Spectra Intelligence OpenAPI Specification (5.0.1)
Download OpenAPI specification:Download
ReversingLabs Spectra Intelligence offers REST web services providing file reputation, file analysis, malware hunting and network indicator information. These can be used for incident response triage, malware analysis, threat intelligence augmentation, and other uses. The output format of API results is either XML or JSON.
TCA-0101: File Reputation (single query)
The File Reputation (Malware Presence) API provides file reputation status calculated by a proprietary ReversingLabs algorithm for the requested sample. The status can be: MALICIOUS, SUSPICIOUS, KNOWN (non-malicious or benign), UNKNOWN. Additional classification-related metadata and hashes can be requested using optional parameters.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
extended | boolean Default: false Example: extended=true Optional parameter that specifies whether additional classification metadata for the requested sample should be returned in the response. Additional metadata includes information such as trust factor and threat level values; malware type, family name, and platform; first and last seen times, and more. If the parameter is not provided in the request, the default value is |
show_hashes | boolean Default: false Example: show_hashes=true Optional parameter that specifies whether MD5, SHA1, and SHA256 hashes should be returned in the response for the requested sample, in addition to the rest of the Malware Presence information. If the parameter is not provided in the request, the default value is |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/databrowser/malware_presence/query/sha1/2cfbb1d2ee28644934bbd3baf6a6667905eee27b?extended=true&show_hashes=true&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_presence": {
- "status": "KNOWN",
- "sha1": "2cfbb1d2ee28644934bbd3baf6a6667905eee27b",
- "threat_level": 0,
- "scanner_percent": 0,
- "scanner_match": 0,
- "last_seen": "2021-11-16T06:56:41",
- "reason": "best_source",
- "scanner_count": 47,
- "query_hash": {
- "sha1": "2cfbb1d2ee28644934bbd3baf6a6667905eee27b"
}, - "first_seen": "2017-08-06T19:56:25",
- "sha256": "624200f51a513c05cdcb948649367f725953da9753a23e7f62861eabdb1f79c9",
- "trust_factor": 0,
- "md5": "c8ef05f345b61d4892496b1f8ddae78c"
}
}
}
TCA-0101: File Reputation (bulk query)
The File Reputation (Malware Presence) Bulk API provides file reputation status calculated by a proprietary ReversingLabs algorithm for the requested samples. Up to 100 hashes can be submitted in one request. The status can be: MALICIOUS, SUSPICIOUS, KNOWN (non-malicious or benign), UNKNOWN. Additional classification-related metadata and hashes can be requested using optional parameters.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
extended | boolean Default: false Example: extended=true Optional parameter that specifies whether additional classification metadata for the requested sample should be returned in the response. Additional metadata includes information such as trust factor and threat level values; malware type, family name, and platform; first and last seen times, and more. If the parameter is not provided in the request, the default value is |
show_hashes | boolean Default: false Example: show_hashes=true Optional parameter that specifies whether MD5, SHA1, and SHA256 hashes should be returned in the response for the requested sample, in addition to the rest of the Malware Presence information. If the parameter is not provided in the request, the default value is |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "invalid_hashes": [
- "example_of_a_wrong_hash"
], - "entries": [
- {
- "status": "UNKNOWN",
- "query_hash": {
- "sha1": "ca03064987d3c4465f91552ba8b6a883eecfd3e5"
}
}, - {
- "status": "KNOWN",
- "query_hash": {
- "sha1": "b363713a938afcd3c74603827fab79e935b2b09b"
}
}, - {
- "status": "KNOWN",
- "query_hash": {
- "sha1": "a7afddb68260a60f86c02a021efba7f216c2e7cf"
}
}
]
}
}
TCA-0102: File Reputation Override
The File Reputation Override (Malware Presence) API enables file reputation status override for the requested samples. Up to 100 hashes can be submitted in one request. The status can be: MALICIOUS, SUSPICIOUS, or KNOWN (non-malicious or benign). Additional classification-related metadata and can be specified using optional parameters.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Request Body schema: application/jsonrequired
override_samples
is an array of samples to override. Each sample must be defined by sha1
, md5
, and sha256
, and include new status
for those hashes and may include threat_name
, threat_level
and trust_factor
depending on the status
value. remove_override
is an array of samples which already have an override that should be removed. Each sample must be defined by sha1
, md5
and sha256
. Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "override_samples": [
- {
- "sha1": "9865c7ecda437034e1513cc43ae9a1f6f334bb7f",
- "md5": "294c7e5ecdc3e94c6ea3f5a7c9ccc581",
- "sha256": "3cdbba0294d51b060436952e23dcf6243dd53e52a7b41bf60ee90583f27bc4ea",
- "status": "KNOWN",
- "trust_factor": 3
}, - {
- "sha1": "2cfbb1d2ee28644934bbd3baf6a6667905eee27b",
- "md5": "c8ef05f345b61d4892496b1f8ddae78c",
- "sha256": "624200f51a513c05cdcb948649367f725953da9753a23e7f62861eabdb1f79c9",
- "status": "MALICIOUS",
- "threat_level": 2,
- "threat_name": "Win32.Backdoor.Bifrost"
}
], - "remove_override": [
- {
- "sha1": "00000aae8c7a59999e156524a8d6fd35009f4275",
- "md5": "77459f04fde5c9945ed57508bfe54922",
- "sha256": "c88f99d08545143779123578804d71e83db8c0dfeb00284b646e3a3982568034"
}
]
}
}
}
Response samples
- 200
{- "rl": {
- "user_override": {
- "create_override": [
- {
- "sha1": "9865c7ecda437034e1513cc43ae9a1f6f334bb7f",
- "md5": "294c7e5ecdc3e94c6ea3f5a7c9ccc581",
- "sha256": "3cdbba0294d51b060436952e23dcf6243dd53e52a7b41bf60ee90583f27bc4ea",
- "status": "KNOWN",
- "trust_factor": 3
}
], - "replace_override": [
- {
- "sha1": "2cfbb1d2ee28644934bbd3baf6a6667905eee27b",
- "md5": "c8ef05f345b61d4892496b1f8ddae78c",
- "sha256": "624200f51a513c05cdcb948649367f725953da9753a23e7f62861eabdb1f79c9",
- "status": "MALICIOUS",
- "threat_level": 2,
- "threat_name": "Win32.Backdoor.Bifrost"
}
], - "remove_override": [
- {
- "sha1": "00000aae8c7a59999e156524a8d6fd35009f4275",
- "md5": "77459f04fde5c9945ed57508bfe54922",
- "sha256": "c88f99d08545143779123578804d71e83db8c0dfeb00284b646e3a3982568034"
}
]
}
}
}
TCA-0102: File Reputation Override (list)
The File Reputation Override (list) API lists all existing file reputation status overrides for the requested user. The hashes are sorted. Up to 1000 hashes will be returned. If there are more than 1000 active overrides, next_hash
value in the previous response may be provided as the start_hash
of the subsequent request to enumerate all hashes. Find more information in the official API documentation.
Authorizations:
path Parameters
hash_type required | string Enum: "xml" "json" Required parameter that defines the type of hash to be returned. Supported options are sha1, md5, and sha256. |
query Parameters
start_hash | string Example: start_hash=9865c7ecda437034e1513cc43ae9a1f6f334bb7f Optional parameter that specified the first hash in the response to be returned. Enables pagination. |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/databrowser/malware_presence/user_override/list_hashes/sha1?start_hash=9865c7ecda437034e1513cc43ae9a1f6f334bb7f&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "user_override": {
- "hash_values": [
- "9865c7ecda437034e1513cc43ae9a1f6f334bb7f",
- "a59e1bcd410e160a59fd3d5a599afd73039bd110",
- "f27c761f8ba4da2049e3fb5a04664d24cb22f020",
- "f47dbda56cce16999b9784965ea2db6ed541f080"
], - "next_hash": null
}
}
}
TCA-0103: Historic Multi-AV Scan Records (single query)
The Historic Multi-AV Scan Records (XREF) API provides cross-reference data (AV scanner scanning information, first and last seen date-time (UTC), sample type and size, first and last scanned date, etc.) for the requested sample. An optional parameter history
can be used in requests to this API to retrieve historical XREF record changes for the sample (if available).
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
history | boolean Default: false Example: history=true Optional parameter that defines whether the response should contain a history of XREF records for a sample (when |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/xref/v2/query/sha1/7d8f177243cfa055c95cbbf32ebc2d7e8c71d4fb?format=json&history=true' --user <username>:<password>
Response samples
- 200
TCA-0103: Historic Multi-AV Scan Records (bulk query)
The Historic Multi-AV Scan Records Bulk API provides cross-reference data (AV scanner scanning information, first and last seen date-time (UTC), sample type and size, first and last scanned date, etc.) for up to 100 requested samples. An optional parameter history
can be used in requests to this API to retrieve historical XREF record changes for each sample (if available).
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
history | boolean Default: false Example: history=true Optional parameter that defines whether the response should contain a history of XREF records for a sample (when |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "samples": [
- {
- "sha1": "string",
- "first_seen_on": "string",
- "last_scanned_on": "string",
- "last_seen_on": "string",
- "single_scan": true,
- "first_scanned_on": "string",
- "sample_type": "string",
- "sample_size": 0,
- "xref": [
- {
- "scanner_match": 0,
- "scanner_count": 0,
- "scanners": [
- {
- "timestamp": "string",
- "version": "string",
- "name": "string"
}
], - "scanned_on": "string",
- "results": [
- {
- "scanner": "string",
- "result": "string"
}
]
}
], - "sha384": "string",
- "sha256": "string",
- "sha512": "string",
- "ripemd160": "string",
- "md5": "string"
}
], - "unknown_hashes": [
- { }
], - "invalid_hashes": [
- { }
]
}
}
TCA-0104: File Analysis - Hash (single query)
The File Analysis - Hash [RLDATA] API provides analysis results for the requested hash. The extent of analysis data returned in the response varies based on the file type. Note that the dynamic analysis report is only available with additional permissions.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/databrowser/rldata/query/sha1/a45ab18fb7a06dd5ecb44bf6c221a951f974059f?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "sample": {
- "sha1": "string",
- "md5": "string",
- "sha256": "string",
- "sha384": "string",
- "sha512": "string",
- "ripemd160": "string",
- "ssdeep": "string",
- "tlsh": "string",
- "sample_size": 0,
- "relationships": {
- "container_sample_sha1": [
- { }
]
}, - "analysis": {
- "entries": [
- {
- "record_time": "string",
- "analysis_type": "string",
- "analysis_version": "string",
- "tc_report": {
- "info": {
- "file": {
- "file_type": "string",
- "file_subtype": "string",
- "proposed_filename": "string"
}, - "identification": {
- "name": "string"
}, - "validation": "string",
- "package": { }
}, - "metadata": {
- "application": [ ],
- "certificate": [ ],
- "attack": [ ],
- "software_packages": [ ]
}, - "interesting_strings": [
- {
- "category": "string",
- "values": [
- { }
]
}
], - "story": "string"
}, - "indicators": "string"
}
]
}, - "xref": {
- "entries": [
- {
- "record_time": "string",
- "scanners": [
- {
- "name": "string",
- "result": "string"
}
], - "info": {
- "scanners": [
- {
- "name": "string",
- "version": "string",
- "timestamp": "string"
}
]
}
}
], - "first_seen": "string",
- "last_seen": "string",
- "sample_type": "string"
}, - "sources": {
- "entries": [
- {
- "record_time": "string",
- "tag": "string",
- "properties": [
- {
- "name": "string",
- "value": "string"
}
], - "domain": {
- "name": "string"
}
}
]
}
}
}
}
TCA-0104: File Analysis - Hash (bulk query)
The File Analysis - Hash [RLDATA] Bulk API provides analysis results for up to 100 requested hashes in a single response. The extent of analysis data returned in the response varies based on the file type. Note that the dynamic analysis report is only available with additional permissions. Find more information in the official API documentation.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "entries": [
- {
- "sha1": "string",
- "crc32": "string",
- "md5": "string",
- "sha256": "string",
- "sha384": "string",
- "sha512": "string",
- "ripemd160": "string",
- "sample_size": 0,
- "relationships": {
- "container_sample_sha1": [
- { }
], - "parent_sample_sha1": [
- { }
]
}, - "analysis": {
- "entries": [
- {
- "record_time": "string",
- "analysis_type": "string",
- "analysis_version": "string",
- "tc_report": {
- "info": {
- "file": {
- "file_type": null,
- "file_subtype": null
}
}
}
}
]
}, - "xref": {
- "entries": [
- {
- "record_time": "string",
- "scanners": [
- {
- "name": "string",
- "result": "string"
}
], - "info": {
- "scanners": [
- {
- "name": null,
- "version": null,
- "timestamp": null
}
]
}
}
], - "first_seen": "string",
- "last_seen": "string",
- "sample_type": "string"
}, - "sources": {
- "entries": [
- {
- "record_time": "string",
- "tag": "string",
- "properties": [
- {
- "name": "string",
- "value": "string"
}
]
}
]
}
}
], - "invalid_hashes": [
- { }
], - "unknown_hashes": [
- { }
]
}
}
TCA-0105: File Analysis - Non-Malicious (single query)
The File Analysis - Non-Malicious [RLDATA Goodware] API provides sample hashes, trust factor, relationships, size, and sources for benign samples only. If a malicious hash is queried, a 404 (Not Found) HTTP response will be returned.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/databrowser/rldata/goodware/query/sha1/a25b6db2d363eaa31de348399aedc5651280b52b?format=json' --user <username>:<password> --header 'Content-Type: application/json'
Response samples
- 200
{- "rl": {
- "sample": {
- "sha1": "string",
- "trust_factor": 0,
- "md5": "string",
- "sha256": "string",
- "sha384": "string",
- "sha512": "string",
- "pe_sha1": "string",
- "pe_sha256": "string",
- "ripemd160": "string",
- "ssdeep": "string",
- "sample_size": 0,
- "tlsh": "string",
- "relationships": {
- "container_sample_sha1": [
- { }
]
}, - "sources": {
- "entries": [
- {
- "record_time": "string",
- "tag": "string",
- "properties": [
- {
- "name": "string",
- "value": "string"
}
], - "domain": {
- "name": "string"
}
}
]
}
}
}
}
TCA-0105: File Analysis - Non-Malicious (bulk query)
The File Analysis - Non-Malicious [RLDATA Goodware] Bulk API provides sample hashes, trust factor, relationships, size, and sources for benign samples only. Up to 100 hashes can be submitted in one request. If a malicious hash is queried, a 404 (Not Found) HTTP response will be returned. Find more information in the official API documentation.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "entries": [
- {
- "sha1": "string",
- "trust_factor": 0,
- "crc32": "string",
- "md5": "string",
- "sha256": "string",
- "sha384": "string",
- "sha512": "string",
- "pe_sha1": "string",
- "pe_sha256": "string",
- "ripemd160": "string",
- "sample_size": 0,
- "tlsh": "string",
- "relationships": {
- "container_sample_sha1": [
- { }
], - "parent_sample_sha1": [
- { }
]
}, - "sources": {
- "entries": [
- {
- "record_time": "string",
- "tag": "string",
- "properties": [
- {
- "name": "string",
- "value": "string"
}
]
}
]
}
}
], - "invalid_hashes": [
- { }
], - "unknown_hashes": [
- { }
]
}
}
TCA-0501: Certificate Index
The Certificate Index API provides a list of samples that are signed with the requested certificate. The certificate should be requested using its thumbprint value as a SHA1, SHA256, or MD5 hash. Only one certificate thumbprint can be submitted in one request. Optional parameters can be used in the request to retrieve additional sample metadata and filter the results by classification status.
Authorizations:
path Parameters
thumbprint required | string Required parameter that specifies the thumbprint of the certificate for which the user is requesting data from the service. The thumbprint value should be provided as a valid hash. Supported hash types are: MD5, SHA1, SHA256. |
query Parameters
limit | integer [ 1 .. 100 ] Default: 100 Example: limit=50 Optional parameter; specifies the maximum number of sample SHA1 hashes to include in the response. This value has to be an integer in the range from 1 and 100. When the parameter is not included in the request, 100 hashes are returned by default. |
extended | boolean Default: false Example: extended=true If the extended option is selected, each SHA1 hash in the list will be expanded with additional metadata: certificate validation status, classification, threat level, trust factor, malware family name, threat name, malware type, targeted platform and subplatform; SHA1, MD5, PE_SHA1, PE_SHA256 and SHA256 hashes; sample size, sample type, download availability, first and last seen dates (UTC). |
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/certificate/index/v1/query/thumbprint/A909502DD82AE41433E6F83886B00D4277A32A7B?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "next_page": "0133a64a3e360138da5820e25178490577d0400d",
- "request": {
- "extended": false,
- "limit": "100",
- "response_format": "json",
- "thumbprint": "A909502DD82AE41433E6F83886B00D4277A32A7B"
}, - "samples": {
- "item": [
- "0114bec01a2248fe7cb147f7c064d1d88d00430e",
- "011c509102410d427105dbce0d927d66263db0bd",
- "..."
