This workflow template streamlines threat intelligence enrichment by automating the process of retrieving VirusTotal reports for file hashes. It analyzes the results to identify malicious or suspicious findings and sends a detailed email report via SMTP. Ideal for security teams, this workflow enhances threat detection and response efficiency by providing timely insights into potential threats, ensuring informed decision-making and proactive security measures.
Optional Triggers
["Webhook","Slack","Microsoft Teams"]
Use Cases
Threat Intelligence Enrichment
Workflow Breakdown
- Change the recipient and integration names in the first set variables step 
- Run the workflow and an email will be sent to the user with a table of the details 
Vendors
Utils, VirusTotal, Email
Workflow Output
Email result to the recipient on findings on the hash.
Tips
- Setup the SMTP integration in the tenant for use with this workflow. 
