Skip to main content
All CollectionsTemplatesBasic
VirusTotal IOC Lookup with Summary of Results from AI Task - Workflow Template

VirusTotal IOC Lookup with Summary of Results from AI Task - Workflow Template

Used as a nested workflow, receive an IP address, domain or file hash and query VirusTotal and analyze details with AI Task for a summary.

Updated over a week ago

Enhance your threat intelligence processes with the "VirusTotal IOC Lookup with Summary of Results from AI Task" workflow template. This tool allows teams to efficiently process Indicators of Compromise (IOCs) by automatically detecting the IOC type—be it an IP address, domain, or file hash—and querying VirusTotal for detailed analysis. An integrated AI Task operator then provides a concise summary of the results, perfectly packaged for inclusion in reports or incident cases.

Use Cases

Threat Intelligence Enrichment

Workflow Breakdown

  1. Receive an IOC from a parent workflow

  2. Find the IOC type and query against VirusTotal

  3. Analyze the results with AI Task operator to provide a short summary that can be included in a message or case

Vendors

Utils, VirusTotal

Workflow Output

If the query to VirusTotal succeeds, a short summary of the VirusTotal information from AI Task operator.

Did this answer your question?