]
}
}
}
TCA-0501: Certificate Index (paginated)
The Certificate Index API provides a list of samples that are signed with the requested certificate. The certificate should be requested using its thumbprint value as a SHA1, SHA256, or MD5 hash. Only one certificate thumbprint can be submitted in one request. Optional parameters can be used in the request to retrieve additional sample metadata and filter the results by classification status.
Authorizations:
path Parameters
thumbprint required | string Required parameter that specifies the thumbprint of the certificate for which the user is requesting data from the service. The thumbprint value should be provided as a valid hash. Supported hash types are: MD5, SHA1, SHA256. |
page | string Optional parameter used for pagination. To get the next page of results from the API, use the |
query Parameters
limit | integer [ 1 .. 100 ] Default: 100 Example: limit=50 Optional parameter; specifies the maximum number of sample SHA1 hashes to include in the response. This value has to be an integer in the range from 1 and 100. When the parameter is not included in the request, 100 hashes are returned by default. |
extended | boolean Default: false Example: extended=true If the extended option is selected, each SHA1 hash in the list will be expanded with additional metadata: certificate validation status, classification, threat level, trust factor, malware family name, threat name, malware type, targeted platform and subplatform; SHA1, MD5, PE_SHA1, PE_SHA256 and SHA256 hashes; sample size, sample type, download availability, first and last seen dates (UTC). |
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/certificate/index/v1/query/thumbprint/A909502DD82AE41433E6F83886B00D4277A32A7B?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "next_page": "0133a64a3e360138da5820e25178490577d0400d",
- "request": {
- "extended": false,
- "limit": "100",
- "response_format": "json",
- "thumbprint": "A909502DD82AE41433E6F83886B00D4277A32A7B"
}, - "samples": {
- "item": [
- "0114bec01a2248fe7cb147f7c064d1d88d00430e",
- "011c509102410d427105dbce0d927d66263db0bd",
- "..."
]
}
}
}
TCA-0502: Certificate Analytics
The Certificate Analytics API provides certificate analytics for the requested certificate and its chain of trust. The certificate should be requested using its thumbprint value as a SHA1, SHA256, or MD5 hash. Sending requests using the GET method allows only one thumbprint per request, while the POST method accepts up to 100 thumbprints in one request. Find more information in the official API documentation.
Authorizations:
path Parameters
post_format required | string |
thumbprint required | string Required parameter that specifies the thumbprint of the certificate for which the user is requesting data from the service. The thumbprint value should be provided as a valid hash. Supported hash types are: MD5, SHA1, SHA256. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/certificate/analytics/v1/query/thumbprint/18254B1DC375B74E339EB99ABFE31AF0D735CB5A3B535570731175811D735B0D?format=json' --user <username>:<password> --header 'Content-Type: application/json'
Response samples
- 200
{- "rl": {
- "request": {
- "response_format": "json",
- "thumbprint": "A481635184832F09BC3D3921A335634466C4C6FC714D8BBD89F65E827E5AF1B1"
}, - "certificate_analytics": {
- "certificate_first_seen": "2022-09-14T08:05:10",
- "statistics": {
- "known": 77,
- "unknown": 1,
- "malicious": 0,
- "suspicious": 0,
- "total": 78
}, - "classification": {
- "status": "undefined"
}, - "certificate": {
- "valid_from": "2022-06-14T04:02:43Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2025-07-12T07:06:34Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature"
}, - {
- "is_critical": "False",
- "name": "Authority Information Access",
- "value": "CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt\nOCSP - URI:http://ocsp.globalsign.com/gsgccr45evcodesignca2020\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Certificate Policies",
- "value": "Policy: 1.3.6.1.4.1.4146.1.2\n CPS: https://www.globalsign.com/repository/\nPolicy: 2.23.140.1.3\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Basic Constraints",
- "value": "CA:FALSE"
}, - {
- "is_critical": "False",
- "name": "X509v3 CRL Distribution Points",
- "value": "Full Name:\n URI:http://crl.globalsign.com/gsgccr45evcodesignca2020.crl\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Extended Key Usage",
- "value": "Code Signing"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:25:9D:D0:FC:59:09:86:63:C5:EC:F3:B1:13:3B:57:1C:03:92:36:11\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "B9:8B:D3:79:F7:03:DC:12:78:E5:28:C2:AF:E8:61:4D:3E:E1:AC:E3"
}
], - "signature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
- "common_name": "Reallusion Inc.",
- "serial_number": "67C6DAAFB381A5567534EB0F",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "3b5d3951bd5930863767cd86a4ba27c5"
}, - {
- "name": "SHA1",
- "value": "e18af391a8ba1ae94eb61794c573c5a9856c80d3"
}, - {
- "name": "SHA256",
- "value": "A481635184832F09BC3D3921A335634466C4C6FC714D8BBD89F65E827E5AF1B1"
}
], - "issuer": "GlobalSign GCC R45 EV CodeSigning CA 2020"
}
}
}
}
TCA-0502: Certificate Analytics
The Certificate Analytics API provides certificate analytics for the requested certificate and its chain of trust. The certificate should be requested using its thumbprint value as a SHA1, SHA256, or MD5 hash. Sending requests using the GET method allows only one thumbprint per request, while the POST method accepts up to 100 thumbprints in one request. Find more information in the official API documentation.
Authorizations:
path Parameters
thumbprint required | string |
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
thumbprints
is a required parameter that specifies a list of certificate thumbprints for which the user is requesting data from the service. Each thumbprint value should be provided as a valid hash. Supported hash types are: MD5, SHA1, SHA256. Up to 100 thumbprints can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "thumbprints": [
- "18254B1DC375B74E339EB99ABFE31AF0D735CB5A3B535570731175811D735B0D"
], - "format": "json"
}
}
}
Response samples
- 200
{- "rl": {
- "request": {
- "response_format": "json",
- "thumbprints": [
- "18254B1DC375B74E339EB99ABFE31AF0D735CB5A3B535570731175811D735B0D"
]
}, - "certificate_analytics": [
- {
- "certificate_first_seen": "2018-11-25T23:50:11",
- "statistics": {
- "known": 1,
- "unknown": 0,
- "malicious": 0,
- "suspicious": 0,
- "total": 1
}, - "classification": {
- "status": "undefined"
}, - "certificate": {
- "valid_from": "Sep 3 17:25:37 2018 GMT",
- "signature_algorithm": "sha1WithRSAEncryption",
- "valid_to": "Oct 3 17:25:37 2018 GMT",
- "usage": [
- "X509v3 Key Usage",
- "X509v3 Basic Constraints",
- "Authority Information Access",
- "X509v3 Certificate Policies",
- "X509v3 CRL Distribution Points",
- "X509v3 Extended Key Usage"
], - "version": "2",
- "signature": "CB1D7E0B933642F8B9CA16C90825B6FE7C449932DFBB2B6651077E73583394B37551B2AA2880C7B0F4C2E7289D0743996ACB34CB8FE71D0438072F921F3E7A53E547970B4BC8928D2F18ED9FCCA8062D46A6EBFE24166523DF9191AF84F8FCD3450D82E0556031E7580494597661EB155DA13D744F0BADCD14510FF29C18499BDB3239926A0281FB0090EF548D2AB7DC68A952CFAC1B48ED459E777EA9136DAAA33ACB5149748146DC7138FE7E8F06978B12F8B2B0F47CA24E927EB6A3A8A26A6A85AD046F1D8897F3843A072E3695BAAA4AC39797D66C7A6C1E50F1F6B3B1D9131288343BF44436A071B36B5137F206025550755F16D7E79D02709ACF3235FD",
- "common_name": "Microsoft",
- "serial_number": "9935F30E9D6FECB0873E4114E000E1C776B3D432",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "2377666edb5a4d5656f68e002efb8415"
}, - {
- "name": "SHA1",
- "value": "4f0333347b6f953b33966e976f24c5da36d75143"
}, - {
- "name": "SHA256",
- "value": "18254B1DC375B74E339EB99ABFE31AF0D735CB5A3B535570731175811D735B0D"
}
], - "issuer": {
- "valid_from": "Apr 21 12:15:17 2009 GMT",
- "signature_algorithm": "sha1WithRSAEncryption",
- "valid_to": "Apr 14 23:59:59 2028 GMT",
- "usage": [
- "X509v3 Key Usage",
- "X509v3 Basic Constraints",
- "X509v3 Certificate Policies",
- "X509v3 Subject Key Identifier",
- "X509v3 CRL Distribution Points",
- "Authority Information Access",
- "X509v3 Authority Key Identifier"
], - "version": "2",
- "signature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
- "common_name": "Ascertia Public CA 1",
- "serial_number": "E6",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "c00947372e2954d2202b82c0b435810e"
}, - {
- "name": "SHA1",
- "value": "36d8f9de10381aaee9bca2aebca8b75804f49ea7"
}, - {
- "name": "SHA256",
- "value": "74FBDED7D182E0C8BD89EE7F277EC99A18688265B28918D24E8787CFE9E70599"
}
], - "issuer": "Ascertia Root CA 2"
}
}
}
]
}
}
TCA-0503: Certificate Thumbprint Search
The Certificate Thumbprint Search API allows users to find certificate thumbprints by using the full or partial certificate common name as the search keyword. The results contain thumbprints of certificates that match the requested common name. Those thumbprints can be used with the TCA-0501 and TCA-0502 APIs to obtain a list of certificate-signed samples and certificate analytics, respectively.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "common_name": "Microsoft*",
- "response_format": "json",
- "limit": 5
}
}
}
Response samples
- 200
{- "rl": {
- "next_page_common_name": "Microsoft",
- "search": [
- {
- "common_name": "Microsoft",
- "thumbprints": [
- {
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "65cea96f7314405df019c2986c7fce75"
}, - {
- "name": "SHA1",
- "value": "e1a3bad62fdb0190b404b42255ea1362563fc193"
}, - {
- "name": "SHA256",
- "value": "405B4768D0259046589D49C8B6..."
}
]
}, - {
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "7fe3e576b290124c52407ee921717146"
}, - {
- "name": "SHA1",
- "value": "d5d0b2a4ccb4de53281f744b6a5b779b0c30ffbc"
}, - {
- "name": "SHA256",
- "value": "29CE46C4F39751D4FF9D2024.."
}
]
}
]
}
], - "next_page_thumbprint": "405B4768D0259046589D49C8B6734...",
- "request": {
- "common_name": "Microsoft*",
- "limit": 5,
- "response_format": "json"
}
}
}
TCA-0401: URI to Hash Search
The URI to Hash Search API provides a list of all available SHA1 hashes associated with the requested URI. The following URI types are supported: email, URL, IPv4 address, domain. Only one URI can be submitted in one request. Sending requests using the GET method requires the SHA1 value of the URI string, while the POST method accepts the URI string value in plain text.
Authorizations:
path Parameters
hash required | string SHA1 hash value of the URI string for which the user is requesting data from the service. The user should generate a SHA1 hash of the URI string prior to submitting a request. |
query Parameters
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/uri_index/v1/query/c2208abde9668e8e9815c3690855edd1e63abeac?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "uri_index": {
- "query_uri": "c2208abde9668e8e9815c3690855edd1e63abeac",
- "next_page_sha1": "0001abca87b025b7421af1f373127d113a6b4cba",
- "sha1_list": [
- "000000e468f936299bb9187535aa96d8db8e3962",
- "000000f892ff8066e0e801e53c2c309959fe34ca",
- "000001271c7236f5ddc9732a5aeec2127ca8855d",
- "0000014a076179bc98c54afc507ca13d29473715",
- "000001700c0d84071dc274a8bd8c58b93e921137",
- "0000031185694d6ea5119204dbb4a3388f8688ca",
- "0000032bf47e3fe80d81152b35fb18f4245e9568",
- "000003340e70a507e5f90a4b653082b6d4ed7c02",
- "00000357120e5c11cc244d1c5bd867b47522fb27",
- "000003cb5efc20bac3953df5261bc7488987a076",
- "000003e288a9f4931fa14fee2853ab774624d724",
- "0000042018062a913b1ed124dd73ba8f41f545c8",
- "000005bf7867d0c2e34e8933faa7db53e058b024",
- "000005cff15f1b56eb6ffa0061015fdf2a013b42",
- "000006ae8c452c3c2d50a471f5eb80fb00744914",
- "000006e55f1b311dce64f4f9246a21d96a7d6a23",
- "000007d039919c650898f73f8c678a1eb4ec5d2d"
]
}
}
}
TCA-0401: URI to Hash Search (paginated)
The URI to Hash Search API provides a list of all available SHA1 hashes associated with the requested URI. The following URI types are supported: email, URL, IPv4 address, domain. Only one URI can be submitted in one request. Sending requests using the GET method requires the SHA1 value of the URI string, while the POST method accepts the URI string value in plain text. Find more information in the official API documentation.
Authorizations:
path Parameters
hash required | string Next page hash value. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
header Parameters
Content-Type: required | string Enum: "application/json" "text/xml" Required parameter that defines the POST payload format. |
Request Body schema: application/jsonrequired
object | |||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "uri": "google.com",
- "next_page_sha1": "0514718b9f0eba3dac00"
}
}
}
Response samples
- 200
{- "rl": {
- "uri_index": {
- "query_uri": "c2208abde9668e8e9815c3690855edd1e63abeac",
- "next_page_sha1": "0001abca87b025b7421af1f373127d113a6b4cba",
- "sha1_list": [
- "000000e468f936299bb9187535aa96d8db8e3962",
- "000000f892ff8066e0e801e53c2c309959fe34ca",
- "000001271c7236f5ddc9732a5aeec2127ca8855d",
- "0000014a076179bc98c54afc507ca13d29473715",
- "000001700c0d84071dc274a8bd8c58b93e921137",
- "0000031185694d6ea5119204dbb4a3388f8688ca",
- "0000032bf47e3fe80d81152b35fb18f4245e9568",
- "000003340e70a507e5f90a4b653082b6d4ed7c02",
- "00000357120e5c11cc244d1c5bd867b47522fb27",
- "000003cb5efc20bac3953df5261bc7488987a076",
- "000003e288a9f4931fa14fee2853ab774624d724",
- "0000042018062a913b1ed124dd73ba8f41f545c8",
- "000005bf7867d0c2e34e8933faa7db53e058b024",
- "000005cff15f1b56eb6ffa0061015fdf2a013b42",
- "000006ae8c452c3c2d50a471f5eb80fb00744914",
- "000006e55f1b311dce64f4f9246a21d96a7d6a23",
- "000007d039919c650898f73f8c678a1eb4ec5d2d"
]
}
}
}
TCA-0401: URI to Hash Search
The URI to Hash Search service provides a list of all available SHA1 hashes associated with the requested URI. This service takes into account network IOCs extracted during file static analysis and uses that data to correlate URIs with samples. The following URI types are supported: email, URL, IPv4 address, and domain. Only one URI can be submitted in one request. Find more information in the official API documentation.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
header Parameters
Content-Type: required | string Enum: "application/json" "text/xml" Required parameter that defines the POST payload format. |
Request Body schema: application/jsonrequired
object | |||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "uri": "google.com",
- "next_page_sha1": "0514718b9f0eba3dac00"
}
}
}
Response samples
- 200
{- "rl": {
- "uri_index": {
- "query_uri": "c2208abde9668e8e9815c3690855edd1e63abeac",
- "next_page_sha1": "0001abca87b025b7421af1f373127d113a6b4cba",
- "sha1_list": [
- "000000e468f936299bb9187535aa96d8db8e3962",
- "000000f892ff8066e0e801e53c2c309959fe34ca",
- "000001271c7236f5ddc9732a5aeec2127ca8855d",
- "0000014a076179bc98c54afc507ca13d29473715",
- "000001700c0d84071dc274a8bd8c58b93e921137",
- "0000031185694d6ea5119204dbb4a3388f8688ca",
- "0000032bf47e3fe80d81152b35fb18f4245e9568",
- "000003340e70a507e5f90a4b653082b6d4ed7c02",
- "00000357120e5c11cc244d1c5bd867b47522fb27",
- "000003cb5efc20bac3953df5261bc7488987a076",
- "000003e288a9f4931fa14fee2853ab774624d724",
- "0000042018062a913b1ed124dd73ba8f41f545c8",
- "000005bf7867d0c2e34e8933faa7db53e058b024",
- "000005cff15f1b56eb6ffa0061015fdf2a013b42",
- "000006ae8c452c3c2d50a471f5eb80fb00744914",
- "000006e55f1b311dce64f4f9246a21d96a7d6a23",
- "000007d039919c650898f73f8c678a1eb4ec5d2d"
]
}
}
}
TCA-0401: URI to Hash Search (paginated)
The URI to Hash Search API provides a list of all available SHA1 hashes associated with the requested URI. The following URI types are supported: email, URL, IPv4 address, domain. Only one URI can be submitted in one request. Sending requests using the GET method requires the SHA1 value of the URI string, while the POST method accepts the URI string value in plain text.
