Advanced Search

In this document, we showcase some of the diverse threat hunting capabilities available in the advanced search feature.

Examples

Note: Since the search can take time, opening the serach examples also takes time too.

Malicious Documents

Office Files with Foreign Language and Active Content: report exampe, search example

Office Files using default Symmetric Key Encryption: report example, search example

Office Files utilizing the EMBED.Equation exploit: report example, search example

Office Files with Auto-Execution and Process Spawns: report example, search example

Phishing PDFs: report example, search example

Suspicious Executables

Packed PE files with process hollowing capabilities: report example, search example

PE file with a RDTSC timing instruction: report example, search example

Unusual File Types

Malicious Windows Shortcut Files spawning rundll: report example, search example

Malicious files delivered via VHD image files: report example, search example

Mobile Threats

Malicious APKs: report example, search example

APKs reading the device ID (IMEI): report example, search example

Malicious Web Threats

E-Mails containing macro-enabled attachments: report example, search example

Phishing URLs: report example, search example

Additional Resources

Threat FeedAPI

Personal Threats Overview Page

API DocumentationAPI

CLI for API (pip package)

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard