Kaspersky Threat Intelligence Portal provides an API for looking up a hash.
Request
Request method: GET
Endpoint: https://opentip.kaspersky.com/api/v1/search/hash
Query parameter: request
—Hash that you want to investigate.
cURL command sample:
Here:
|
Responses
Request processed successfully.
Endpoint returns a JSON object that contains lookup results for the specified hash.
200 OK response parameters
Parameter |
Type |
Description |
---|---|---|
|
string |
Color of the zone that a hash belongs to. Available values:
|
|
object |
General information about the requested hash. |
|
string |
Status of the file requested by the hash (Malware, Adware and other, Clean, No threats detected, or Not categorized). |
|
string |
SHA1 hash of the file requested by the hash. |
|
string |
MD5 hash of the file requested the hash. |
|
string |
SHA256 hash of the file requested by the hash. |
|
string <date-time> |
Date and time when the requested hash was detected by Kaspersky expert systems for the first time. |
|
string <date-time> |
Date and time when the requested hash was detected by Kaspersky expert systems for the last time. |
|
string |
Organization that signed the requested hash. |
|
string |
Packer name (if available). |
|
integer |
Size of the object being investigated by the hash (in bytes). |
|
string |
Type of the object being investigated the by hash. |
|
integer |
Number of hits (popularity) of the requested hash detected by Kaspersky expert systems. Number of hits is rounded to the nearest power of 10. |
|
Array of objects |
Information about detected objects. |
|
string <date-time> |
Date and time when the object was last detected by Kaspersky expert systems. |
|
string |
Link to the detected object's description in the Kaspersky threats website (if available). |
|
string |
Color of the zone that the detected object belongs to. |
|
string |
Name of the detected object. |
|
string |
Method used to detect the object. |
|
object |
Information about dynamic analysis results. |
|
Array of objects |
The number of detected objects with Malware (red) or Adware and other (yellow) statuses.
|
|
Array of objects |
The number of suspicious activities with High (red), Medium (yellow), or Low (grey) levels.
|
|
Array of objects |
The number of files that were downloaded or dropped by the file during the execution process, and the proportion of files with the status of Malicious (extracted files that can be classified as malicious, in red), Adware and other (extracted files that can be classified as Not-a-virus, in yellow), Clean (extracted files that can be classified as not malicious, in green), or Not categorized (no information about the extracted files is available, in grey).
|
|
Array of objects |
The number of registered network interactions that the file performed during the execution process and the proportion of network interactions with the status of Dangerous (requests to resources with the Dangerous status, in red), Adware and other (requests to resources with the Adware and other status, in yellow), Good (requests to resources with the Good status, in green), or Not categorized (requests to resources with the Not categorized status, in grey).
|
|
Array of objects |
Detects related to the analyzed file.
|
|
Array of objects |
SNORT and Suricata rules triggered during analysis of traffic from the file.
|
Request not processed: incorrect query.
Make sure you enter the correct parameter, and then try to run the query again.
Request not processed: user authentication failed.
Make sure you enter the correct credentials, and then try to run the query again.
Request not processed: quota or request limit exceeded.
Check your quota and limitations, and try to run the query again later.
Request not processed: requested object lookup results not found.
Make sure the specified object is correct, and then run the query again.