Authorizations:
path Parameters
uri_sha1 required | string The SHA1 hash value of the URI string |
next_page_sha1 required | string Optional path parameter used for pagination. To get the next page of results from the API, use the |
query Parameters
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/uri_index/v1/query/c2208abde9668e8e9815c3690855edd1e63abeac?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "uri_index": {
- "query_uri": "c2208abde9668e8e9815c3690855edd1e63abeac",
- "next_page_sha1": "0001abca87b025b7421af1f373127d113a6b4cba",
- "sha1_list": [
- "000000e468f936299bb9187535aa96d8db8e3962",
- "000000f892ff8066e0e801e53c2c309959fe34ca",
- "000001271c7236f5ddc9732a5aeec2127ca8855d",
- "0000014a076179bc98c54afc507ca13d29473715",
- "000001700c0d84071dc274a8bd8c58b93e921137",
- "0000031185694d6ea5119204dbb4a3388f8688ca",
- "0000032bf47e3fe80d81152b35fb18f4245e9568",
- "000003340e70a507e5f90a4b653082b6d4ed7c02",
- "00000357120e5c11cc244d1c5bd867b47522fb27",
- "000003cb5efc20bac3953df5261bc7488987a076",
- "000003e288a9f4931fa14fee2853ab774624d724",
- "0000042018062a913b1ed124dd73ba8f41f545c8",
- "000005bf7867d0c2e34e8933faa7db53e058b024",
- "000005cff15f1b56eb6ffa0061015fdf2a013b42",
- "000006ae8c452c3c2d50a471f5eb80fb00744914",
- "000006e55f1b311dce64f4f9246a21d96a7d6a23",
- "000007d039919c650898f73f8c678a1eb4ec5d2d"
]
}
}
}
TCA-0402: URI Statistics
The URI Statistics API provides statistical information on how many known, malicious, and suspicious samples are associated with a particular URI. The following URI types are supported: email, URL, IPv4 address, domain. Only one URI can be submitted in one request. This service accepts only SHA1 values of URI strings. Requested URI strings cannot be in plain text. Find more information in the official API documentation.
Authorizations:
path Parameters
uri_sha1 required | string The SHA1 hash value of the URI string for which the user is requesting data from the service. The user should generate a SHA1 hash of the URI string prior to submitting a request. Supported URI types are: email (e.g., |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/uri/statistics/uri_state/sha1/234988566c9a0a9cf952cec82b143bf9c207ac16?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "uri_state": {
- "sha1": "234988566c9a0a9cf952cec82b143bf9c207ac16",
- "uri_type": "url",
- "counters": {
- "known": 379027,
- "malicious": 261038,
- "suspicious": 2538
}
}
}
}
TCA-0403: URL Threat Intelligence (report)
This service returns the report for the submitted URL. The report contains the ReversingLabs URL classification status, URL reputation from various reputation sources, metadata for performed URL analyses, statistics of files found on the submitted URL mapped to their classification, and an overview of the most common threats.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{
}
Response samples
- 200
{- "rl": {
- "classification": "malicious",
- "last_seen": "2020-07-18T18:02:34",
- "analysis": {
- "first_analysis": "2020-06-18T17:45:26",
- "analysis_count": 6,
- "last_analysis": {
- "analysis_id": "159509535435924b",
- "analysis_time": "2020-07-18T18:02:34",
- "availability_status": "offline",
- "domain": "microtechnology.hk"
}, - "statistics": {
- "known": 0,
- "unknown": 0,
- "suspicious": 0,
- "malicious": 10,
- "total": 10
}, - "analysis_history": [
- {
- "analysis_id": "159509535435924b",
- "analysis_time": "2020-07-18T18:02:34",
- "availability_status": "offline",
- "domain": "microtechnology.hk"
}, - {
- "analysis_id": "159310706659924b",
- "analysis_time": "2020-06-25T17:44:26",
- "availability_status": "offline",
- "domain": "microtechnology.hk"
}, - {
- "analysis_id": "159258872979924b",
- "analysis_time": "2020-06-19T17:45:29",
- "http_response_code": 200,
- "availability_status": "online",
- "domain": "microtechnology.hk",
- "serving_ip_address": "84.17.55.85"
}, - {
- "analysis_id": "159254551008924b",
- "analysis_time": "2020-06-19T05:45:10",
- "http_response_code": 200,
- "availability_status": "online",
- "domain": "microtechnology.hk",
- "serving_ip_address": "84.17.55.85"
}, - {
- "analysis_id": "159251669624924b",
- "analysis_time": "2020-06-18T21:44:56",
- "http_response_code": 200,
- "availability_status": "online",
- "domain": "microtechnology.hk",
- "serving_ip_address": "84.17.55.85"
}, - {
- "analysis_id": "159250213511924b",
- "analysis_time": "2020-06-18T17:45:26",
- "http_response_code": 200,
- "availability_status": "online",
- "domain": "microtechnology.hk",
- "serving_ip_address": "84.17.55.85"
}
], - "top_threats": [
- {
- "threat_name": "ByteCode-MSIL.Trojan.Kryptik",
- "threat_level": 5,
- "files_count": 9
}, - {
- "threat_name": "ByteCode-MSIL.Trojan.AgentTesla",
- "threat_level": 5,
- "files_count": 1
}
]
}, - "third_party_reputations": {
- "statistics": {
- "total": 11,
- "malicious": 0,
- "suspicious": 0,
- "clean": 0,
- "undetected": 11
}, - "sources": [
- {
- "source": "adminus_labs",
- "update_time": "2020-08-12T10:39:19",
- "detection": "undetected"
}, - {
- "source": "alien_vault",
- "update_time": "2020-08-12T02:27:20",
- "detection": "undetected"
}, - {
- "source": "comodo_valkyrie",
- "update_time": "2020-08-07T05:16:27",
- "detection": "undetected"
}, - {
- "source": "malsilo",
- "update_time": "2020-08-12T01:09:34",
- "detection": "undetected"
}, - {
- "source": "malwaredomainlist",
- "update_time": "2020-08-12T08:09:54",
- "detection": "undetected"
}, - {
- "source": "netstar",
- "update_time": "2020-08-12T11:45:15",
- "detection": "undetected"
}, - {
- "source": "openphish",
- "update_time": "2020-08-12T11:41:17",
- "detection": "undetected"
}, - {
- "source": "phishstats",
- "update_time": "2020-08-12T06:12:06",
- "detection": "undetected"
}, - {
- "source": "phishtank",
- "update_time": "2020-08-04T15:04:01",
- "detection": "undetected"
}, - {
- "source": "urlhaus",
- "update_time": "2020-08-12T01:58:54",
- "detection": "undetected"
}, - {
- "source": "vxvault",
- "update_time": "2020-08-12T06:34:43",
- "detection": "undetected"
}
]
}
}
}
TCA-0403: URL Threat Intelligence (downloaded files)
This service provides a list of hashes for files downloaded from the submitted URL, across all analyses, during the last analysis, or those downloaded during a specific analysis.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "analysis_id": "string",
- "last_analysis": false,
- "response_format": "json",
- "limit": 1000,
- "classification": "KNOWN",
- "extended": false
}
}
}
Response samples
- 200
{- "rl": {
- "requested_url": "string",
- "first_analysis": "string",
- "last_analysis": "string",
- "analysis_count": 0,
- "total_files_count": 0,
- "files": [
- {
- "sha1": "string",
- "first_download": "string",
- "last_download": "string",
- "classification": "string",
- "md5": "string",
- "sha256": "string",
- "sample_available": true,
- "first_seen": "string",
- "last_seen": "string",
- "sample_type": "string",
- "sample_size": 0
}
]
}
}
TCA-0403: URL Threat Intelligence (notifications) (time range)
This service provides a continuous list of completed analyses. The records enter the feed once the submitted URL is analyzed to completion and the report is ready.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string <Unix timestamp OR date-time> Accepts values formatted according to the format set in the time_format parameter. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | integer [ 1 .. 1000 ] Default: 1000 Example: limit=50 Specifies the maximum number of reports to return in the response. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/networking/url/v1/notifications/query/latest?limit=1' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "urls": [
- {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T08:57:44",
- "analysis_id": "15947161334231c0"
}, - {
- "availability_status": "online",
- "analysis_time": "2020-07-14T09:31:49",
- "analysis_id": null
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T10:43:05",
- "analysis_id": "1594722480864193"
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T13:00:29",
- "analysis_id": "15947316295131c0"
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T22:47:24",
- "analysis_id": "1594766844714193"
}
], - "next_page": "15874700660fc075d084e05839478b2f2e6056ec64b5f8ee48"
}
}
TCA-0403: URL Threat Intelligence (notifications) (time range) (paginated)
This service provides a continuous list of completed analyses. The records enter the feed once the submitted URL is analyzed to completion and the report is ready.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Accepts values formatted according to the format set in the time_format parameter. |
page required | string The pagination value for the next page is provided in the previous request response |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | integer [ 1 .. 1000 ] Default: 1000 Example: limit=50 Specifies the maximum number of reports to return in the response. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/networking/url/v1/notifications/query/latest?limit=1' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "urls": [
- {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T08:57:44",
- "analysis_id": "15947161334231c0"
}, - {
- "availability_status": "online",
- "analysis_time": "2020-07-14T09:31:49",
- "analysis_id": null
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T10:43:05",
- "analysis_id": "1594722480864193"
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T13:00:29",
- "analysis_id": "15947316295131c0"
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T22:47:24",
- "analysis_id": "1594766844714193"
}
], - "next_page": "15874700660fc075d084e05839478b2f2e6056ec64b5f8ee48"
}
}
TCA-0403: URL Threat Intelligence (notifications) (latest)
This service provides a continuous list of completed analyses. The records enter the feed once the submitted URL is analyzed to completion and the report is ready.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | integer [ 1 .. 1000 ] Default: 1000 Example: limit=50 Specifies the maximum number of reports to return in the response. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/networking/url/v1/notifications/query/latest?limit=1' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "urls": [
- {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T08:57:44",
- "analysis_id": "15947161334231c0"
}, - {
- "availability_status": "online",
- "analysis_time": "2020-07-14T09:31:49",
- "analysis_id": null
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T10:43:05",
- "analysis_id": "1594722480864193"
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T13:00:29",
- "analysis_id": "15947316295131c0"
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T22:47:24",
- "analysis_id": "1594766844714193"
}
], - "next_page": "15874700660fc075d084e05839478b2f2e6056ec64b5f8ee48"
}
}
TCA-0403: URL Threat Intelligence (notifications) (latest) (paginated)
This service provides a continuous list of completed analyses. The records enter the feed once the submitted URL is analyzed to completion and the report is ready.
Authorizations:
path Parameters
page required | string |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | integer [ 1 .. 1000 ] Default: 1000 Example: limit=50 Specifies the maximum number of reports to return in the response. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/networking/url/v1/notifications/query/latest?limit=1' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "urls": [
- {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T08:57:44",
- "analysis_id": "15947161334231c0"
}, - {
- "availability_status": "online",
- "analysis_time": "2020-07-14T09:31:49",
- "analysis_id": null
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T10:43:05",
- "analysis_id": "1594722480864193"
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T13:00:29",
- "analysis_id": "15947316295131c0"
}, - {
- "availability_status": "offline",
- "analysis_time": "2020-07-14T22:47:24",
- "analysis_id": "1594766844714193"
}
], - "next_page": "15874700660fc075d084e05839478b2f2e6056ec64b5f8ee48"
}
}
TCA-0404: Analyze URL
This service allows users to submit a URL for analysis. The analysis is a crawling process that will start looking for files to download from the submitted URL. When downloaded, the files are sent for analysis to the ReversingLabs file processing pipeline.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST body format. |
header Parameters
Content-Type required | string Value: "application/octet-stream" Required parameter that defines the POST payload format. |
Request Body schema: application/jsonrequired
object | |||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{
}
Response samples
- 200
{- "rl": {
- "status": "started",
- "analysis_id": "159134594237612a"
}
}
TCA-0405 Domain Threat Intelligence (resolutions)
This service provides a list of domain-to-IP mappings for the requested domain.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "domain": "string",
- "limit": 1000,
- "response_format": "json"
}
}
}
Response samples
- 200
{- "rl": {
- "requested_domain": "string",
- "resolutions": "field",
- "next_page": "string"
}
}
TCA-0405 Domain Threat Intelligence (URLs)
This service provides a list of URLs associated with the requested domain.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "domain": "string",
- "response_format": "string",
- "limit": 0
}
}
}
Response samples
- 200
{- "rl": {
- "requested_domain": "string",
- "urls": "field",
- "next_page": "string"
}
}
TCA-0405 Domain Threat Intelligence (report)
This service returns threat intelligence data for the submitted domain. The report contains domain reputation from various reputation sources, classification statistics for files downloaded from the domain, the most common threats found on the domain DNS information about the domain, and parent domain information.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "domain": "string",
- "response_format": "json"
}
}
}
Response samples
- 200
{- "rl": {
- "last_dns_records": "",
- "third_party_reputations": {
- "item": {
- "sources": [
- {
- "detection": "malicious",
- "source": "phishing_database",
- "update_time": "2023-01-09T02:30:34",
- "detect_time": "2022-10-12T08:30:56",
- "categories": "phishing"
}, - {
- "detection": "undetected",
- "source": "0xSI_f33d",
- "update_time": "2023-01-09T06:21:01"
}, - {
- "detection": "undetected",
- "source": "cyradar",
- "update_time": "2023-01-09T06:45:40"
}, - {
- "detection": "malicious",
- "source": "adminus_labs",
- "update_time": "2023-01-09T09:02:20",
- "detect_time": "2023-01-09T03:34:34"
}, - {
- "detection": "undetected",
- "source": "apwg",
- "update_time": "2023-01-09T04:26:46"
}, - {
- "detection": "undetected",
- "source": "netstar",
- "update_time": "2023-01-09T09:25:41"
}, - {
- "detection": "undetected",
- "source": "threatfox_abuse_ch",
- "update_time": "2023-01-09T08:20:42"
}, - {
- "detection": "undetected",
- "source": "botvrij",
- "update_time": "2023-01-09T02:24:58"
}, - {
- "detection": "undetected",
- "source": "alphamountain",
- "update_time": "2023-01-09T06:51:55"
}, - {
- "detection": "undetected",
- "source": "comodo_valkyrie",
- "update_time": "2023-01-09T05:53:00"
}, - {
- "detection": "undetected",
- "source": "web_security_guard",
- "update_time": "2022-01-21T06:56:15"
}, - {
- "detection": "undetected",
- "source": "osint",
- "update_time": "2023-01-09T01:30:43"
}, - {
- "detection": "malicious",
- "source": "crdf",
- "update_time": "2023-01-09T08:41:06",
- "detect_time": "2022-11-11T07:28:22"
}
], - "statistics": {
- "total": 13,
- "malicious": 3,
- "undetected": 10,
- "clean": 0
}
}
}, - "top_threats": {
- "item": [
- {
- "threat_name": "Script-JS.Trojan.Cryxos",
- "threat_level": 5,
- "files_count": 2
}, - {
- "threat_name": "Script-JS.Phishing.Generic",
- "threat_level": 5,
- "files_count": 1
}
]
}, - "last_seen": {
- "item": "2023-01-09T09:25:41"
}, - "modified_time": {
- "item": "2023-01-09T09:25:41"
}, - "downloaded_files_statistics": {
- "item": {
- "known": 19,
- "unknown": 0,
- "suspicious": 0,
- "total": 22,
- "malicious": 3
}
}, - "parent_domain": {
- "item": "selcdn.ru"
}, - "requested_domain": {
- "item": "530908.selcdn.ru"
}
}
}
TCA-0405 Domain Threat Intelligence (downloaded files)
This service provides a list of hashes for files downloaded from the submitted domain.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "domain": "string",
- "limit": 0,
- "extended": true,
- "classification": "string",
- "response_format": "string"
}
}
}
Response samples
- 200
{- "rl": {
- "requested_domain": "string",
- "downloaded_files": {
- "last_download_url": "string",
- "classification": "string",
- "md5": "string",
- "sha1": "string",
- "sha256": "string",
- "first_download": "string",
- "last_download": "string",
- "sample_available": "bool",
- "trust_factor": "number",
- "threat_level": "number",
- "threat_name": "string",
- "malware_family": "string",
- "malware_type": "string",
- "platform": "string",
- "subplatform": "string",
- "sample_type": "string",
- "sample_size": "number",
- "first_seen": "string",
- "last_seen": "string"
}
}
}
TCA-0406 IP Threat Intelligence (resolutions)
This service provides a list of IP-to-domain mappings for the specified IP.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "ip": "string",
- "limit": 1000,
- "response_format": "json"
}
}
}
Response samples
- 200
{- "rl": {
- "requested_ip": "string",
- "resolutions": "field",
- "next_page": "string"
}
}
TCA-0406 IP Threat Intelligence (URLs)
This service provides a list of URLs associated with the requested IP. Find more information in the official API documentation.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "ip": "string",
- "limit": 1000,
- "response_format": "json"
}
}
}
Response samples
- 200
{- "rl": {
- "requested_ip": "string",
- "urls": "field",
- "next_page": "string"
}
}
TCA-0406 IP Threat Intelligence (report)
This service returns threat intelligence data for the submitted IP. The report contains IP reputation from various reputation sources, classification statistics for files downloaded from the IP, and the top threats hosted on the submitted IP.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "ip": "string",
- "response_format": "json"
}
}
}
Response samples
- 200
{- "rl": {
- "requested_ip": "104.19.138.57",
- "third_party_reputations": {
- "statistics": {
- "total": 2,
- "malicious": 1,
- "clean": 0,
- "undetected": 1
}, - "sources": [
- {
- "source": "adminus_labs",
- "update_time": "2020-07-21T04:00:49",
- "detect_time": "2020-07-21T05:00:00",
- "detection": "malicious",
- "categories": "phishing"
}, - {
- "source": "alien_vault",
- "update_time": "2020-07-27T02:32:23",
- "detect_time": "2020-07-27T02:32:23",
- "categories": "search_engines_and_portals",
