Try in Splunk SOAR


Accepts a url link, domain or vault_id (hash) to be detonated using Virustotal V3 connector.

  • Type: Investigation
  • Product: Splunk SOAR
  • Apps: virustotal v3
  • Last Updated: 2023-03-23
  • Author: Teoderick Contreras, Splunk
  • ID: 388ed434-a498-4d55-8de4-b2657825cb67

Associated Detections

How To Implement

This input playbook requires the Virustotal V3 API connector to be configured. It is designed to work in conjunction with the Dynamic Attribute Lookup playbook or other playbooks in the same style.

Explore Playbook


Required field


source | version: 1