About This Guide

Welcome to the MetaDefender Cloud Threat Intelligence guide. This guide is intended to provide the information for:

  • Organizations that want to be on the lookout for the hottest malware
  • IT specialists that implement file blacklists based on hashes
  • Researchers analyzing trending malware on the market
  • Security products that leverage Threat Intelligence capabilities to harden security measures

WARNING

A commercial license is required to access the Threat Intelligence v5 API endpoints. Free users will not be able to access these endpoints. Please contact OPSWAT Sales to set up a time-limited evaluation license for your organization.


How to use MetaDefender Cloud Threat Intelligence Public APIs

Learn about new features, updated features, and bug fixes Learn about frequently asked questions and additional concepts through our library of knowledge base articles

Key Features of MetaDefender Cloud Threat Intelligence

AV File Reputation

File Analysis

Scan History

Expression Search

Similarity Search

Server
https://api.metadefender.com/v5
Server Variables

Av File Reputation

Returns AV file reputation status for a file hash by MD5, SHA1, or SHA256 The status can be: MALICIOUS, SUSPICIOUS, BENIGN, or UNKNOWN. This status depends on the confidence level:

  • when confidence_level = 0 then 'benign'
  • when confidence_level < 50 then 'suspicious'
  • when confidence_level >= 50 then 'malicious'
  • else 'unknown'

The confidence level is calculated using the AV detection percentage and the dynamic analysis result (if it exists).

More about file types

WARNING: This is an experimental endpoint, it may change in the future!.

AV file reputation status

Retrieve AV file reputation information by looking up a hash using MD5, SHA1 or SHA256

Auth
Headers
apikeystring

The apikey identifies and authenticates the user

extendedinteger

Include additional metadata about the hash. By default, it is false (0). WARNING: When this flag is enabled (1), it results in DOUBLE credit consumption against the daily limit!

Allowed values

  • 0 (get reputation only)
  • 1 (get additional details)
Path Params
hashstring

A hash is used to identify a file (MD5, SHA1 or SHA256)

GET /threat-intel/av-file-reputation/{hash}
Copy
Responses
200

The request has succeeded

AV File Reputationobject
md5string
sha1string
sha256string
reputationstring

Enum: benign,suspicious,malicious,unknown

reputation_iint32
400

Bad request

AV file reputation status (Bulk lookup)

Retrieve AV file reputation information by looking up a list of hashes (MD5, SHA1 or SHA256)

Auth
Headers
apikeystring

The apikey identifies and authenticates the user

Content-Typestring

Specify the http content type

Allowed values - application/json

extendedinteger

Include additional metadata about the hash. By default, it is false (0). WARNING: When this flag is enabled (1), it results in DOUBLE credit consumption against the daily limit!

Allowed values

  • 0 (get reputation only)
  • 1 (get additional details)
Request Body

List of hashes whose reputation you are interested in

JSON payload for bulk lookupobject
hasharray[string]
POST /threat-intel/av-file-reputation/
Copy
Responses
200

OK

AV File Reputation (Bulk lookup)object
dataarray[object]
md5string
sha1string
sha256string
reputationstring

Enum: benign,suspicious,malicious,unknown

reputation_iint32
400

Bad request

File Analysis

Provides file analysis data on hashes (MD5, SHA1, or SHA256). Metadata can include relevant portions of static analysis, AV scan information, file sources and any related IP/domain information.

WARNING: This is an experimental endpoint, it may change in the future!.

File analysis data

Provides file analysis data on hashes (MD5, SHA1, or SHA256). Metadata can include relevant portions of static and dynamic analysis, AV scan information, file sources.

Auth
Headers
apikeystring

The apikey identifies and authenticates the user

Path Params
hashstring

A hash is used to identify a file (MD5, SHA1 or SHA256)

GET /threat-intel/file-analysis/{hash}
Copy
Responses
200

The request has succeeded

400

Bad request

Response
Copy

File analysis data (Bulk lookup)

Bulk lookup of file analysis data on hashes (MD5, SHA1, or SHA256). Metadata can include relevant portions of static and dynamic analysis, AV scan information, file sources.

Auth
Headers
apikeystring

The apikey identifies and authenticates the user

Content-Typestring

Specify the http content type Allowed values - application/json

Request Body

List of hashes whose analysis you are interested in

JSON payload for bulk lookupobject
hasharray[string]
POST /threat-intel/file-analysis/
Copy
Responses
200

OK

400

Bad request

Response
Copy

Av Scan History

Provides up to 50 historic AV scan results (threat detections from over 24 AV scanners) based on the file hash (in MD5, SHA1 or SHA256 format).

WARNING: This is an experimental endpoint, it may change in the future!.

AV scan history results

Provides up to 50 historic AV scan results (threat detections from over 24 AV scanners) based on the file hash (in MD5, SHA1 or SHA256 format).

Auth
Headers
apikeystring

The apikey identifies and authenticates the user

Path Params
hashstring

A hash is used to identify a file (MD5, SHA1 or SHA256)

GET /threat-intel/av-scan-history/{hash}
Copy
Responses
200

The request has succeeded

AV Scan Historyobject
md5string
sha1string
sha256string
first_seendate-time
last_seendate-time
update_timestampdate-time
av_scan_historyarray[object]
av_detectionsobject
scan_all_result_iint32
start_timedate-time
total_avsint32
total_detected_avsint32
400

Bad request

AV scan history results (Bulk lookup)

Bulk lookup of historic AV scan results for multiple files (using hashes in the MD5, SHA1 or SHA256 format). For a given hash, it is possible to retrieve up to 50 scan results (including threat detections from over 24 AV scanners).

Auth
Headers
apikeystring

The apikey identifies and authenticates the user

Content-Typestring

Specify the http content type Allowed values - application/json

Request Body

List of hashes whose scan history you are interested in

JSON payload for bulk lookupobject
hasharray[string]
POST /threat-intel/av-scan-history/
Copy
Responses
200

OK

400

Bad request