- "detection": "undetected"
}
]
}, - "downloaded_files_statistics": {
- "suspicious": 0,
- "unknown": 0,
- "known": 1,
- "malicious": 0,
- "total": 1
}, - "top_threats": [
- {
- "threat_name": "Document-HTML.Trojan.Microsoft",
- "threat_level": 5,
- "files_count": 1
}
], - "last_seen": "2020-07-08T12:00:00",
- "modified_time": "2020-07-08T12:00:00"
}
}
TCA-0406 IP Threat Intelligence (downloaded files)
This service provides a list of hashes for files downloaded from the submitted IP address.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
required | object | ||||||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "ip": "string",
- "limit": 1000,
- "response_format": "json",
- "classification": "KNOWN",
- "extended": false
}
}
}
Response samples
- 200
{- "rl": {
- "requested_ip": "string",
- "downloaded_files": {
- "last_download_url": "string",
- "classification": "string",
- "md5": "string",
- "sha1": "string",
- "sha256": "string",
- "first_download": "string",
- "last_download": "string",
- "sample_available": "bool",
- "trust_factor": "number",
- "threat_level": "number",
- "threat_name": "string",
- "malware_family": "string",
- "malware_type": "string",
- "platform": "string",
- "subplatform": "string",
- "sample_type": "string",
- "sample_size": "number",
- "first_seen": "string",
- "last_seen": "string"
}
}
}
TCA-0407: Network Reputation API
The Network Reputation service provides information regarding the reputation of a requested URL, domain, or IP address. When a URL is submitted, the service provides its ReversingLabs classification, along with an overview of detections from our partners. It also includes the category of the URL (for example phishing, gambling, adult content) and indicates whether we have encountered any malware samples associated with the submitted URL.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/json
object | |||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "network_locations": [
- {
- "network_location": "string",
- "type": "url"
}
], - "response_format": "json"
}
}
}
Response samples
- 200
{- "rl": {
- "entries": [
- {
- "type": "url",
- "first_seen": "2023-06-26T13:45:01",
- "last_seen": "2023-06-26T13:45:01",
- "classification": "malicious",
- "reason": "third_party_reputation",
- "third_party_reputations": {
- "total": 20,
- "malicious": 1,
- "clean": 0,
- "undetected": 19
}, - "categories": [
- "phishing"
], - "associated_malware": false
}, - {
- "type": "ip",
- "requested_network_location": "92.123.37.9",
- "first_seen": "2023-06-30T13:13:06",
- "last_seen": "2023-06-28T22:07:57",
- "third_party_reputations": {
- "total": 7,
- "malicious": 7,
- "clean": 0,
- "undetected": 0
}, - "associated_malware": false
}, - {
- "type": "domain",
- "requested_network_location": "shamrocksuppliersummit.com",
- "first_seen": "2023-05-29T16:54:40",
- "last_seen": "2023-06-30T08:07:32",
- "third_party_reputations": {
- "total": 13,
- "malicious": 2,
- "clean": 11,
- "undetected": 0
}, - "associated_malware": true
}, - {
- "type": "url",
- "first_seen": "2023-06-05T12:26:09",
- "last_seen": "2023-06-26T07:57:06",
- "classification": "malicious",
- "reason": "file_reputation",
- "third_party_reputations": {
- "total": 20,
- "malicious": 0,
- "clean": 0,
- "undetected": 0
}, - "associated_malware": true
}, - {
- "type": "url",
- "first_seen": "2022-12-09T07:25:38",
- "last_seen": "2023-06-30T12:14:17",
- "classification": "known",
- "reason": "whitelist",
- "third_party_reputations": {
- "total": 20,
- "malicious": 1,
- "clean": 0,
- "undetected": 19
}, - "associated_malware": false
}
]
}
}
TCA-0408: Network Reputation User Override
The Network Reputation User Override service enables URL classification overrides. Any URL can be overridden to malicious, suspicious, or known. Overrides are visible to all users within the same organization. The service also supports listing existing overrides.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
object | |||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "user_override": {
- "override_network_locations": [
- {
- "network_location": "string",
- "type": "url",
- "classification": "malicious",
- "TTL": "string",
- "threat_level": "string",
- "categories": [
- "string"
]
}
]
}
}, - "response_format": "json"
}
}
Response samples
- 200
{- "rl": {
- "user_override": {
- "created_overrides": [
- {
- "network_location": "string",
- "type": "url",
- "classification": "malicious",
- "TTL": "string",
- "threat_level": "string",
- "categories": [
- "string"
]
}
]
}
}
}
TCA-0408: List User Overrides
The Network Reputation User Override service enables URL classification overrides. Any URL can be overridden to malicious, suspicious, or known. Overrides are visible to all users within the same organization. The service also supports listing existing overrides.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
next_network_location | string <sha1> Optional parameter used for pagination. To get the next page of results from the API, use the |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/networking/user_override/v1/query/list_overrides?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "user_override": {
- "network_locations": [
], - "next_network_location": "9865c7ecda437034e1513cc43ae9a1f6f334bb7f"
}
}
}
TCA-0201: File Download Request
The External Sample Exchange Service allows users to download files from ReversingLabs Spectra Intelligence. This query returns the contents of a file matching the requested hash. The contents are returned as a byte stream. Only one file can be downloaded per request.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/spex/download/v2/query/sha1/a45ab18fb7a06dd5ecb44bf6c221a951f974059f' --user <username>:<password>
TCA-0201: File Download Status Request
The External Sample Exchange Service allows users to download files from ReversingLabs Spectra Intelligence. This query returns the file size of samples matching the requested hash values, but only if they are available for download. If the requested samples are not available for download, their size is represented as -1
in the response. Up to 1000 hashes can be submitted in one download status request.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl -X POST --url 'https://data.reversinglabs.com/api/spex/download/v2/status/bulk_query/json' --header 'Content-Type: application/json' --data '{ "rl": { "query": { "hash_type": "sha1", "hashes": [ "a7afddb68260a60f86c02a021efba7f216c2e7cf", "ca03064987d3c4465f91552ba8b6a883eecfd3e5", "b363713a938afcd3c74603827fab79e935b2b09b" ] } } }' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "unknown_hashes": [
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5"
], - "invalid_hashes": [
- "example_of_a_wrong_hash"
], - "entries": [
- {
- "sha1": "b363713a938afcd3c74603827fab79e935b2b09b",
- "size": 6
}, - {
- "sha1": "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "size": 4
}
]
}
}
TCA-0202/0203: File Upload Request
The External Sample Exchange Service allows users to upload files to Spectra Intelligence. This query uploads the file contents using a byte stream and the SHA1 hash of the file provided in the request. The file metadata must be uploaded after the file contents in a separate request for file processing to occur. Depending on the user's Spectra Intelligence account configuration, files are uploaded as public (sent to TCA-0202), or private (sent to TCA-0203).
Authorizations:
path Parameters
hash_value required | string Must be a valid SHA1 hash of the uploaded file. |
Request Body schema: application/octet-streamrequired
Responses
Request samples
- bash
- Python
curl --request POST 'https://data.reversinglabs.com/api/spex/upload/3715b867a6ce91aec3ce21d3703c68f80cf1cbc6' --data-binary @example_file.tar.gz --user <username>:<password>
TCA-0202/0203: File Metadata Upload Request
The External Sample Exchange Service allows users to upload files from ReversingLabs Spectra Intelligence. This query uploads the metadata of the file that matches the SHA1 hash provided in the request. Metadata must be provided in the XML format. The file metadata must be uploaded after the file contents in a separate request for file processing to occur. Depending on the user's Spectra Intelligence account configuration, files are uploaded as public (sent to TCA-0202), or private (sent to TCA-0203).
Authorizations:
path Parameters
hash_value required | string Must be a valid SHA1 hash of a previously uploaded file. |
query Parameters
subscribe | string Value: "data_change" Optional parameter. If set, adds the file to the user's data_change feed subscription list. |
Request Body schema: application/octet-streamrequired
Metadata must be provided in the XML format, while the request for the metadata must be sent using the Content-Type: application/octet-stream
header.
Metadata must contain the domain
field and at least one property
field. When submitting an archive for upload, it is recommended to include the archive
object when uploading sample metadata. If not included, the sample will be processed as a regular sample and not as an archive, therefore it is possible that the content of the zip will not be processed completely.
The domain name should represent the web domain where the sample was found/downloaded. If the domain name is not known, the domain name should be set to an empty string.
The property_name
and property_value
can be any kind of string. They can represent some properties of the sample, such as its application name, version, file name of the sample, or tags.
The archive_type
specifies the compression algorithm used to create the archive, and is a mandatory field if the archive
field is provided. The archive_password
is the password used to extract the content, and is optional.
object | |||||||
|
Responses
Request samples
- Payload
- bash
- Python
<rl> <properties> <property> <name>application</name> <value>TestApplication</value> </property> <property> <name>author</name> <value>Test_Author</value> </property> </properties> <domain>testdomain.com</domain> <archive> <archive_type>zip</archive_type> <archive_password>password123</archive_password> </archive> </rl>
TCA-0204: Delete File Single Query
The Delete File API provides the functionality of deleting files submitted and owned exclusively by the user sending the request. This query allows the user to delete a single file.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
delete_on | string Example: delete_on=1437464369 Optional parameter that specifies when the file will be deleted, allowing users to schedule file removal for a specific time. Expressed as a Unix timestamp in seconds. |
Responses
Request samples
- bash
- Python
curl --request DELETE --url 'https://data.reversinglabs.com/api/delete/sample/v1/query/sha1/bc7a6c7bba614456412fcd11d870f207be1bf6a5' --user <username>:<password>
TCA-0204: Delete File Bulk Query
The Delete File API provides the functionality of deleting files submitted and owned exclusively by the user sending the request. Up to 100 hashes can be submitted in one request.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "forbidden_hashes": [
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "a7afddb68260a60f86c02a021efba7f216c2e7cf"
], - "unknown_hashes": [
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5"
], - "invalid_hashes": [
- "example_of_a_wrong_hash"
]
}
}
TCA-0205: Re-Analyze File Single Query
The Rescan API allows users to submit files for re-analysis in the ReversingLabs Spectra Intelligence system. Re-analysis includes all components of the ReversingLabs Classification Algorithm: Spectra Intelligence antivirus scan results, threat and trust factors, parent/child relationships, certificates, and other metadata-specific information.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/rescan/v1/query/sha1/289512144b8b4e9e25e7a7d6250da24cda02eee0' --user <username>:<password>
TCA-0205: Re-Analyze File Bulk Query
The Rescan API allows users to submit files for (re)analysis in the ReversingLabs Spectra Intelligence system. Up to 100 hashes can be submitted in one request. Re-analysis includes all components of the ReversingLabs Classification Algorithm: Spectra Intelligence antivirus scan results, threat and trust factors, parent/child relationships, certificates, and other metadata-specific information.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "sent_for_rescan": [
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "a7afddb68260a60f86c02a021efba7f216c2e7cf"
], - "sample_unavailable": [
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5"
], - "invalid_hashes": [
- "example_of_a_wrong_hash"
]
}
}
TCA-0206: Alert Subscribe Query
This query is used for subscribing to a list of samples and URLs for which the changed sections (if there are any) will be delivered in the Data Change Feed. To subscribe to a list of samples or URLs, the user should submit the sample or URL hashes in a POST request. All hashes in a request should be of the same type. The maximum amount of hashes that can be submitted in one request is 100.
Subscriptions never expire on their own. Users need to manually unsubscribe using the TCA-0206 Unsubscribe Query. Note: Samples or URLs that have not yet been seen can be subscribed to only using SHA1 hash values.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "subscription_data_change": {
- "invalid_hashes": [
- "example_of_a_wrong_hash"
], - "subscribed": [
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "a7afddb68260a60f86c02a021efba7f216c2e7cf"
], - "hash_type": "sha1"
}
}
}
TCA-0206: Alert Unsubscribe Query
This query is used for unsubscribing from a list of samples that the user was previously subscribed to. Submitting a sample hash in a POST request to this endpoint removes the associated sample from the list of user's subscriptions.
The maximum amount of hashes that can be submitted in one request is 100. Changes for unsubscribed samples will no longer be delivered in the Data Change Feed.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "subscription_data_change": {
- "invalid_hashes": [
- "example_of_a_wrong_hash"
], - "unsubscribed": [
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "a7afddb68260a60f86c02a021efba7f216c2e7cf"
], - "hash_type": "sha1"
}
}
}
TCA-0206: Data Change Feed Start Query
This query sets the starting timestamp for TCA-0206 Data Change Feed Pull Query.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter; accepts these options: timestamp, utc. timestamp is the number of seconds since 1970-01-01 00:00:00. utc is the date and time in format YYYY-MM-DDThh:mm:ss |
time_value required | string Required parameter; Accepts values defined by the time_format parameter |
Responses
Request samples
- bash
- Python
curl --request PUT --url 'https://data.reversinglabs.com/api/feed/data_change/v3/start/timestamp/1640991600' --user <username>:<password>
TCA-0206: Data Change Feed Pull Query
This query returns the next recordset with samples and URLs to which the user is subscribed. The starting point for this query is defined using the TCA-0206 Start Query.
If the user has not previously requested this query or called the START query, it will return records starting with the current timestamp. Every subsequent call will continue from the timestamp where the previous call ended.
Unless the limit parameter is specified, the query returns a maximum of 1000 records, or a little bit more than 1000 if there are records with the same timestamp. This ensures that all the records with the same timestamp will be included in the recordset. The limit parameter must not be greater than 1000.
This endpoint is built to be queried by a single thread (single instance). Any concurrent requests will be blocked until the previous one is fulfilled.
Authorizations:
query Parameters
events | string Default: "default" Enum: "default" "sections" Optional parameter that accepts a list of sections that should be included in the response, delimited by commas. Supported values: default - all events will be included in the response; sections - include info, sources, xref, analysis, sample_available, malware_presence, sample_became_shareable, dynamic_analysis |
format | string Default: "xml" Enum: "xml" "json" "tsv" Optional parameter; Specifies the response format. Supported values: xml (default), json, tsv (Tab Separated Values, delimiter character \t 0x09) |
limit | integer [ 1 .. 1000 ] Default: 1000 Optional parameter; Specifies the number of records to return in the response. The maximum value is 1000. Note that the response may include a little more than the requested number of records to ensure that all the records with the same timestamp are returned. |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{- "rl": {
- "data_change_feed": {
- "entries": [
- {
- "record_on": "2022-04-13T18:07:14",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "malware_presence"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:07:14",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "xref"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:09:14",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "malware_presence"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:09:14",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "xref"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:11:45",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "malware_presence"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:11:45",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "xref"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:15:15",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "malware_presence"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:15:15",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "xref"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:18:16",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "malware_presence"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}, - {
- "record_on": "2022-04-13T18:18:16",
- "sha1": "47b15748ecc8e952c5935170090db7c269ce4b4f",
- "updated_sections": [
- "xref"
], - "sha256": "66b5ebd1b0fc73f041ba669ce2184f6f471d5e3524efa34ca31233e9f5395262",
- "md5": "0cd8c971317d19bbed44757809bcb92b"
}
], - "last_timestamp": 1649873896,
- "time_range": {
- "to": "2022-04-13T18:18:16",
- "from": "2022-04-13T18:03:14"
}
}
}
}
TCA-0206: Data Change Continuous Feed Query
This query returns a recordset with samples and URLs that the user is subscribed to from the requested timestamp onwards. The feed will return 1000 records at most, or a little bit more than 1000 if there are some records with the same timestamp. The response also contains the latest timestamp up to which the events are included in the response.
To fetch the next recordset, use the the last_timestamp value from the response, increase it by 1 and submit it in a new request.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter; accepts these options: timestamp, utc. timestamp is the number of seconds since 1970-01-01 00:00:00. utc is the date and time in format YYYY-MM-DDThh:mm:ss |
time_value required | string Required parameter; Accepts values defined by the time_format parameter |
query Parameters
events | string Default: "default" Enum: "default" "sections" Optional parameter that accepts a list of sections that should be included in the response, delimited by commas. Supported values: default - all events will be included in the response; sections - include info, sources, xref, analysis, sample_available, malware_presence, sample_became_shareable, dynamic_analysis |
format | string Default: "xml" Enum: "xml" "json" "tsv" Optional parameter; Specifies the response format. Supported values: xml (default), json, tsv (Tab Separated Values, delimiter character \t 0x09) |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/feed/data_change/v3/query/utc/2022-01-01T13:00:00?format=json&events=xref' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "type": "object",
- "properties": {
- "data_change_feed": {
- "type": "object",
- "properties": {
- "time_range": {
- "type": "object",
- "properties": {
- "from": {
- "type": "string"
}, - "to": {
- "type": "string"
}
}
}, - "entries": {
- "type": "array",
- "items": {
- "type": "object",
- "properties": {
- "sha1": {
- "type": "string"
}, - "record_on": {
- "type": "string"
}, - "updated_sections": {
- "type": "array",
- "items": {
- "type": "string"
}
}
}
}
}, - "last_timestamp": {
- "type": "string"
}
}
}
}
}
}
Detonate files in ReversingLabs Cloud Sandbox and retrieve reports
TCA-0106: Dynamic Analysis Report
The File and URL Dynamic Analysis Report service allows users to retrieve dynamic analysis reports for files and URLs executed in the cloud sandbox. Find more information in the official API documentation.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
artifacts_url | string Value: true Optional parameter that includes artifact links for specific reports in the history part of the merged report. Supported values: True. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/dynamic/analysis/report/v1/query/sha1/cac61424fb5414d589687bfd35452a351604ef11?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "report": {
- "network": {
- "udp": [
- {
- "destination_port": 53,
- "destination_ip": "8.8.8.8"
}
], - "dns": [
- {
- "type": "A (IP address)",
- "value": "time.windows.com",
- "address": "20.101.57.9"
}
]
}, - "mitre_attack": {
- "matrix_list": [
- {
- "tactics": {
- "tactic_list": [
- {
- "id": "5",
- "name": "Defense Evasion",
- "techniques": {
- "technique_list": [
- {
- "id": "T1055",
- "name": "Process Injection"
}
]
}
}, - {
- "id": "7",
- "name": "Discovery",
- "techniques": {
- "technique_list": [
- {
- "id": "T1057",
- "name": "Process Discovery"
}
]
}
}, - {
- "id": "11",
- "name": "Command and Control",
- "techniques": {
- "technique_list": [
- {
- "id": "T1095",
- "name": "Non-Application Layer Protocol"
}, - {
- "id": "T1071",
- "name": "Application Layer Protocol"
}
]
}
}
]
}, - "name": "Enterprise"
}
]
}, - "process_tree": [
- {
- "process_id": 6132,
- "name": "rl_file.exe",
- "parameters": "'C:\\Users\\user\\Desktop\\rl_file.exe' ",
- "parent_process_id": 6532
}
], - "sha1": "18f7133989926a6f9587f07d3f210b92c43d01fd",
- "analysis_id": "6485acc9-266a-4937-aebd-1278686a6604",
- "classification": "MALICIOUS",
- "dropped_files": [
- {
- "sha1": "424BD472B11FE9C3DD07BE2DC7D16EA51B0B3855",
- "classification": "UNKNOWN",
- "file_name": "$Recycle.Bin .exe",
- "sample_type": "data",
- "sha256": "58FBB3ACD355647B5B4031DAF98872B43FA7CD5389FC44F486CB3D3227277DBD",
- "file_path": "C:",
- "md5": "A46E8D86C2B3E4FF6FB4353EC8840FEC"
}
], - "optional_parameters": "internet_simulation=true, geolocation=us, locale=en-US",
- "snort_alerts": [
- {
- "message": "ICMP Echo Reply",
- "classification_type": "Misc activity",
- "destination_ip": "192.168.2.187",
- "rule": 408
}, - {
- "destination_port": 80,
- "message": "WEB-MISC /doc/ access",
- "classification_type": "access to a potentially vulnerable web application",
- "destination_ip": "195.176.255.80",
- "rule": 1560
}, - {
- "message": "ICMP PING",
- "classification_type": "Misc activity",
- "destination_ip": "23.54.112.217",
- "rule": 384
}, - {
- "destination_port": 80,
- "message": "COMMUNITY WEB-MISC mod_jrun overflow attempt",
- "classification_type": "Web Application Attack",
- "destination_ip": "20.86.173.234",
- "rule": 100000122
}, - {
- "message": "ICMP Destination Unreachable Communication with Destination Host is Administratively Prohibited",
- "classification_type": "Misc activity",
- "destination_ip": "192.168.2.187",
- "rule": 486
}, - {
- "destination_port": 80,
- "message": "COMMUNITY WEB-MISC mod_jrun overflow attempt",
- "classification_type": "Web Application Attack",
- "destination_ip": "23.79.157.152",
- "rule": 100000122
}, - {
- "destination_port": 80,
- "message": "WEB-MISC Lotus Notes .exe script source download attempt",
- "classification_type": "Web Application Attack",
- "destination_ip": "195.176.255.80",
- "rule": 2067
}
], - "analysis_duration": 226,
- "platform": "windows10",
- "configuration": "MS Office 2007;Java 8;Adobe Reader 2020;Firefox 62;Google Chrome 69;Microsoft Edge 42;Internet Explorer 11",
- "sample_name": "Sample",
- "sample_path": "C:\\Users\\user\\Desktop",
- "behavioral": [
- {
- "process": {
- "name": "rl_file.exe",
- "parameters": "'C:\\Users\\user\\Desktop\\rl_file.exe' "
}
}
], - "sha256": "2b6d8d2baa5be6cd5254d941d9d8556651f6e339063a70a1d094e6d6861ae87e",
- "md5": "dc5c985fdb1d1a4239377bed7ac1f62d",
- "analysis_time": "2021-12-16T11:32:50",
- "yara": {
- "entries": [
- {
- "source_type": "sample",
- "rule": [
- {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA==",
- "matched_offset": 45520
}
]
}
]
}, - {
- "source_type": "dropped_file",
- "source_name": "C:\\\\ProgramData\\\\d0db02bh22.exe",
- "rule": {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADcMQEApbYBZgAyAgAxg8GcTThakA==",
- "matched_offset": 45520
}, - {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA==",
- "matched_offset": 123848
}
]
}
}, - {
- "source_type": "memory_dump",
- "source_name": "d0db02bh22.exe",
- "rule": {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA=="
}, - {
- "matched_offset": 3735928559
}
]
}
}
]
}
}, - "requested_hash": "18f7133989926a6f9587f07d3f210b92c43d01fd"
}
}
TCA-0106: File/URL Dynamic Analysis Report (specific report)
The File and URL Dynamic Analysis Report service allows users to retrieve dynamic analysis reports for files and URLs executed in the cloud sandbox. Find more information in the official API documentation.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
required | string or string If added at the end of the request, the response will contain either the latest dynamic analysis report, or the report matching the provided analysis_id. These two parameters are mutually exclusive. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/dynamic/analysis/report/v1/query/sha1/cac61424fb5414d589687bfd35452a351604ef11/latest?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "report": {
- "network": {
- "udp": [
- {
- "destination_port": 53,
- "destination_ip": "8.8.8.8"
}
], - "dns": [
- {
- "type": "A (IP address)",
- "value": "time.windows.com",
- "address": "20.101.57.9"
}
]
}, - "mitre_attack": {
- "matrix_list": [
- {
- "tactics": {
- "tactic_list": [
- {
- "id": "5",
- "name": "Defense Evasion",
- "techniques": {
- "technique_list": [
- {
- "id": "T1055",
- "name": "Process Injection"
}
]
}
}, - {
- "id": "7",
- "name": "Discovery",
- "techniques": {
- "technique_list": [
- {
- "id": "T1057",
- "name": "Process Discovery"
}
]
}
}, - {
- "id": "11",
- "name": "Command and Control",
- "techniques": {
- "technique_list": [
- {
- "id": "T1095",
- "name": "Non-Application Layer Protocol"
}, - {
- "id": "T1071",
- "name": "Application Layer Protocol"
}
]
}
}
]
}, - "name": "Enterprise"
}
]
}, - "process_tree": [
- {
- "process_id": 6132,
- "name": "rl_file.exe",
- "parameters": "'C:\\Users\\user\\Desktop\\rl_file.exe' ",
- "parent_process_id": 6532
}
], - "sha1": "18f7133989926a6f9587f07d3f210b92c43d01fd",
- "analysis_id": "6485acc9-266a-4937-aebd-1278686a6604",
- "classification": "MALICIOUS",
- "dropped_files": [
- {
- "sha1": "424BD472B11FE9C3DD07BE2DC7D16EA51B0B3855",
- "classification": "UNKNOWN",
- "file_name": "$Recycle.Bin .exe",
- "sample_type": "data",
- "sha256": "58FBB3ACD355647B5B4031DAF98872B43FA7CD5389FC44F486CB3D3227277DBD",
- "file_path": "C:",
- "md5": "A46E8D86C2B3E4FF6FB4353EC8840FEC"
}
], - "optional_parameters": "internet_simulation=true, geolocation=us, locale=en-US",
- "snort_alerts": [
- {
- "message": "ICMP Echo Reply",
- "classification_type": "Misc activity",
- "destination_ip": "192.168.2.187",
- "rule": 408
}, - {
- "destination_port": 80,
- "message": "WEB-MISC /doc/ access",
- "classification_type": "access to a potentially vulnerable web application",
- "destination_ip": "195.176.255.80",
- "rule": 1560
}, - {
- "message": "ICMP PING",
- "classification_type": "Misc activity",
- "destination_ip": "23.54.112.217",
- "rule": 384
}, - {
- "destination_port": 80,
- "message": "COMMUNITY WEB-MISC mod_jrun overflow attempt",
- "classification_type": "Web Application Attack",
- "destination_ip": "20.86.173.234",
- "rule": 100000122
}, - {
- "message": "ICMP Destination Unreachable Communication with Destination Host is Administratively Prohibited",
- "classification_type": "Misc activity",
- "destination_ip": "192.168.2.187",
- "rule": 486
}, - {
- "destination_port": 80,
- "message": "COMMUNITY WEB-MISC mod_jrun overflow attempt",
- "classification_type": "Web Application Attack",
- "destination_ip": "23.79.157.152",
- "rule": 100000122
}, - {
- "destination_port": 80,
- "message": "WEB-MISC Lotus Notes .exe script source download attempt",
- "classification_type": "Web Application Attack",
- "destination_ip": "195.176.255.80",
- "rule": 2067
}
], - "analysis_duration": 226,
- "platform": "windows10",
- "configuration": "MS Office 2007;Java 8;Adobe Reader 2020;Firefox 62;Google Chrome 69;Microsoft Edge 42;Internet Explorer 11",
- "sample_name": "Sample",
- "sample_path": "C:\\Users\\user\\Desktop",
- "behavioral": [
- {
- "process": {
- "name": "rl_file.exe",
- "parameters": "'C:\\Users\\user\\Desktop\\rl_file.exe' "
}
}
], - "sha256": "2b6d8d2baa5be6cd5254d941d9d8556651f6e339063a70a1d094e6d6861ae87e",
- "md5": "dc5c985fdb1d1a4239377bed7ac1f62d",
- "analysis_time": "2021-12-16T11:32:50"
}, - "requested_hash": "18f7133989926a6f9587f07d3f210b92c43d01fd"
}
}
TCA-0106: URL Dynamic Analysis Report (BASE64)
The URL Dynamic Analysis Report (BASE64) service allows users to retrieve dynamic analysis reports for URLs executed in the cloud sandbox. Find more information in the official API documentation.
Authorizations:
path Parameters
base64_value required | string Required parameter. This parameter expects a base64-encoded URL to generate a report of the analyzed URLs. |
string or string If added at the end of the request, the response will contain either the latest dynamic analysis report, or the report matching the provided analysis_id. These two parameters are mutually exclusive. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/dynamic/analysis/report/v1/query/url/base64/aHR0cDovL3d3dy5nb29nbGUuY29t' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "report": {
- "mitre_attack": {
- "matrix_list": [
- {
- "tactics": null,
- "tactic_list": [
- {
- "techniques": {
- "technique_list": [
- {
- "analysis_ids": [
- "61cd8742-8e16-4acd-9136-9137ce605cb3",
- {
- "id": "T1055"
}, - {
- "name": "Process Injection"
}
]
}
]
}, - "id": "TA0005",
- "name": "Defense Evasion"
}, - {
- "techniques": {
- "technique_list": [
- {
- "analysis_ids": [
- "61cd8742-8e16-4acd-9136-9137ce605cb3",
- {
- "id": "T1082"
}, - {
- "name": "System Information Discovery"
}
]
}
]
}, - "id": "TA0007",
- "name": "Discovery"
}, - {
- "techniques": {
- "technique_list": [
- {
- "analysis_ids": [
- "61cd8742-8e16-4acd-9136-9137ce605cb3",
- {
- "id": "T1071"
}, - {
- "name": "Application Layer Protocol"
}
]
}
]
}, - "id": "TA0011",
- "name": "Command and Control"
}
], - "name": "Enterprise"
}
]
}, - "classification": "SUSPICIOUS",
- "history_analysis": [
- {
- "analysis_id": "61cd8742-8e16-4acd-9136-9137ce605cb3",
- "classification_version": 2,
- "classification": "NO_THREATS_FOUND",
- "warnings": [
- "Exclude process from analysis (whitelisted) - rundll32.exe, mscorsvw.exe, svchost.exe",
- "Excluded IPs from analysis (whitelisted) - 88.221.221.99"
], - "analysis_duration": 85,
- "platform": "windows7",
- "configuration": "MS Office 2007;Java 7;Adobe reader 8;Firefox 37;Google Chrome 51;Internet Explorer 8",
- "analysis_time": "2024-01-05T09:52:26"
}
], - "url_base64": "aHR0cDovL2dvb2dsZS5jb20v",
- "risk_score": 6,
- "threat_names": {
- "threat_name": "Unknown",
- "analysis_ids": [
- "61cd8742-8e16-4acd-9136-9137ce605cb3",
- "13033619-a0cd-4f68-b6d1-8a9df8fb3c7c"
]
}, - "sha256": "",
- "last_analysis": "2024-03-05T17:06:56",
- "dropped_files": [
- {
- "sha1": "c34376461cf8d7da7a70bc45fcde293e1f1fde13",
- "classification": "NO_THREATS_FOUND",
- "file_name": "~DF3246C6A4D3AB4F66.TMP",
- "sample_type": "Binary/None",
- "analysis_ids": [
- {
- "analysis_id": "61cd8742-8e16-4acd-9136-9137ce605cb3",
- "classification": "UNKNOWN"
}
], - "sha256": "0428af0170b53d072aa0364d5472bbe75b83d48ecf9e57ad35faf832c2f84914",
- "file_path": "C:\\\\Users\\\\user\\\\AppData\\\\Local\\\\Temp",
- "md5": "16dbe8c92d23c754bc7a93f91b53a906"
}
], - "sha1": "ac4cbe16220c61319d192bf9078f01de42e383e3",
- "optional_parameters": "internet_simulation=true, geolocation=us, locale=en-US",
- "md5": "",
- "platforms": [
- "windows7"
], - "first_analysis": "2024-01-05T09:52:26",
- "behavioral": [
- {
- "process": {
- "process_id": 2416,
- "name": "rundll32.exe",
- "parameters": "'\\\"C:\\\\Windows\\\\system32\\\\rundll32.exe\\\" \\\"C:\\\\Windows\\\\syswow64\\\\WININET.dll\\\",DispatchAPICall 1' ",
- "analysis_ids": [
- "61cd8742-8e16-4acd-9136-9137ce605cb3"
]
}
}
], - "yara": {
- "entries": [
- {
- "source_type": "sample",
- "rule": [
- {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA==",
- "matched_offset": 45520
}
]
}
]
}, - {
- "source_type": "dropped_file",
- "source_name": "C:\\\\ProgramData\\\\d0db02bh22.exe",
- "rule": {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADcMQEApbYBZgAyAgAxg8GcTThakA==",
- "matched_offset": 45520
}, - {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA==",
- "matched_offset": 123848
}
]
}
}, - {
- "source_type": "memory_dump",
- "source_name": "d0db02bh22.exe",
- "rule": {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA=="
}, - {
- "matched_offset": 3735928559
}
]
}
}
]
}
}
}
}
TCA-0106: URL Dynamic Analysis Report (SHA1)
The URL Dynamic Analysis Report (SHA1) service allows users to retrieve dynamic analysis reports for URLs executed in the cloud sandbox. Find more information in the official API documentation.
Authorizations:
path Parameters
sha1_value required | string Required parameter. This parameter expects a SHA1 hash value to generate a report of the analyzed URLs. |
string or string If added at the end of the request, the response will contain either the latest dynamic analysis report, or the report matching the provided analysis_id. These two parameters are mutually exclusive. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/dynamic/analysis/report/v1/query/url/sha1/171ba7127cf28cc63ea1fef74be9746842f5093f' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "report": {
- "mitre_attack": {
- "matrix_list": [
- {
- "tactics": null,
- "tactic_list": [
- {
- "techniques": {
- "technique_list": [
- {
- "analysis_ids": [
- "20781711-3b97-46ec-83a1-b3afd1c4108a",
- {
- "id": "T1222"
}, - {
- "name": "File and Directory Permissions Modification"
}
]
}
]
}, - "id": "TA0005",
- "name": "Defense Evasion"
}, - {
- "techniques": {
- "technique_list": [
- {
- "analysis_ids": [
- "20781711-3b97-46ec-83a1-b3afd1c4108a",
- {
- "id": "T1518.001"
}, - {
- "name": "Security Software Discovery"
}
]
}
]
}, - "id": "TA0007",
- "name": "Discovery"
}, - {
- "techniques": {
- "technique_list": [
- {
- "analysis_ids": [
- "20781711-3b97-46ec-83a1-b3afd1c4108a",
- {
- "id": "T1547.006"
}, - {
- "name": "Kernel Modules and Extensions"
}
]
}
]
}, - "id": "TA0004",
- "name": "Privilege Escalation"
}
], - "name": "Enterprise"
}
]
}, - "classification": "SUSPICIOUS",
- "history_analysis": [
- {
- "analysis_id": "61cd8742-8e16-4acd-9136-9137ce605cb3",
- "classification_version": 2,
- "classification": "NO_THREATS_FOUND",
- "warnings": [
- "Exclude process from analysis (whitelisted) - rundll32.exe, mscorsvw.exe, svchost.exe",
- "Excluded IPs from analysis (whitelisted) - 88.221.221.99"
], - "analysis_duration": 85,
- "platform": "windows7",
- "configuration": "MS Office 2007;Java 7;Adobe reader 8;Firefox 37;Google Chrome 51;Internet Explorer 8",
- "analysis_time": "2024-01-05T09:52:26"
}
], - "url_base64": "aHR0cDovLzk3NzkuaW5mby8",
- "risk_score": 6,
- "threat_names": {
- "threat_name": "Unknown",
- "analysis_ids": [
- "20781711-3b97-46ec-83a1-b3afd1c4108a",
- "153bfc12-1eb7-411e-aa77-55f6106583f9"
]
}, - "sha256": "",
- "last_analysis": "2024-01-05T11:45:56",
- "dropped_files": [
- {
- "sha1": "e6c6af2384e9d021a8d72afbe55c6e829ee80e8b",
- "classification": "NO_THREATS_FOUND",
- "file_name": "/home/johndoe/.cache/mozilla/firefox/30j6i4vm.default-release/cache2/entries/8FC56E71EB8F975EAC2B4CC540621D0DE30B19E6",
- "sample_type": "Binary/Archive/GZIP",
- "analysis_ids": [
- {
- "analysis_id": "20781711-3b97-46ec-83a1-b3afd1c4108a",
- "classification": "UNKNOWN"
}
], - "sha256": "ad6a82af92655c7a1c1f7390dc2a945dde35066277006c985e41167970d45f92",
- "file_path": "",
- "md5": "16dbe8c92d23c754bc7a93f91b53a906"
}
], - "optional_parameters": "internet_simulation=true, geolocation=us, locale=en-US",
- "sha1": "171ba7127cf28cc63ea1fef74be9746842f5093f",
- "md5": "",
- "platforms": [
- "linux"
], - "first_analysis": "2023-12-20T11:14:20",
- "behavioral": [
- {
- "process": {
- "process_id": 4184,
- "name": "firefox",
- "parameters": "n/a",
- "analysis_ids": [
- "20781711-3b97-46ec-83a1-b3afd1c4108a"
]
}
}
], - "yara": {
- "entries": [
- {
- "source_type": "sample",
- "rule": [
- {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA==",
- "matched_offset": 45520
}
]
}
]
}, - {
- "source_type": "dropped_file",
- "source_name": "C:\\\\ProgramData\\\\d0db02bh22.exe",
- "rule": {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADcMQEApbYBZgAyAgAxg8GcTThakA==",
- "matched_offset": 45520
}, - {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA==",
- "matched_offset": 123848
}
]
}
}, - {
- "source_type": "memory_dump",
- "source_name": "d0db02bh22.exe",
- "rule": {
- "description": "Detects executables packed with aPLib.",
- "matched_data": [
- {
- "matched_string": "QVAzMhgAAADP3QAAaFvqdQDMAQDrxK5YTThakA=="
}, - {
- "matched_offset": 3735928559
}
]
}
}
]
}
}
}
}
TCA-0106: Dynamic Analysis Report (archives)
The Dynamic Analysis Report service allows users to retrieve dynamic analysis reports for files executed in the cloud sandbox. Find more information in the official API documentation.
Authorizations:
path Parameters
hash_type required | string Value: "sha1" Required parameter. Specifies which hash type will be used in the request. Supported values: sha1. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/dynamic/analysis/report/v1/archive/query/sha1/54bdccd42f89242ba21fd1a48fcb438a2a2c1829?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "requested_hash": "e662bfd39cf389b0bad5262e6007c09824261ee4",
- "files": [
- {
- "sha1": "zzzf8d4dd290435a978e70adcf7876c0",
- "report": { }
}, - {
- "sha1": "vvvf8d4dd290435a978e70adcf7876c0",
- "report": { }
}
]
}
}
TCA-0106: Dynamic Analysis Report (archives) (specific report)
The Dynamic Analysis Report service allows users to retrieve dynamic analysis reports for files executed in the cloud sandbox. Find more information in the official API documentation.
Authorizations:
path Parameters
hash_type required | string Value: "sha1" Required parameter. Specifies which hash type will be used in the request. Supported values: sha1. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
required | string or string If added at the end of the request, the response will contain either the latest dynamic analysis report, or the report matching the provided analysis_id. These two parameters are mutually exclusive. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/dynamic/analysis/report/v1/archive/query/sha1/54bdccd42f89242ba21fd1a48fcb438a2a2c1829?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "requested_hash": "e662bfd39cf389b0bad5262e6007c09824261ee4",
- "files": [
- {
- "sha1": "zzzf8d4dd290435a978e70adcf7876c0",
- "report": { }
}, - {
- "sha1": "vvvf8d4dd290435a978e70adcf7876c0",
- "report": { }
}
]
}
}
TCA-0207: File/URL Dynamic Analysis
The File and URL Dynamic Analysis service allows users to detonate a file and URL in the ReversingLabs cloud sandbox. Several different sandbox profiles are available:
- Win10 x64 (MS Office 2007, Java 8, update 261, Adobe Reader 2020.012.20048, Firefox 62.0.3, Google Chrome 69.0.3497.100, Microsoft Edge 42.17134.1.0, Internet Explorer 11)
- Win7 x64 (build 760, MS Office 2007, Java 7, update 45, Adobe Reader 8.1.2, Firefox 37, Google Chrome 51.0.2704.84, Internet Explorer 8)
- macOS 11 (MacOS Big Sur; Safari 14.1.2; Acrobat Reader 22.003.20258) The report about the performed analysis and file behavior can be retrieved using the TCA-0106 Dynamic Analysis Report service. Find more information in the official API documentation.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
Up to 100 hashes can be submitted in one request.
required | File upload (object) or URL upload (object) or URL Base64 upload (object) | ||||||||
One of
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "sha1": "string",
- "platform": "string",
- "response_format": "string",
- "optional_parameters": "string"
}
}
Response samples
- 200
{- "rl": {
- "requested_hash": "3c3ce51a7ab839c2f412fb06212fcf6a92932252",
- "analysis_id": "663a0671-36d2-4a1a-8f3b-e5ddcb91f5e5",
- "status": "started"
}
}
TCA-0207: Dynamic Analysis (archives)
The Dynamic Analysis service allows users to detonate a file in the ReversingLabs cloud sandbox. Several different sandbox profiles are available:
- Win10 x64 (MS Office 2007, Java 8, update 261, Adobe Reader 2020.012.20048, Firefox 62.0.3, Google Chrome 69.0.3497.100, Microsoft Edge 42.17134.1.0, Internet Explorer 11)
- Win7 x64 (build 760, MS Office 2007, Java 7, update 45, Adobe Reader 8.1.2, Firefox 37, Google Chrome 51.0.2704.84, Internet Explorer 8)
- macOS 11 (MacOS Big Sur; Safari 14.1.2; Acrobat Reader 22.003.20258) The report about the performed analysis and file behavior can be retrieved using the TCA-0106 Dynamic Analysis Report service. Find more information in the official API documentation.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
hash_type
is a required parameter that specifies which hash type will be used in the request. Supported values: md5, sha1, sha256.
hash_value
is a required parameter that specifies the hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "sha1": "54bdccd42f89242ba21fd1a48fcb438a2a2c1829",
- "platform": "windows7",
- "response_format": "json",
- "optional_parameters": "internet_simulation=true"
}
}
Response samples
- 200
{- "rl": {
- "requested_hash": "e662bfd39cf389b0bad5262e6007c09824261ee4",
- "files": [
- {
- "sha1": "zzzf8d4dd290435a978e70adcf7876c0",
- "analysis_id": "bedf8d4d-d290-435a-978e-70adcf7876c0",
- "status": "started"
}, - {
- "sha1": "bbbf8d4dd290435a978e70adcf7876c0",
- "analysis_id": "uuuf8d4d-d290-435a-978e-70adcf7876c0",
- "status": "started"
}, - {
- "sha1": "zzzf8d4dd290435a978e70adcf7876c0",
- "analysis_id": "hhhf8d4d-d290-435a-978e-70adcf7876c0",
- "status": "started"
}, - {
- "sha1": "cccf8d4dd290435a978e70adcf7876c0",
- "analysis_id": "zzzf8d4d-d290-435a-978e-70adcf7876c0",
- "error_message": "sample_size_exceeds"
}, - {
- "sha1": "uuuf8d4dd290435a978e70adcf7876c0",
- "analysis_id": "lllf8d4d-d290-435a-978e-70adcf7876c0",
- "error_message": "filetype_not_supported"
}
]
}
}
TCA-0301: Group By RHA1 Single Query
The RHA Functional Similarity [Group by RHA1] API provides a list of SHA1 hashes of files that are functionally similar to the requested file (SHA1 hash) at the selected precision level. The files are grouped by their RHA1 hash.
Authorizations:
path Parameters
rha1_type required | string Required parameter. A measure of RHA1 precision level; represents the degree to which a file is functionally similar to another file. A higher precision level will match fewer files, but the files will have more functional similarity. The following precision levels are supported - 25% for PE, MachO and ELF files (expressed as pe01, elf01, machO01), and 50% for PE files (expressed as pe02). This parameter accepts one of the following values: pe01, elf01, machO01, pe02 |
hash_value required | string Required parameter. The value must be a valid SHA1 hash of the sample for which the user is requesting a list of functionally similar samples. |
next_page_sha1 required | string Optional path parameter used for pagination. To get the next page of results from the API, use the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | integer [ 1 .. 1000 ] Default: 1000 Example: limit=50 Optional parameter that specifies the maximum number of sample SHA1 hashes to return in the response. This value has to be an integer in the range from 1 and 1000. When the parameter is not included in the request, 1000 hashes are returned in the response. |
extended | boolean Default: "false" Example: extended=true Optional parameter. Supported values are true (sends the extended data set in the response) and false (sends only the list of SHA1 hashes). The default is false. If the extended option is selected, each SHA1 hash in the list will be expanded with additional metadata: classification, threat level, trust factor, malware family name, threat name, malware type, targeted platform and subplatform; SHA1, MD5, and SHA256 hashes; sample size, sample type, download availability, first and last seen dates (UTC). |
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/group_by_rha1/v1/query/pe01/1b85cbfa30e181c505ba15211db33247c1f8a63f?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "group_by_rha1": {
- "query_sha1": "00c3ddd93924df51e10585167271e27b4cfb29c5",
- "rha1_type": "pe01",
- "sha1_list": [
- {
- "sha1": "0000dac7e0a238ff39f85a55b090fba0033de120",
- "sha256": "1c39f231761045d6b1d6f52c6122b4b313381c09a6001d8b23453af2e1bc666d",
- "md5": "e185f87ede2f52916b308a672f1c4ba0",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 163736,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-03-24T07:21:25.452000",
- "last_seen": "2022-03-24T09:50:38.799000"
}, - {
- "sha1": "00011cc1efe61edcd44779896f620ea3466a575a",
- "sha256": "450f2dd1e89d3b3a9760683555a64f815c3487025f119251c051134c579d0de6",
- "md5": "4efaabe63332ddf1ca31208b511280d9",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 201010,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-06-11T02:54:34.045000",
- "last_seen": "2022-06-11T03:10:38.761000"
}, - {
- "sha1": "0001304e87726a391311cf4770c1cec0372eb930",
- "sha256": "03fb5c2bb88a5a5e025b0597dece833e76f3587de6ebfe1a04fc68cc22cbe895",
- "md5": "42e7cb9a3cf39335bfc4cb87043f43e4",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 207986,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-06-03T08:32:06.676000",
- "last_seen": "2022-06-03T08:46:01.750000"
}, - {
- "sha1": "000149f40e35b1159e1d5cfe09746623ac07cbdc",
- "sha256": "49b8bbf61ac59d384fae150d78ae995746f175496dd0f64d0e729e669406310d",
- "md5": "8ae17e3d363b411e65be4775ab405a50",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 241124,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-03-23T03:57:05.778000",
- "last_seen": "2022-03-23T04:22:08.524000"
}, - {
- "sha1": "0001b9fdb128e11a72e58775008ab69b13782ac9",
- "sha256": "5c9f031bbfc67467ab1448101705c6ccd1390c30a58c8ffa932f68e672f522b0",
- "md5": "0c06e517df34ff461d2b6b396ec15207",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 206285,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-04-14T14:46:05.790000",
- "last_seen": "2022-04-14T15:11:54.804000"
}, - {
- "sha1": "0001ed161168ddd202d89501754565920395f2d2",
- "sha256": "89b5db75d92a66b4d106ea6ff7bc79354700525f0b33a49e0bffbffeb79561f8",
- "md5": "685935aae52706dc411a6cf05ef77c74",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 215204,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-05-25T13:48:56.289000",
- "last_seen": "2022-05-25T14:16:03.603000"
}, - {
- "sha1": "0001eef082c56c42f1c5db5cc0da859c06ba2149",
- "sha256": "a8255c15135ba135dc80e80f62e090ab36e97ccabeb243cbea132990dad213d6",
- "md5": "b27ba2e5e4e7db5636fa33664fa32337",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 187255,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-03-06T21:45:28.643000",
- "last_seen": "2022-03-06T21:58:15.457000"
}, - {
- "sha1": "00024822e72f28d3c84f43170027c0aa48c74380",
- "sha256": "17edd253c150d54c96c8280268ff6d326e77cad17bbbb7fb0e9776b5f7eb2234",
- "md5": "545f8c8d946aba46a1584f50bbb2d6c8",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 177239,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-06-29T06:02:08.477000",
- "last_seen": "2022-06-29T06:19:18.458000"
}, - {
- "sha1": "0002c709fad77b8be797c8c4c4c926322a851a69",
- "sha256": "4d45a34c7562348de32b7ab37ccc8a68b3f25ac18a28075961caf502d4deecf4",
- "md5": "258114397ce42302bfeff81093e0fcc0",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 177548,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Phonzy",
- "malware_family": "Phonzy",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-06-16T22:10:25.152000",
- "last_seen": "2022-06-16T22:23:51.674000"
}, - {
- "sha1": "000327ce82f57e15b1ba63d378a4c74261a194b9",
- "sha256": "63f8b29d41ff6ab7aecb87b22a8b2fb50ae679ba079b1cfd737043fca8fc19ba",
- "md5": "ba152dfa436cf41477ef571c03450896",
- "classification": "MALICIOUS",
- "sample_type": "PE/Exe",
- "sample_size": 253171,
- "sample_available": true,
- "trust_factor": 5,
- "threat_level": 5,
- "threat_name": "Win32.Trojan.Mamson",
- "malware_family": "Mamson",
- "malware_type": "Trojan",
- "platform": "Win32",
- "first_seen": "2022-07-03T07:54:46.039000",
- "last_seen": "2022-07-03T08:04:44.761000"
}
], - "next_page_sha1": "0003573e25179d3fb14229b2e6cb56f46c53f719"
}
}
}
TCA-0302: ImpHash Similarity
The ImpHash Similarity API provides a list of all available SHA1 hashes for the requested import hash (imphash).
Authorizations:
path Parameters
hash_value required | string Required parameter. The value must be a valid ImpHash hash for which the user is requesting a list of SHA1 hashes. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/imphash_index/v1/query/0931e97555ac33eb10aa9539fe890070' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "imphash_index": {
- "next_page_sha1": "04869a625ea7d92fd8d1668aec77efd38a0c2506",
- "query_imphash": "0931e97555ac33eb10aa9539fe890070",
- "sha1_list": [
- "00018a78a1cae0ad6bf5bfb712147e99a4b15577",
- "0001cf4ef8aa7d50b014318743edac57fa31c569",
- "00045f60ebcca8d7c19b99519c545d99be5d3244",
- "00071c14a4b5c7bbe56b292c87bda7d7f9394373",
- "000a24c24e2c9c222d5aa662161646e4661f5929",
- "2cb199ed0920d479fa481dff0b3d33d53bed434e"
]
}
}
}
TCA-0302: ImpHash Similarity (paginated)
The ImpHash Similarity API provides a list of all available SHA1 hashes for the requested import hash (imphash).
Authorizations:
path Parameters
hash_value required | string Required parameter. The value must be a valid ImpHash hash for which the user is requesting a list of SHA1 hashes. |
next_page_sha1 required | string Optional path parameter used for pagination. To get the next page of results from the API, use the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/imphash_index/v1/query/0931e97555ac33eb10aa9539fe890070' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "imphash_index": {
- "next_page_sha1": "04869a625ea7d92fd8d1668aec77efd38a0c2506",
- "query_imphash": "0931e97555ac33eb10aa9539fe890070",
- "sha1_list": [
- "00018a78a1cae0ad6bf5bfb712147e99a4b15577",
- "0001cf4ef8aa7d50b014318743edac57fa31c569",
- "00045f60ebcca8d7c19b99519c545d99be5d3244",
- "00071c14a4b5c7bbe56b292c87bda7d7f9394373",
- "000a24c24e2c9c222d5aa662161646e4661f5929",
- "2cb199ed0920d479fa481dff0b3d33d53bed434e"
]
}
}
}
TCA-0303: Create a YARA Ruleset
The YARA Ruleset Administration API allows the authenticated user to manage their collection of YARA rulesets in ReversingLabs Spectra Intelligence. All user-submitted rulesets go through a validation phase where they are tested for correctness and efficacy. A ruleset can be declared invalid even if it is syntactically correct, e.g. if it is too broad, and would generate an inordinate amount of matches.
Authorizations:
Request Body schema: application/jsonrequired
sample_available | boolean |
ruleset_name | string |
ruleset_sha1 | string |
Responses
Request samples
- Payload
- bash
- Python
{- "ruleset_name": "string",
- "text": "string",
- "sample_available": true
}
Response samples
- 201
{- "ruleset_name": "RAT_Ratdecoders",
- "ruleset_sha1": "359ce0caae50b7d35ab21e93589a87e806b536b9",
- "sample_available": true
}
TCA-0303: Delete a YARA Ruleset
The YARA Ruleset Administration API allows the authenticated user to manage their collection of YARA rulesets in ReversingLabs Spectra Intelligence. Find more information in the official API documentation.
Authorizations:
path Parameters
ruleset_name required | string [ 3 .. 48 ] characters ^[a-z,A-Z,0-9,_-]*$ Parameter used for getting the information about the specified YARA ruleset. Only one ruleset name can be submitted in each request. |
Responses
Request samples
- bash
- Python
curl --request DELETE --url 'https://data.reversinglabs.com/api/yara/admin/v1/ruleset/ExampleRulesetName' --user <username>:<password>
TCA-0303: Get Ruleset Information
The YARA Ruleset Administration API allows the authenticated user to manage their collection of YARA rulesets in ReversingLabs Spectra Intelligence. If no parameter is specified, this API will return all the user's YARA rulesets.
Authorizations:
path Parameters
ruleset_name required | string [ 3 .. 48 ] characters ^[a-z,A-Z,0-9,_-]*$ Parameter used for getting the information about the specified YARA ruleset. Only one ruleset name can be submitted in each request. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/yara/admin/v1/ruleset/ExampleRulesetName' --user <username>:<password>
Response samples
- 200
{- "ruleset_name": "RAT_Ratdecoders",
- "valid": true,
- "approved": null
}
TCA-0303: Get Ruleset Text
The YARA Ruleset Administration API allows the authenticated user to manage their collection of YARA rulesets in ReversingLabs Spectra Intelligence. If no parameter is specified, this API will return all the user's YARA rulesets.
Authorizations:
path Parameters
ruleset_name required | string [ 3 .. 48 ] characters ^[a-z,A-Z,0-9,_-]*$ Parameter used for getting the information about the specified YARA ruleset. Only one ruleset name can be submitted in each request. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/yara/admin/v1/ruleset/ExampleRulesetName' --user <username>:<password>
Response samples
- 200
{- "ruleset_name": "RAT_Ratdecoders",
- "valid": true,
- "approved": null
}
TCA-0303: YARA Matches Feed
The YARA Matches Feed API returns a recordset of YARA ruleset matches in the requested time range for the authenticated user. The feed will return at most 1000 records, starting from the earliest one. However, if a single second contains more than 1000 matches, all of them will be returned in a single query. If a sample was matched by several rulesets, each will produce its own entry in the response.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Period between the time specified by this parameter and the request time. The earliest supported time value is May 20 2016 00:00h UTC (timestamp 1463702400). The latest supported time value is 10 seconds before the request time. The value must be in the format specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/feed/yara/v1/query/timestamp/1463702400?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "name": "YARA Match Continuous Feed",
- "time_range": {
- "from": 1489968000,
- "to": 1490747180
}, - "last_timestamp": 1489968900,
- "entries": [
- {
- "timestamp": 1489968000,
- "sha1": "dede1c573a4279ae9465e5e7fdf1d5a8445780fe",
- "file_type": "Sample file type",
- "file_size": "Sample file size",
- "ruleset_sha1": "SHA1 hash of the matched ruleset content",
- "ruleset_name": "Name of the matched ruleset",
- "rule": [
- {
- "identifier": "YARA rule identifier",
- "meta": "Meta fields",
- "tag": "Tags",
- "matched_data": [
- {
- "string_identifier": "encoded base64 string",
- "match_offset": "integer",
- "matched_string": "encoded base64 string"
}
]
}
], - "sample_available": "Indicates whether the sample is available for download"
}
]
}
}
}
TCA-0305: Malware Family Detection Single Query
The Malware Family Detection API takes a file hash and returns all malware families to which that sample belongs, based on the detections from the latest AV scan.
Authorizations:
path Parameters
hash_type required | string Enum: "md5" "sha1" "sha256" Required parameter. Specifies which hash type will be used in the request. Supported values: md5, sha1, sha256. |
hash_value required | string Required parameter. Hash of the file for which the user is requesting data from the service. The value must be a valid hash of the same type specified by the |
query Parameters
format | string Default: "json" Enum: "json" "xml" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, defaults to json. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/malware/family/detection/v1/query/sha1/7d8f177243cfa055c95cbbf32ebc2d7e8c71d4fb' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "sample": {
- "sha1": "1a7f5ebe53169942cd5913844f86d4be857d82d3",
- "family": {
- "entries": [
- "00576ff21",
- "AD",
- "Agent",
- "PossibleThreat PALLAS",
- "BScope Chanitor",
- "WacatacIH S18376626",
- "EmotetCrypt PEF MTB",
- "Agent FCJD",
- "Kryptik D1D3",
- "Emotet 1100"
]
}
}
}
}
TCA-0305: Malware Family Detection Bulk Query
The Malware Family Detection API takes a file hash and returns all malware families to which that sample belongs, based on the detections from the latest AV scan. Up to 100 hashes can be submitted in one request. Find more information in the official API documentation.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
query Parameters
format | string Enum: "xml" "json" Optional parameter that allows choosing the response format. Supported values: json, xml. When the parameter is not included in the request, the response is in the same format specified by the |
Request Body schema: application/jsonrequired
hashes
is an array of valid hashes of the same type as specified in the hash_type
parameter.
Up to 100 hashes can be submitted in one request.
required | object | ||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "hash_type": "sha1",
- "hashes": [
- "a7afddb68260a60f86c02a021efba7f216c2e7cf",
- "ca03064987d3c4465f91552ba8b6a883eecfd3e5",
- "b363713a938afcd3c74603827fab79e935b2b09b",
- "example_of_a_wrong_hash"
]
}
}
}
Response samples
- 200
{ "rl": { "unknown_hashes": [ "ca03064987d3c4465f91552ba8b6a883eecfd3e5" ], "invalid_hashes": [ "example_of_a_wrong_hash" ], "entries": [ { "sample": { "sha1": "a7afddb68260a60f86c02a021efba7f216c2e7cf", "family": { "entries": [] } } }, { "sample": { "sha1": "b363713a938afcd3c74603827fab79e935b2b09b", "family": { "entries": [] } } }, { "sample": { "sha1": "1a7f5ebe53169942cd5913844f86d4be857d82d3", "family": { "entries": [ "00576ff21", "AD", "Agent", "PossibleThreat PALLAS", "BScope Chanitor", "WacatacIH S18376626", "EmotetCrypt PEF MTB", "Agent FCJD", "Kryptik D1D3", "Emotet 1100" ] } } } ] } }
TCA-0306: Expression Search Query (time range)
The Expression Search API allows users to find samples in ReversingLabs Spectra Intelligence that match the requested criteria. The service returns only new samples - either samples that were first seen on the requested date, or samples from the last 24 hours - and does not include old or rescanned samples in the response. At least 2 search criteria must be provided in each request. Every request returns a maximum of 1000 results. If more than 1000 samples match the requested criteria, the response includes a next_page
field to indicate this. The user can then request the next page with up to 1000 results.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" "date" Required parameter that specifies the time format for the |
time_value required | string <Unix timestamp OR date-time OR date> Required parameter that specifies the date and time for which the user is requesting data from the service. |
query Parameters
status | string Enum: "KNOWN" "MALICIOUS" "SUSPICIOUS" |
threat_level | integer [ 0 .. 5 ] 0-5, with 5 indicating highest severity. Applies only to malicious and suspicious samples. |
trust_factor | integer [ 0 .. 5 ] 0-5, with 0 indicating highest trust. Applies only to known samples. |
threat_name | string^\w+-\w*\.\w+\.\w+$ Complete malware threat name. Conforms to ReversingLabs Malware naming standard: platform-subplatform.type.familyname. Applies to malicious samples only. |
platform | string Platform part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
subplatform | string Subplatform part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
malware_type | string Type part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
malware_family | string Family part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
sample_type | string Sample type string as detected by ReversingLabs Spectra Core. |
sample_size | integer Sample size in bytes. |
scanner_detections | integer Number of antivirus scanners that have detected the sample as malicious. |
page | integer Example: page=2 Optional parameter that specifies which page of results should be returned when there are more than 1000 samples in the list of results. When this parameter is not included in the request, only the first page of results is returned. |
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sha1 | string Hexadecimal hash value of the sample |
sha256 | string Hexadecimal hash value of the sample |
md5 | string Hexadecimal hash value of the sample |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/sample/search/download/v1/query/date/2018-07-03?status=malicious&platform=bytecode&threat_level=5&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "web_sample_search_download": {
- "date": "2020-02-03",
- "next_page": null,
- "sample_size_sum": 3171998,
- "sample_count": 4,
- "entries": [
- {
- "status": "SUSPICIOUS",
- "sha1": "bbaa45010a510875934d39a9132f6b317cebc0b3",
- "last_seen": "2022-04-01 18:03:24",
- "sample_size": "900096",
- "subplatform": "Word",
- "threat_name": "Document-Word.Exploit.CVE-2017-11882",
- "sample_type": "Binary/Archive/Compound",
- "sha256": "b5b9c225e06a039a5a607ac3bfa94e7acce8adbeee19039217072903c24eaca8",
- "sample_available": "True",
- "platform": "Document",
- "malware_type": "Exploit",
- "first_seen": "2020-02-03 09:34:15",
- "threat_level": 5,
- "trust_factor": 5,
- "malware_family": "CVE-2017-11882",
- "md5": "1d28dcc4aef7710a4111cf6c8a5de47f"
}, - {
- "status": "SUSPICIOUS",
- "sha1": "780eaf8e9e35f9cf916551e959e7b1270b5330c5",
- "last_seen": "2022-04-01 16:16:07",
- "sample_size": "639075",
- "subplatform": "Excel",
- "threat_name": "Document-Excel.Exploit.CVE-2017-11882",
- "sample_type": "Binary/Archive/GZIP",
- "sha256": "19791a24aba2d23cbcbcd70f189868484eb52be19ca3ecabf1a76319c1a1c92d",
- "sample_available": "True",
- "platform": "Document",
- "malware_type": "Exploit",
- "first_seen": "2020-02-03 10:36:00",
- "threat_level": 5,
- "trust_factor": 5,
- "malware_family": "CVE-2017-11882",
- "md5": "383640d72e7a6491c747ec3aa07b12d7"
}, - {
- "status": "SUSPICIOUS",
- "sha1": "88b251b699c245889b9f83d701bb119a59858095",
- "last_seen": "2022-04-02 01:06:48",
- "sample_size": "855239",
- "subplatform": "Word",
- "threat_name": "Document-Word.Exploit.CVE-2017-11882",
- "sample_type": "Binary/Archive/GZIP",
- "sha256": "2ffe7fc6cc8aa86ff89bfcf8501b4e1c9d1721f6ae8b216fcbe96ceb9bd782e8",
- "sample_available": "True",
- "platform": "Document",
- "malware_type": "Exploit",
- "first_seen": "2020-02-03 10:56:00",
- "threat_level": 5,
- "trust_factor": 5,
- "malware_family": "CVE-2017-11882",
- "md5": "c501b48884fa9943de5af2e66ad745d6"
}, - {
- "status": "SUSPICIOUS",
- "sha1": "6b1eb3cd8b6f0ba64ef774b5ac26835f3e389e49",
- "last_seen": "2022-05-23 01:45:06",
- "sample_size": "777588",
- "subplatform": "Excel",
- "threat_name": "Document-Excel.Exploit.CVE-2017-11882",
- "sample_type": "Binary/Archive/GZIP",
- "sha256": "849590289398650d6312c55b7fae0b3afce0f5c026870da381e98ad5d716b45b",
- "sample_available": "True",
- "platform": "Document",
- "malware_type": "Exploit",
- "first_seen": "2020-02-03 11:45:45",
- "threat_level": 5,
- "trust_factor": 5,
- "malware_family": "CVE-2017-11882",
- "md5": "b39b10f74c5c871ea1a20aea9079bdc2"
}
]
}
}
}
TCA-0306: Expression Search Query (latest)
The Expression Search API allows users to find samples in ReversingLabs Spectra Intelligence that match the requested criteria. The service returns only new samples - either samples that were first seen on the requested date, or samples from the last 24 hours - and does not include old or rescanned samples in the response. At least 2 search criteria must be provided in each request. Every request returns a maximum of 1000 results. If more than 1000 samples match the requested criteria, the response includes a next_page
field to indicate this. The user can then request the next page with up to 1000 results.
