This workflow template streamlines threat intelligence enrichment by automating the process of retrieving VirusTotal reports for file hashes. It analyzes the results to identify malicious or suspicious findings and sends a detailed email report via SMTP. Ideal for security teams, this workflow enhances threat detection and response efficiency by providing timely insights into potential threats, ensuring informed decision-making and proactive security measures.
Optional Triggers
["Webhook","Slack","Microsoft Teams"]
Use Cases
Threat Intelligence Enrichment
Workflow Breakdown
Change the recipient and integration names in the first set variables step
Run the workflow and an email will be sent to the user with a table of the details
Vendors
Utils, VirusTotal, Email
Workflow Output
Email result to the recipient on findings on the hash.
Tips
Setup the SMTP integration in the tenant for use with this workflow.
