{% extends "base.html" %} {% block content %}

{% csrf_token %}

For details on how to perform searches, get some help.

For MD5, SHA1, SHA256 and SHA512 no prefix is needed.

Prefix Description
name: File name pattern
type: File type/format
string: String contained in the binary
ssdeep: Fuzzy hash
crc32: CRC32 hash
imphash: Search for PE Imphash
iconhash: Search for exact hash of the icon associated with the PE
iconfuzzy: Search for hash designed to match on similar-looking icons
file: Open files matching the pattern
command: Executed commands matching the pattern
resolvedapi: APIs resolved at runtime matching the pattern
key: Open registry keys matching the pattern
mutex: Open mutexes matching the pattern
ip: Contact the specified IP address
domain: Contact the specified domain
url: Search for Cuckoo Sandbox URL analysis
signame: Search for Cuckoo Sandbox signatures through signature names
signature: Search for Cuckoo Sandbox signatures through signature descriptions
malfamily: Search for samples associated with malware family
surialert: Search for Suricata Alerts
suritls: Search for Suricata TLS
surihttp: Search for Suricata HTTP
clamav: Local ClamAV detections
yaraname: Yara Rule Name for analysis samples
procmemyara: Yara Rule Name for process memory dumps
virustotal: Virus Total Detected Name
comment: Search for Analysis Comments
{% if term %}

Term {{term}}

{% endif %} {% if analyses != None %} {% if analyses|length > 0 %}

Search Results

{% if config.moloch %} {% endif %} {% if config.suricata %} {% endif %} {% if config.virustotal %} {% endif %} {% for analysis in analyses %} {% if config.moloch %} {% endif %} {% if config.suricata %} {% endif %} {% if config.virustotal %} {% endif %} {% endfor %}
ID Timestamp Filename Target/MD5MolochSuriAlertVTMalScore Status
{{analysis.id}} {% if analysis.status == "reported" %} {{analysis.completed_on}} {% else %} {{analysis.added_on}} (added on) {% endif %} {{analysis.filename}} {% if analysis.status == "reported" %} {% if analysis.category == "url" %} {{analysis.target}} {% else %} {{analysis.sample.md5}} {% endif %} {% else %} {% if analysis.category == "url" %} {{analysis.target}} {% else %} {{analysis.sample.md5}} {% endif %} {% endif %} {% if analysis.moloch_url %} MOLOCH {% else %} None {% endif %} {% if analysis.suri_alert_cnt %} {{analysis.suri_alert_cnt}} {% else %} None {% endif %} {% if analysis.virustotal_summary %} {{analysis.virustotal_summary}} {% else %} None {% endif %} {% if analysis.malscore != None %} {{analysis.malscore|floatformat:1}} {% else %} None {% endif %} {% if analysis.status == "pending" %} pending {% elif analysis.status == "running" %} running {% elif analysis.status == "completed" %} processing {% elif analysis.status == "reported" %} {% if analysis.errors %} {% else %} {% endif%} reported {% else %} {{analysis.status}} {% endif %}
{% else %}
No results found.
{% endif %} {% else %} {% if error %}
{{error}}
{% endif %} {% endif %} {% endblock %}