Current ThreatQ Version Filter
 

ShadowDragon MalNet Action

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The ShadowDragon MalNet action enriches FQDNs, IP addresses, and file hashes with contextual threat intelligence from the ShadowDragon MalNet service, enabling analysts to quickly identify malware relationships, assess infection scope, and accelerate investigation and response efforts.

The integration provides the following action:

  • ShadowDragon MalNet - Enrich IOCs - enriches FQDNs, IP addresses, MD5 hashes, and SHA-256 hashes with user selected contextual data from the ShadowDragon MalNet API.

The integration is compatible with and enriches the following indicators types:

  • FQDN
  • IP Address
  • MD5
  • SHA-256

This action is intended for use with ThreatQ TDR Orchestrator (TQO). An active TQO license is required for this feature.

Prerequisites

  • A ShadowDragon MalNet API Key.
  • An active ThreatQ TDR Orchestrator (TQO) license.
  • A ThreatQ data collection containing at least one of the following indicator types:
    • FQDN
    • IP Address
    • MD5
    • SHA-256

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the action zip file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the action zip file using one of the following methods:
    • Drag and drop the zip file into the dialog box
    • Select Click to Browse to locate the zip file on your local machine

    ThreatQ will inform you if the action already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the action contains changes to the user configuration. The new user configurations will overwrite the existing ones for the action and will require user confirmation before proceeding.

You will still need to configure the action.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
 

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Actions option from the Category dropdown (optional).
  3. Click on the action entry to open its details page.
  4. Enter the following parameters under the Configuration tab:

    The configurations set on this page will be used as the default settings when inserting this action into a new workflow. Updating the configurations on this page will not update any instances of this action that have already been deployed to a workflow. In that scenario, you must update the action’s configurations within the workflow itself.

    Parameter Description
    API Key Enter your ShadowDragon MalNet API Key.
    Enrich Domains with Selected Context Select which pieces of context to pull in when enriching domain indicators. Options include:
    • Reputation (default)
    • Geolocation
    • Samples (File Hashes)
    • Events 
    • WHOIS
    • Nameservers
    • Related IPs
    • Malware-requested URLs

    Each selection will use one additional API call.

    Enrich IPs with Selected Context Select which pieces of context to pull in when enriching IP indicators. Options include:
    • Reputation (default)
    • Geolocation
    • Samples (File Hashes) 
    • Events
    • Related Domains
    • Malware-requested URLs 

    Each selection will use one additional API call.

    Enrich File hashes with Selected Context Select which pieces of context to pull in when enriching File Hashes indicators. Options include:
    • Details
    • DNS Lookups
    • HTTP Requests
    • Events

    Each selection will use one additional API call.

    Fetch IDS Signatures for Events Enable this parameter to fetch and ingest IDS signatures related to any IDS events returned in the enrichment data. This parameter is enabled by default. 
    Mark Indicators as Active for Selected Categories Select which reputation categories should mark an indicator as Active in ThreatQ when ingested. Options include:
    • CnC - Known Trojan Command and Control Server (default)
    • Bot - System that has been observed checking in to a known botnet (default)
    • Spam - Observed source of Spam (default)
    • Drop - Drop site for logs or stolen credentials (default)
    • Spyware CnC - System observed being used by adware and spyware to report user activity (default)
    • Online Gaming - Gambling and related gaming sites
    • Drive By Src - Observed source of a Driveby exploit kit or a redirector into an exploit kit (default)
    • Streaming Media - POLICY Streaming Media Source
    • Chat Server - Observed chat server including protocols such as jabber IRC MSN etc
    • Tor Node - POLICY Tor Node
    • RBN - Known Bad Net (default)
    • Malvertiser - Known Malvertiser (default)
    • Compromised - Known compromised or Hostile (default)
    • SCADA Device - A Known SCADA Device
    • P2P - P2P Node
    • Proxy - Proxy Host
    • IP Check - IP Check Services
    • Social Media - Social Media sites and servers
    • Utility - Known Good Public Utility
    • DDoS Target - Target of a DDoS
    • Scanner - Host Performing Scanning (default) 
    • SCADA Attacker - A Known SCADA Device Attacker (default)
    • Brute Forcer - SSH or other brute forcer (default)
    • Fake AV - Fake AV and AS Products (default)
    • Dyn DNS - Domain or IP Related to a Dynamic DNS Entry or Request
    • Undesirable - Undesirable but not illegal
    • Abused TLD - Abused or free TLD Related
    • Self-Signed SSL - Self Signed SSL or other suspicious encryption
    • Blackhole - Blackhole or Sinkhole systems
    • Remote Access Service - GoToMyPC and similar remote access services
    • P2P CnC - Distributed CnC Nodes (default)
    • Shared Hosting - Known Shared Hosting server
    • Parking - Domain or SEO Parked
    • VPN - VPN Server
    • EXE Source - Observed serving executables (default)
    • Mobile Device - Known mobile device traffic source
    • Mobile CnC - Known CnC for Mobile specific Family (default)
    • Mobile Spyware CnC - Spyware CnC specific to mobile devices (default)
    • Skype Supernode - Observed Skype Bootstrap or Supernode
    • Bitcoin Related - Bitcoin Mining and related
    • DDoS Attacker - DDoS Source (default)
    • Web Crawler - Known Web Crawling Infrastructure and Robots 
    Category Score Threshold to Mark Indicators as Active Specify the score threshold required within the selected category to mark an indicator as Active in ThreatQ. Setting the value to 0 marks all indicators in the selected categories as Active. This setting provides more granular control over which indicators are designated as Active. The default value is 0.
    Mark Utility Category Indicators as Whitelisted Enable this parameter to ingest indicators categorized as Utility and assign them a Whitelisted status. This parameter is disabled by default. 
    Selected Geolocation Context to Ingest Select which geolocation context fields to ingest from the MalNet enrichment data. Options include:
    • Country
    • Country Code (default)
    • Region
    • City
    Select WHOIS Context to Ingest Select which WHOIS context fields to ingest from the MalNet enrichment data. Options include:
    • Registrar (default)
    • Registrar Country
    • Registrar Website
    • Registrant Name
    • Registrant Email
    Selecting Supporting Context to Ingest Select which supporting context fields to ingest from the MalNet enrichment data. Options include:
    • First Seen
    • Last Seen
    IDS Signature Type Select the type of IDS signatures to ingest when fetching signatures for events. Options include:
    • Snort (default)
    • Suricata
    Objects Per Run The number of objects to process per run of the workflow. The default value is 1000.

