Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[external import] Add virustotal livehunt notifications Connector #543

Merged
merged 2 commits into from
Nov 17, 2021
Merged

[external import] Add virustotal livehunt notifications Connector #543

merged 2 commits into from
Nov 17, 2021

Conversation

YungBinary
Copy link
Contributor

Proposed changes

  • Add Virustotal Livehunt Notifications Connector

Checklist

  • I consider the submitted work as finished
  • I tested the code for its functionality using different use cases
  • Where necessary I refactored code to improve the overall quality

Further comments

This Connector was created to allow a malware researcher/hunter to use their virustotal account to setup Livehunt Yara rules and process any Notifications created from those rules. For example, a researcher could sign into their Virustotal account and create a Livehunt for any samples being uploaded to Virustotal that match Cobalt Strike. Once configured, this Connector will grab those Notifications, download the file, and upload as an Artifact to OpenCTI w/ associated Yara Rule match as the label.

Preview

preview

@SamuelHassine SamuelHassine merged commit 983b0eb into OpenCTI-Platform:master Nov 17, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants