Skip to main content
All CollectionsTemplatesBasic
VirusTotal IOC Lookup with Summary of Results from OpenAI - Workflow Template

VirusTotal IOC Lookup with Summary of Results from OpenAI - Workflow Template

Used as a nested workflow, receive an IP address, domain or file hash and query VirusTotal and send the details to OpenAI for a summary.

Updated over a week ago

The "VirusTotal IOC Lookup with Summary of Results from OpenAI" workflow is designed to enhance threat intelligence capabilities by automating the analysis of Indicators of Compromise (IOCs). It takes an IP address, domain, or hash, queries the VirusTotal database for any associated threat data, and then leverages OpenAI's summarization prowess to generate concise insights valuable for informed decision-making in cybersecurity incident management. This workflow is ideal for security teams in need of rapid, actionable intelligence on potential threats.

Use Cases

Threat Intelligence Enrichment

Workflow Breakdown

  1. Receive an IOC from a parent workflow

  2. Find the IOC type and query against VirusTotal

  3. Send the results to OpenAI to provide a short summary that can be included in a message or case

Vendors

Utils, VirusTotal, OpenAI

Workflow Output

If the query to VirusTotal succeeds, a short summary of the VirusTotal information from OpenAI.

Did this answer your question?