    Configuration Screen
  5. Review any additional settings, make any changes if needed, and click on Save.

Actions

The following action is available:

Action Description Object Type Object Subtype
ShadowDragon MalNet - Enrich IOCs Enriches IOCs with context from ShadowDragon MalNet. Indicator FQDN, IP Address, MD5, SHA-256

ShadowDragon MalNet - Enrich IOCs

The ShadowDragon MalNet - Enrich IOCs action enriches indicators—such as FQDNs, IP addresses, MD5 hashes, and SHA-256 hashes—with user-selected context from the ShadowDragon MalNet API.

GET https://api.malnet.shadowdragon.io/{{ indicator_type }}/{{ indicator_value }}/{{ enrichment_type }}

The returned data structure will vary based on the indicator type and enrichment type selected. The mapping table below will prefix the data path with the enrichment type.

ThreatQuotient provides the following default mapping for this action:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Published Date Examples Notes
reputation.data[].category Indicator.Attribute Category N/A CnC N/A
reputation.data[].score Indicator.Attribute Threat Level N/A Malicious Threat Levels are based on the Proofpoint category mapping found at: https://tools.emergingthreats.net
/docs/ET%20Intelligence%
20Rep%20List%20Tech%20
Description.pdf
details.data.md5sum Indicator.Value MD5 N/A N/A N/A
details.data.sha256 Indicator.Value SHA-256 N/A N/A N/A
details.data.file_type Indicator.Attribute File Type N/A PE32 executable (GUI) Intel 80386, for MS Windows N/A
details.data.file_size Indicator.Attribute File Size N/A 13716 N/A
geo.data[].country Indicator.Attribute Country N/A Canada N/A
geo.data[].country_code Indicator.Attribute Country code N/A CA N/A
geo.data[].region Indicator.Attribute Region N/A North America N/A
geo.data[].city Indicator.Attribute City Ontario N/A N/A
domains.data[].domain Indicator.Value FQDN N/A N/A N/A
domains.data[].first_seen Indicator.Attribute First Seen N/A N/A N/A
domains.data[].last_seen Indicator.Attribute Last Seen N/A N/A N/A
dns.data[].domain Indicator.Value FQDN N/A N/A N/A
http.data[].url Indicator.Value URL N/A N/A N/A
nameservers.data[].server Indicator.Value FQDN N/A N/A N/A
nameservers.data[].first_seen Indicator.Attribute First Seen N/A N/A N/A
nameservers.data[].last_seen Indicator.Attribute Last Seen N/A N/A N/A
nameservers.data[].* Indicator.Attribute Type N/A Value hard-coded to Nameserver to indicate the IOC is a nameserver domain. N/A
samples.data[].source Indicator.Value MD5, SHA-256 N/A Type determined by sample's hash length N/A
ips.data[].source Indicator.Value IP Address N/A N/A N/A
ips.data[].first_seen Indicator.Attribute First Seen N/A N/A N/A
ips.data[].last_seen Indicator.Attribute Last Seen N/A N/A N/A
urls.data[] Indicator.Value URL, URL Path N/A Type determined by URL value structure N/A
whois.data.registrar.name Indicator.Attribute Registrar N/A N/A N/A
whois.data.registrant.name Indicator.Attribute Registrant N/A N/A N/A
whois.data.registrar.country Indicator.Attribute Registrar Country N/A N/A N/A
whois.data.registrar.website Indicator.Attribute Registrar Website N/A N/A N/A
whois.data.registrant.email Indicator.Attribute Registrant Email N/A N/A N/A
events.data[].* Indicator.Description N/A N/A IDS Events are added to the enriched indicator's description N/A
sids.data.sig_name Related Signature.Name Snort N/A ET MALWARE DcRAT/Sheet RAT CnC Checkin Using MessagePack N/A

Enriched Data

Object counts and action runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and action runtime may vary based on system resources and load.

Metric Result
Run Time 1 minute
Indicators 50
Indicator Attributes 165

Known Issues / Limitations

  • Rate Limit Notice - The MalNet API enforces rate limits based on your license level. Review your license agreement to understand your specific limits and adjust the Objects Per Run configuration parameter accordingly to avoid exceeding them. Additionally, each enrichment option selected results in an additional API call per indicator. If rate limits are exceeded, the action will pause for the required duration and then resume processing, which may extend the overall execution time.

Change Log

  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
ShadowDragon MalNet Action Guide v1.0.0 5.12.1 or Greater