Try in Splunk SOAR


This playbook tries to determine if a file is malware and whether or not the file is present on any managed machines. VirusTotal "file reputation" and PAN WildFire "detonate file" are used to determine if a file is malware, and CarbonBlack Response "hunt file" is used to search managed machines for the file. The results of these investigations are summarized in an email to the incident response team.

Associated Detections

How To Implement

Be sure to update asset naming to reflect the asset names configured in your environment.

Explore Playbook


Required field

  • fileHash
  • vaultId


source | version: 1