VirusTotal SOAR Integration

Overview

This document outlines the tools available for the VirusTotal integration within the SOAR platform. These tools allow interaction with the VirusTotal API for scanning and retrieving reports on various indicators like file hashes, URLs, IPs, and domains.

Tools

virus_total_scan_hash

Scan Hash via VirusTotal. *Mark entity as suspicious and show insights if risk score matches a given threshold.

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • threshold (str, required): Mark entity as suspicious if number of negative engines is equal or above the given threshold.

  • rescan_after_days (str, optional, default=None): Action will fetch the latest result. If the result is older than mentioned days it will automatically rescan the entity.

  • target_entities (List[TargetEntity], optional, default=None): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.

virus_total_ping

Test Connectivity.

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • target_entities (List[TargetEntity], optional, default=None): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.

virus_total_upload_and_scan_files

Upload and scan files via VirusTotal. *Files can be uploaded from remote path (Windows share or Linux remote server).

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • threshold (str, required): Entity risk threshold.

  • file_paths (str, required): Target file path.

  • linux_server_address (str, optional, default=None): Linux server address(e.g: x.x.x.x).

  • linux_user (str, optional, default=None): Linux user for remote server connection.

  • linux_password (str, optional, default=None): Linux password for remote server connection.

  • target_entities (List[TargetEntity], optional, default=None): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.

virus_total_scan_url

Scan URL via VirusTotal. *Mark entity as suspicious and show insights if risk score matches a given threshold.

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • threshold (str, required): Mark entity as suspicious if number of negative engines is equal or above the given threshold.

  • rescan_after_days (str, optional, default=None): Action will fetch the latest result. If the result is older than mentioned days it will automatically rescan the entity.

  • target_entities (List[TargetEntity], optional, default=None): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.

virus_total_scan_ip

Scan IP via VirusTotal. Returns table of reverse domains and full Json result.

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • threshold (str, optional, default=None): Specify the accepted threshold for the detected samples related to the IP address. If the number of engines that marked related samples as malicious is higher than the specified threshold, IP address will be marked as suspicious.

  • target_entities (List[TargetEntity], optional, default=None): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.

virus_total_get_domain_report

Scan Domain via VirusTotal. *Check online report for full details.

Parameters:

  • case_id (str, required): The ID of the case.

  • alert_group_identifiers (List[str], required): Identifiers for the alert groups.

  • target_entities (List[TargetEntity], optional, default=None): Optional list of specific target entities (Identifier, EntityType) to run the action on.

  • scope (str, optional, default=“All entities”): Defines the scope for the action.