Skip to main content

Cyware Orchestrate

ReversingLabs TitaniumCloud

App Vendor: ReversingLabs

App Category: Forensics & Malware Analysis

Connector Version: 1.1.0

API Version: 6.2.3

About App

The ReversingLabs TitaniumCloud supports enriching the presence of the malware.

The ReversingLabs TitaniumCloud app is configured with the Orchestrate application to perform the following actions:

Action Name

Description

Malware Presence Single Query

This action checks malware presence for a single hash.

Malware Presence Bulk Query

This action checks malware presence for a bulk list of hashes.

Get Single Hash Result

This action returns a response containing analysis results for the requested hash.

Generic Action

This is a generic action to perform any additional use case that you want on Reversing Labs Titanium Cloud.

Get Bulk Hash Result

This action returns a response containing analysis results for multiple hashes.

Configuration Parameters

The following configuration parameters are required for the ReversingLabs TitaniumCloud app to communicate with the ReversingLabs TitaniumCloud enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Username

Enter the username.

Text

Required

Password

Enter the password.

Text

Required

Action: Malware Presence Single Query

This action checks malware presence for a single hash.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Hash Type

Enter the hash type.

Example:

"md5"

Text

Required

Allowed Values:

  • md5

  • sha1

  • sha256

Hash Value

Enter the hash value.

Example:

"275a021bbfb6489e54d471899f7db9d1663fc695"

Text

Required

Show Hashes

Choose to fetch the related md5, sha1, and sha256 for a hash.

Example:

No

Boolean

Optional

Default Value:

Yes

Extended

Choose to fetch more details for a hash.

Example:

No

Boolean

Optional

Default Value:

Yes

Example Request

[
   {
      "hash_type":"md5",
      "hash_value": "275a021bbfb6489e54d471899f7db9d1663fc695",
      "show_hashes": no,
      "extended": no
   }
]
Action: Malware Presence Bulk Query

This action checks malware presence for a bulk list of hashes.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Hash Type

Enter the hash type.

Example:

"md5"

Text

Required

Allowed Values:

  • md5

  • sha1

  • sha256

Hash Value List

Enter the list of hash values.

Example: $LIST[275a021bbfb6489e54d471899f7db9d1663fc695, 831a021bbfb6489e54d471899f7db9d1663fc192]

List

Required

Post Format

Enter the format in which you want to receive the response.

Example:

"json"

Text

Optional

Default value:

json

Show Hashes

Choose to fetch the related md5, sha1, sha256 for a hash.

Example:

No

Boolean

Optional

Default value:

Yes

Extended

Choose to fetch more details for a hash.

Example:

No

Boolean

Optional

Default value:

Yes

Example Request

[
   {
      "hash_type":"md5",
      "hash_value_list":[
         "275a021bbfb6489e54d471899f7db9d1663fc695, 831a021bbfb6489e54d471899f7db9d1663fc192"
      ],
      "post_format":"json",
      "show_hashes":"no",
      "extended":"no"
   }
]