Skip to content

Identify malicious IPs by quering TCP Connections against VirusTotal API.

Notifications You must be signed in to change notification settings

AlexLinov/multi-query

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 

Repository files navigation

TCP Connections and Active Processes VirusTotal Query Script

This PowerShell script is designed to be used with Microsoft Defender for Endpoint Live Response Sessions. It queries TCP connections and process hash value on an endpoint against the VirusTotal API to identify possible malicious addresses, including C2 servers and other unwanted connections.

Features

  • Retrieves active TCP connections on an endpoint.
  • Retrives active processes and its hash values.
  • Ability to use multiple API Keys.
  • Queries each connection's IP address and file hash value against the VirusTotal API.
  • Logs results, indicating whether each IP is clean or potentially malicious.
  • Includes the process ID (PID) associated with each connection.

Prerequisites

  • PowerShell
  • VirusTotal API key (Enterprise preferred)

Usage

  1. Upload the script to the library in Microsoft Defender for Endpoint.

  2. Use the script in Live Response sessions with the following command:

    run script-name.ps1 -parameters "-outfile <File Path>"

    Replace <File Path> with the path where you want to save the output file.

Example

run script-name.ps1 -parameters "-outfile C:\path\to\output.txt"

About

Identify malicious IPs by quering TCP Connections against VirusTotal API.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published