | number of matched high severity rules. |
VirusTotal.RetroHuntJobFiles.attributes.sigma_analysis_stats.medium | Number | number of matched medium severity rules. |
VirusTotal.RetroHuntJobFiles.attributes.sigma_analysis_stats.critical | Number | number of matched critical severity rules. |
VirusTotal.RetroHuntJobFiles.attributes.sigma_analysis_stats.low | Number | number of matched low severity rules. |
VirusTotal.RetroHuntJobFiles.type | String | The type of the entry (file) |
VirusTotal.RetroHuntJobFiles.id | String | ID of file |
VirusTotal.RetroHuntJobFiles.links.self | String | A link to the entry |
VirusTotal.RetroHuntJobFiles.context_attributes.rule_name | String | contains the names of all rules in the ruleset. |
VirusTotal.RetroHuntJobFiles.context_attributes.match_in_subfile | Boolean | whether the match was in a subfile or not. |
#
Command Example!vt-private-retrohunt-jobs-get-matching-files id=akrupnik_panw-1610969096
#
Human Readable Output#
Files matching id "akrupnik_panw-1610969096"
sha256 popular_threat_classification reputation cf13811bb818c02149ad1745c95a11ef8b122801953aee463343627a2ffaa29a 0
#
vt-private-retrohunt-jobs-createCreate a new retrohunt job.
#
Base Commandvt-private-retrohunt-jobs-create
#
InputArgument Name | Description | Required |
---|---|---|
rules | The rules to create. | Required |
corpus | The "main" corpus is a composition of files sent to VirusTotal during the last few months. The "goodware" corpus is a random selection of ~1.000.000 files from the NSRL that are not detected by any antivirus engine. Possible values are: main, goodware. Default is main. | Optional |
notification_email | A comma-separated list of emails to notify. | Optional |
start_time | Fetch retrohunt jobs from given time. Can be epoch time, a date or time range (3 days, 1 year). | Optional |
end_time | Fetch retrohunt jobs to given time. Can be epoch time, a date or time range. If start_time supplied and not end_time, end_time will be the current time. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.RetroHuntJob.attributes.status | String | can be either "starting", "running", "aborting", "aborted" or "finished". |
VirusTotal.RetroHuntJob.attributes.finish_date | Number | date when the Retrohunt job finished |
VirusTotal.RetroHuntJob.attributes.rules | String | The ruleset in the job |
VirusTotal.RetroHuntJob.attributes.num_matches_outside_time_range | Number | Matches outside time range |
VirusTotal.RetroHuntJob.attributes.scanned_bytes | Date | Total scanned bytes |
VirusTotal.RetroHuntJob.attributes.time_range.start | Number | Start of job's time range |
VirusTotal.RetroHuntJob.attributes.time_range.end | Number | End of job's time range |
VirusTotal.RetroHuntJob.attributes.num_matches | Number | Number of matches. |
VirusTotal.RetroHuntJob.attributes.progress | Number | The progress in percentage |
VirusTotal.RetroHuntJob.attributes.corpus | String | Corpus of the job (main/goodware) |
VirusTotal.RetroHuntJob.attributes.creation_date | Number | Job's creation date as UTC timestamp. |
VirusTotal.RetroHuntJob.attributes.start_date | Number | The start date of the job in epch. |
VirusTotal.RetroHuntJob.type | String | Type of the entry (retrohunt_job) |
VirusTotal.RetroHuntJob.id | String | ID of the retro job. |
VirusTotal.RetroHuntJob.links.self | String | Link to the entry |
#
Command Example!vt-private-retrohunt-jobs-create rules=`rule foobar { strings: $ = "foobar" condition: all of them }` corpus=goodware start_time="3 days"
#
Context Example#
Human Readable Output#
Retrohunt job has been successfully created
id corpus status rules akrupnik_panw-1617056777 goodware starting rule foobar { strings: $ = "foobar" condition: all of them }
#
vt-private-quota-limits-listRetrieve user's API usage.
#
Base Commandvt-private-quota-limits-list
#
InputArgument Name | Description | Required |
---|---|---|
id | User ID or API key. If not supplied, will use the API Key configured in the integration. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
VirusTotal.QuotaLimits.cases_creation_monthly.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.cases_creation_monthly.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_vtdiff_creation_monthly.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.intelligence_vtdiff_creation_monthly.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_vtdiff_creation_monthly.group.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_vtdiff_creation_monthly.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_vtdiff_creation_monthly.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.monitor_uploaded_files.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.monitor_uploaded_files.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.monitor_uploaded_bytes.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.monitor_uploaded_bytes.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.monitor_storage_files.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.monitor_storage_files.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.api_requests_monthly.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.api_requests_monthly.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.api_requests_monthly.group.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.api_requests_monthly.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.api_requests_monthly.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_downloads_monthly.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.intelligence_downloads_monthly.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_downloads_monthly.group.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_downloads_monthly.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_downloads_monthly.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.api_requests_hourly.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.api_requests_hourly.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.api_requests_hourly.group.allowed | Number | hourly api requests group's quota limit |
VirusTotal.QuotaLimits.api_requests_hourly.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.api_requests_hourly.user.allowed | Date | hourly api requests user's quota limit |
VirusTotal.QuotaLimits.intelligence_hunting_rules.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.intelligence_hunting_rules.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_hunting_rules.group.allowed | Number | intelligence_hunting_rules group's quota limit |
VirusTotal.QuotaLimits.intelligence_hunting_rules.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_hunting_rules.user.allowed | Number | intelligence_hunting_rules user's quota limit |
VirusTotal.QuotaLimits.intelligence_graphs_private.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.intelligence_graphs_private.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_graphs_private.group.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_graphs_private.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_graphs_private.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.api_requests_daily.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.api_requests_daily.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.api_requests_daily.group.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.api_requests_daily.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.api_requests_daily.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.monitor_storage_bytes.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.monitor_storage_bytes.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_retrohunt_jobs_monthly.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.intelligence_retrohunt_jobs_monthly.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_retrohunt_jobs_monthly.group.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_retrohunt_jobs_monthly.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_retrohunt_jobs_monthly.user.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_searches_monthly.group.inherited_from | String | group from which the quota is inherited. |
VirusTotal.QuotaLimits.intelligence_searches_monthly.group.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_searches_monthly.group.allowed | Number | quota limit. |
VirusTotal.QuotaLimits.intelligence_searches_monthly.user.group.used | Number | quota has been used. |
VirusTotal.QuotaLimits.intelligence_searches_monthly.user.allowed | Number | quota limit. |
#
Command Example!vt-private-quota-limits-list
#
Context Example#
Human Readable Output#
Monthly quota data: More data can be found in the Context.
api_requests_monthly cases_creation_monthly intelligence_downloads_monthly intelligence_retrohunt_jobs_monthly intelligence_searches_monthly intelligence_vtdiff_creation_monthly group: {"inherited_from": "palo_alto_networks", "used": 13551234, "allowed": 1000000000}
user: {"used": 2564, "allowed": 1000000000}user: {"used": 0, "allowed": 20} group: {"inherited_from": "palo_alto_networks", "used": 6214, "allowed": 100000}
user: {"used": 5, "allowed": 0}group: {"inherited_from": "palo_alto_networks", "used": 163, "allowed": 300}
user: {"used": 0, "allowed": 0}group: {"inherited_from": "palo_alto_networks", "used": 16328, "allowed": 100000}
user: {"used": 12, "allowed": 0}group: {"inherited_from": "palo_alto_networks", "used": 23, "allowed": 100000000}
user: {"used": 0, "allowed": 0}