Threat Hunting

A more comprehensive search is accessible by clicking on the three dots next to the search bar:

Please note that a login is required to access the detailed search.

In this document, we showcase some of the diverse threat hunting capabilities available in the advanced search feature.

With the advanced search option, you have access to numerous fields for refining your search, including verdict, file type, hashes, YARA rules, and more.

When you click on the search button, it retrieves the reports that match your search criteria. Please note that the maximum available date interval for retrieval is three months.

Examples

Note: Since the search can take time, opening the serach examples also takes time too.

Malicious Documents

Office Files with Foreign Language and Active Content: report example, search example

Office Files using default Symmetric Key Encryption: report example, search example

Office Files utilizing the EMBED.Equation exploit: report example, search example

Office Files with Auto-Execution and Process Spawns: report example, search example

Phishing PDFs: report example, search example

Suspicious Executables

Packed PE files with process hollowing capabilities: report example, search example

PE file with a RDTSC timing instruction: report example, search example

Unusual File Types

Malicious Windows Shortcut Files spawning rundll: report example, search example

Malicious files delivered via VHD image files: report example, search example

Mobile Threats

Malicious APKs: report example, search example

APKs reading the device ID (IMEI): report example, search example

Malicious Web Threats

E-Mails containing macro-enabled attachments: report example, search example

Phishing URLs: report example, search example

Additional Resources

Threat Feed#get-feed-api-feed-atom-get

Personal Threats Overview Page

API Documentation

CLI for API (pip package)

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard