Playing Around With VirusTotal Graph

A few days ago, I bumped into a new post from folks from VirusTotal announcing the VirusTotal Graph, the tool not only caught my attention from who it was coming from, but also because the huge impact for the Infosec Industry, and I believe that a lot of us should check it out!

Visualisations can help investigators to identify links between files, domains and other entities that can shed some light into an question/idea or simply help to identify information that has not been surfaced yet.

VirusTotal Graph
VirusTotal receives a large number of files and URLs every day, and each of them is analyzed by AVs and other tools and…blog.virustotal.com

What’s the tool?

It’s a graph!

If you’ve ever used Maltego from Paterva, during your investigations/pentest or any other work where you needed to visually represent relationships between different entities this will look familiar. This one it’s online and can be easily shared among researchers, include the files/links in your blog or paper to help other investigators or security enthusiast to understand what you did.

This one, is built on top of VirusTotal’s dataset, what makes it pretty powerful to display and look into submission dates, batches of files sent together and how many times a file has been sent, if you do have access to Virus Total Intelligence you can even get more out of it!

How you can use it?

There are two pretty cool videos that highlight the main usages of the tool, starting from files, urls, domains or IP Addresses. You can share the relationships between a set of files belonging to an APT Groups or to common malware that you looked at.

Add any of the IoC you looked into and draft the relationships between them, save it and share in your post, article o paper.

Adding Files

You can easily add files by hash, and you’ll get insights into detection rates, other files that were submitted in the same bundles and direct links to public data and also to Virus Total Intelligence:

 

Full video: https://www.youtube.com/watch?v=QEqHXU04IkI&feature=youtu.be

Adding URLs, Domains and IPs

Similar information can be automatically pulled out for URLs and domains, the tools will add data about the domain resolutions or details in VT’s public report.

When adding domains you can easily surface siblings, and even the IP addresses where they resolve, you can complete this data with other Threat Intelligence services or public tools

 

Full video: https://www.youtube.com/watch?v=xe2busIlkP4&feature=youtu.be

Test run with a public report

As a way to try how this work and how much information it can display I gave it a run with one of the latest publications from ESET’s about Turla. I only had to copy some of the IoC including hashes, C&Cs and domains to see what I could find out.

This is how it looks like:

Turla Mosquito files and C&Cs in VirusTotal’s Graph

Some of the key takeaways is that more information than what was published in the paper was surfaced. Not only sibling domains, but detections to some of them shed light that they might be malicious.

Data about the domains including IP addresses and hosting information is added by default and this can show how diverse the infrastructure is for this APT operation that has been active for the last couple of years.

If you want to take a sneak peak you can access yourself, as the information is public here. As usual, do not forget to read the Docs for any questions, issues or ideas you might bump into.

Hunt and Share

Not everybody likes to share details about their investigations, but based on public reports and other information alike security enthusiast can review data published by vendors, or even share some of the investigations they’ve done by themselves.

I usual, tools as VirusTotal Graph can enhance the community sharing capabilities and will take some time to sink in, but it is a great step towards a better communication and fact checking among researchers.

Happy hunting :-)

 

https://medium.com/secjuice/playing-around-with-virustotal-graph-8cce7a1681ee

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Semi-supervised classification with graph convolutional networks (GCNs) is a method for predicting labels for nodes in a graph. GCNs are a type of neural network that operates on graph-structured data, where each node in the graph represents an entity (such as a person, a product, or a webpage) and edges represent relationships between entities. The semi-supervised classification problem arises when we have a graph where only a small subset of nodes have labels, and we want to predict the labels of the remaining nodes. GCNs can be used to solve this problem by learning to propagate information through the graph, using the labeled nodes as anchors. The key idea behind GCNs is to use a graph convolution operation to aggregate information from a node's neighbors, and then use this aggregated information to update the node's representation. This operation is then repeated over multiple layers, allowing the network to capture increasingly complex relationships between nodes. To train a GCN for semi-supervised classification, we use a combination of labeled and unlabeled nodes as input, and optimize a loss function that encourages the network to correctly predict the labels of the labeled nodes while also encouraging the network to produce smooth predictions across the graph. Overall, semi-supervised classification with GCNs is a powerful and flexible method for predicting labels on graph-structured data, and has been successfully applied to a wide range of applications including social network analysis, drug discovery, and recommendation systems.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值