Authorizations:
query Parameters
status | string Enum: "KNOWN" "MALICIOUS" "SUSPICIOUS" |
threat_level | integer [ 0 .. 5 ] 0-5, with 5 indicating highest severity. Applies only to malicious and suspicious samples. |
trust_factor | integer [ 0 .. 5 ] 0-5, with 0 indicating highest trust. Applies only to known samples. |
threat_name | string^\w+-\w*\.\w+\.\w+$ Complete malware threat name. Conforms to ReversingLabs Malware naming standard: platform-subplatform.type.familyname. Applies to malicious samples only. |
platform | string Platform part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
subplatform | string Subplatform part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
malware_type | string Type part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
malware_family | string Family part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
sample_type | string Sample type string as detected by ReversingLabs Spectra Core. |
sample_size | integer Sample size in bytes. |
scanner_detections | integer Number of antivirus scanners that have detected the sample as malicious. |
page | integer Example: page=2 Optional parameter that specifies which page of results should be returned when there are more than 1000 samples in the list of results. When this parameter is not included in the request, only the first page of results is returned. |
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/sample/search/download/v1/query/date/2018-07-03?status=malicious&platform=bytecode&threat_level=5&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "web_sample_search_download": {
- "date": "2020-02-03",
- "next_page": null,
- "sample_size_sum": 3171998,
- "sample_count": 4,
- "entries": [
- {
- "status": "SUSPICIOUS",
- "sha1": "bbaa45010a510875934d39a9132f6b317cebc0b3",
- "last_seen": "2022-04-01 18:03:24",
- "sample_size": "900096",
- "subplatform": "Word",
- "threat_name": "Document-Word.Exploit.CVE-2017-11882",
- "sample_type": "Binary/Archive/Compound",
- "sha256": "b5b9c225e06a039a5a607ac3bfa94e7acce8adbeee19039217072903c24eaca8",
- "sample_available": "True",
- "platform": "Document",
- "malware_type": "Exploit",
- "first_seen": "2020-02-03 09:34:15",
- "threat_level": 5,
- "trust_factor": 5,
- "malware_family": "CVE-2017-11882",
- "md5": "1d28dcc4aef7710a4111cf6c8a5de47f"
}, - {
- "status": "SUSPICIOUS",
- "sha1": "780eaf8e9e35f9cf916551e959e7b1270b5330c5",
- "last_seen": "2022-04-01 16:16:07",
- "sample_size": "639075",
- "subplatform": "Excel",
- "threat_name": "Document-Excel.Exploit.CVE-2017-11882",
- "sample_type": "Binary/Archive/GZIP",
- "sha256": "19791a24aba2d23cbcbcd70f189868484eb52be19ca3ecabf1a76319c1a1c92d",
- "sample_available": "True",
- "platform": "Document",
- "malware_type": "Exploit",
- "first_seen": "2020-02-03 10:36:00",
- "threat_level": 5,
- "trust_factor": 5,
- "malware_family": "CVE-2017-11882",
- "md5": "383640d72e7a6491c747ec3aa07b12d7"
}, - {
- "status": "SUSPICIOUS",
- "sha1": "88b251b699c245889b9f83d701bb119a59858095",
- "last_seen": "2022-04-02 01:06:48",
- "sample_size": "855239",
- "subplatform": "Word",
- "threat_name": "Document-Word.Exploit.CVE-2017-11882",
- "sample_type": "Binary/Archive/GZIP",
- "sha256": "2ffe7fc6cc8aa86ff89bfcf8501b4e1c9d1721f6ae8b216fcbe96ceb9bd782e8",
- "sample_available": "True",
- "platform": "Document",
- "malware_type": "Exploit",
- "first_seen": "2020-02-03 10:56:00",
- "threat_level": 5,
- "trust_factor": 5,
- "malware_family": "CVE-2017-11882",
- "md5": "c501b48884fa9943de5af2e66ad745d6"
}, - {
- "status": "SUSPICIOUS",
- "sha1": "6b1eb3cd8b6f0ba64ef774b5ac26835f3e389e49",
- "last_seen": "2022-05-23 01:45:06",
- "sample_size": "777588",
- "subplatform": "Excel",
- "threat_name": "Document-Excel.Exploit.CVE-2017-11882",
- "sample_type": "Binary/Archive/GZIP",
- "sha256": "849590289398650d6312c55b7fae0b3afce0f5c026870da381e98ad5d716b45b",
- "sample_available": "True",
- "platform": "Document",
- "malware_type": "Exploit",
- "first_seen": "2020-02-03 11:45:45",
- "threat_level": 5,
- "trust_factor": 5,
- "malware_family": "CVE-2017-11882",
- "md5": "b39b10f74c5c871ea1a20aea9079bdc2"
}
]
}
}
}
TCA-0306: Expression Search Statistics Query (time range)
The Expression Search Statistics API returns aggregated statistics about new samples in ReversingLabs Spectra Intelligence that match the requested criteria. The service returns only new samples - either samples that were first seen on the requested date, or samples from the last 24 hours - and does not include old or rescanned samples in the response. At least 2 search criteria must be provided in each request. Every request returns a maximum of 1000 results. If more than 1000 samples match the requested criteria, the response includes a next_page
field to indicate this. The user can then request the next page with up to 1000 results.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" "date" Required parameter that specifies the time format for the |
time_value required | string <Unix timestamp OR date-time OR date> Required parameter that specifies the date and time for which the user is requesting data from the service. |
query Parameters
status | string Enum: "KNOWN" "MALICIOUS" "SUSPICIOUS" |
threat_level | integer [ 0 .. 5 ] 0-5, with 5 indicating highest severity. Applies only to malicious and suspicious samples. |
trust_factor | integer [ 0 .. 5 ] 0-5, with 0 indicating highest trust. Applies only to known samples. |
threat_name | string^\w+-\w*\.\w+\.\w+$ Complete malware threat name. Conforms to ReversingLabs Malware naming standard: platform-subplatform.type.familyname. Applies to malicious samples only. |
platform | string Platform part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
subplatform | string Subplatform part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
malware_type | string Type part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
malware_family | string Family part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
sample_type | string Sample type string as detected by ReversingLabs Spectra Core. |
sample_size | integer Sample size in bytes. |
scanner_detections | integer Number of antivirus scanners that have detected the sample as malicious. |
page | integer Example: page=2 Optional parameter that specifies which page of results should be returned when there are more than 1000 samples in the list of results. When this parameter is not included in the request, only the first page of results is returned. |
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/sample/search/download/v1/statistics/date/2017-06-08?status=malicious&threat_level=5&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "web_sample_search_download": {
- "date": "2020-02-03",
- "next_page": null,
- "sample_size_sum": 3171998,
- "sample_count": 4,
- "entries": [
- {
- "status": "SUSPICIOUS",
- "sample_group_count": "1",
- "sample_type": "Binary/Archive/Compound",
- "sample_group_size": "900096",
- "threat_level": 5,
- "trust_factor": 5
}, - {
- "status": "SUSPICIOUS",
- "sample_group_count": "3",
- "sample_type": "Binary/Archive/GZIP",
- "sample_group_size": "2271902",
- "threat_level": 5,
- "trust_factor": 5
}
]
}
}
}
TCA-0306: Expression Search Statistics Query (latest)
The Expression Search Statistics API returns aggregated statistics about new samples in ReversingLabs Spectra Intelligence that match the requested criteria. The service returns only new samples - either samples that were first seen on the requested date, or samples from the last 24 hours - and does not include old or rescanned samples in the response. At least 2 search criteria must be provided in each request. Every request returns a maximum of 1000 results. If more than 1000 samples match the requested criteria, the response includes a next_page
field to indicate this. The user can then request the next page with up to 1000 results.
Authorizations:
query Parameters
status | string Enum: "KNOWN" "MALICIOUS" "SUSPICIOUS" |
threat_level | integer [ 0 .. 5 ] 0-5, with 5 indicating highest severity. Applies only to malicious and suspicious samples. |
trust_factor | integer [ 0 .. 5 ] 0-5, with 0 indicating highest trust. Applies only to known samples. |
threat_name | string^\w+-\w*\.\w+\.\w+$ Complete malware threat name. Conforms to ReversingLabs Malware naming standard: platform-subplatform.type.familyname. Applies to malicious samples only. |
platform | string Platform part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
subplatform | string Subplatform part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
malware_type | string Type part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
malware_family | string Family part of the malware threat name (platform-subplatform.type.familyname). Applies to malicious samples only. |
sample_type | string Sample type string as detected by ReversingLabs Spectra Core. |
sample_size | integer Sample size in bytes. |
scanner_detections | integer Number of antivirus scanners that have detected the sample as malicious. |
page | integer Example: page=2 Optional parameter that specifies which page of results should be returned when there are more than 1000 samples in the list of results. When this parameter is not included in the request, only the first page of results is returned. |
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/sample/search/download/v1/statistics/date/2017-06-08?status=malicious&threat_level=5&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "web_sample_search_download": {
- "date": "2020-02-03",
- "next_page": null,
- "sample_size_sum": 3171998,
- "sample_count": 4,
- "entries": [
- {
- "status": "SUSPICIOUS",
- "sample_group_count": "1",
- "sample_type": "Binary/Archive/Compound",
- "sample_group_size": "900096",
- "threat_level": 5,
- "trust_factor": 5
}, - {
- "status": "SUSPICIOUS",
- "sample_group_count": "3",
- "sample_type": "Binary/Archive/GZIP",
- "sample_group_size": "2271902",
- "threat_level": 5,
- "trust_factor": 5
}
]
}
}
}
TCA-0307-0311, 0317: Vertical Feeds Statistics
The Vertical Feeds Statistics API provides information about new malware samples detected in Spectra Intelligence, filtered by category. The service can return a list of malware family names newly added to each category; the number of unique new samples added for each malware family in a category; and a list of top 20 malware families per category.
Authorizations:
path Parameters
category required | string Enum: "financial" "retail" "ransomware" "apt" "exploit" "configuration" Required parameter that corresponds to the vertical feed category the user is requesting to access. Only one category can be requested in each query. Note that the response for the |
filter required | string Enum: "first_seen" "counts" "top_list"
|
query Parameters
weeks | integer [ 0 .. 30 ] Default: 0 Example: weeks=2 Optional parameter that specifies the number of weeks for which the data will be returned in the response. When the parameter is not included in the request, all available data is returned. The same happens when setting the |
all_time | boolean Optional flag parameter that instructs the service to return all available data for the requested category. The same happens when the |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python for /top_list
curl --url 'https://data.reversinglabs.com/api/feed/malware/detection/family/v2/statistics/category/financial/first_seen?weeks=2&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "name": "Verticals Statistics First Seen",
- "entries": [
- {
- "category": "financial",
- "week": "2020-W21",
- "entries": [
- {
- "first_seen": "2020-05-18 01:36:44",
- "family_name": "Adwind"
}, - {
- "first_seen": "2020-05-20 01:27:10",
- "family_name": "Autosus"
}, - {
- "first_seen": "2020-05-18 00:04:45",
- "family_name": "Banbra"
}, - {
- "first_seen": "2020-05-20 00:41:43",
- "family_name": "Bancos"
}, - "..."
]
}, - {
- "category": "financial",
- "week": "2020-W20",
- "entries": [
- {
- "first_seen": "2020-05-11 00:23:05",
- "family_name": "Adwind"
}, - {
- "first_seen": "2020-05-13 01:42:38",
- "family_name": "Arcom"
}, - {
- "first_seen": "2020-05-12 22:56:39",
- "family_name": "Autosus"
}, - {
- "first_seen": "2020-05-11 00:00:09",
- "family_name": "Banbra"
}, - {
- "first_seen": "2020-05-11 01:01:40"
}, - "..."
]
}
]
}
}
}
TCA-0312-0316, TCA-0318: Vertical Feeds Search (time range)
The Vertical Feeds Search API allows users to get hashes of new malware samples from ReversingLabs Targeted and Industry-Specific File Indicator Feeds by searching for malware family names. Samples are included in the response based on the time when they were added to a particular feed. The results include additional metadata about each sample.
Authorizations:
path Parameters
family_name required | string Case-sensitive parameter; accepts a malware family name or a CVE identifier. |
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string <Unix timestamp OR date-time> Accepts values formatted according to the format set in the time_format parameter. The latest allowed time value is 60 seconds before the current time. |
query Parameters
count | integer [ 1 .. 1000 ] Default: 100 Optional parameter that specifies the number of hashes to return in the response. Setting this value too low may result in identical |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/feed/malware/detection/family/v2/index/family_name/search/Stuxnet/from/utc/2024-01-01T00:00:00?count=20&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "name": "Malware Detection Family Feed",
- "time_range": {
- "from": 1489968000,
- "to": 1490747180
}, - "entries": [
- {
- "record_on": 1489982689,
- "sha1": "dede1c573a4279ae9465e5e7fdf1d5a8445780fe",
- "priority": 5,
- "family_name": "Stuxnet",
- "sample_available": true,
- "container_hash": "dede1c573a4279ae9465e5e7fdf1d5a8445780fe",
- "sha256": "86be74f51dfea0f4ef3f3a17fcd731014295a311003aa7e0bf95fdda8cda5afe",
- "md5": "0833efc50a2ff6321fb6a05c73a71e15",
- "sample_size": 122880,
- "sample_type": "PE/Exe",
- "first_seen_on": 1489981980,
- "last_seen_on": 1489981980,
- "tags": {
- "actors": [
- "Equation Group",
- "Tilded Team",
- "Unit 8200",
- "EQGRP"
]
}
}, - {
- "record_on": 1490030360,
- "sha1": "9aadf6f3a7fa2453f2e5fe2da0696b4c11dad825",
- "priority": 5,
- "family_name": "Stuxnet",
- "sample_available": true,
- "container_hash": "9aadf6f3a7fa2453f2e5fe2da0696b4c11dad825",
- "sha256": "173b06087f8849672359a6ff9895af6715c2ac347718163fdd89ee901d5f6a71",
- "md5": "435e6fd45e91c9f9c268e7f111721f60",
- "sample_size": 2164423,
- "sample_type": "Binary/Archive/RAR",
- "first_seen_on": 1450349972,
- "last_seen_on": 1490030280,
- "tags": {
- "actors": [
- "Equation Group",
- "Tilded Team",
- "Unit 8200",
- "EQGRP"
]
}
}, - "..."
], - "family_name": "Stuxnet",
- "categories": [
- "apt"
]
}
}
}
TCA-0312-0316, TCA-0318: Vertical Feeds Search (latest)
The Vertical Feeds Search API allows users to get hashes of new malware samples from ReversingLabs Targeted and Industry-Specific File Indicator Feeds by searching for malware family names. Samples are included in the response based on the time when they were added to a particular feed. The results include additional metadata about each sample.
Authorizations:
path Parameters
family_name required | string Case-sensitive parameter; accepts a malware family name or a CVE identifier. |
query Parameters
count | integer [ 1 .. 1000 ] Default: 100 Optional parameter that specifies the number of hashes to return in the response. Setting this value too low may result in identical |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/feed/malware/detection/family/v2/index/family_name/search/Stuxnet/from/utc/2024-1-1T00:00:00?count=20&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "name": "Malware Detection Family Feed",
- "time_range": {
- "from": 1489968000,
- "to": 1490747180
}, - "entries": [
- {
- "record_on": 1489982689,
- "sha1": "dede1c573a4279ae9465e5e7fdf1d5a8445780fe",
- "priority": 5,
- "family_name": "Stuxnet",
- "sample_available": true,
- "container_hash": "dede1c573a4279ae9465e5e7fdf1d5a8445780fe",
- "sha256": "86be74f51dfea0f4ef3f3a17fcd731014295a311003aa7e0bf95fdda8cda5afe",
- "md5": "0833efc50a2ff6321fb6a05c73a71e15",
- "sample_size": 122880,
- "sample_type": "PE/Exe",
- "first_seen_on": 1489981980,
- "last_seen_on": 1489981980,
- "tags": {
- "actors": [
- "Equation Group",
- "Tilded Team",
- "Unit 8200",
- "EQGRP"
]
}
}, - {
- "record_on": 1490030360,
- "sha1": "9aadf6f3a7fa2453f2e5fe2da0696b4c11dad825",
- "priority": 5,
- "family_name": "Stuxnet",
- "sample_available": true,
- "container_hash": "9aadf6f3a7fa2453f2e5fe2da0696b4c11dad825",
- "sha256": "173b06087f8849672359a6ff9895af6715c2ac347718163fdd89ee901d5f6a71",
- "md5": "435e6fd45e91c9f9c268e7f111721f60",
- "sample_size": 2164423,
- "sample_type": "Binary/Archive/RAR",
- "first_seen_on": 1450349972,
- "last_seen_on": 1490030280,
- "tags": {
- "actors": [
- "Equation Group",
- "Tilded Team",
- "Unit 8200",
- "EQGRP"
]
}
}, - "..."
], - "family_name": "Stuxnet",
- "categories": [
- "apt"
]
}
}
}
TCA-0319: Start YARA Retro Hunt
The YARA Retro Hunting Administration API allows users to manage their own YARA retro hunts and retroactively match YARA rules against files from ReversingLabs Spectra Intelligence.
Authorizations:
Request Body schema: application/jsonrequired
ruleset_name
is a required parameter that specifies the name of the YARA ruleset for which the user is requesting an action from the service. The value must be a string containing the name of a YARA ruleset previously uploaded by the user. Only one ruleset name can be submitted in each request.
ruleset_name required | string [ 3 .. 48 ] characters ^[a-z,A-Z,0-9,_-]*$ |
Responses
Request samples
- Payload
- cURL for start-retro-hunt
- Cancel the retro hunt
{- "ruleset_name": "RAT_Ratdecoders"
}
Response samples
- 200
{- "ruleset_name": "Name of the requested YARA ruleset; corresponds to the string specified in the request",
- "ruleset_sha1": "SHA1 hash of the requested ruleset content"
}
TCA-0319: Cancel YARA Retro Hunt
The YARA Retro Hunting Administration API allows users to manage their own YARA retro hunts and retroactively match YARA rules against files from ReversingLabs Spectra Intelligence.
Authorizations:
Request Body schema: application/jsonrequired
ruleset_name
is a required parameter that specifies the name of the YARA ruleset for which the user is requesting an action from the service. The value must be a string containing the name of a YARA ruleset previously uploaded by the user. Only one ruleset name can be submitted in each request.
ruleset_name required | string [ 3 .. 48 ] characters ^[a-z,A-Z,0-9,_-]*$ |
Responses
Request samples
- Payload
- cURL for start-retro-hunt
- Cancel the retro hunt
{- "ruleset_name": "RAT_Ratdecoders"
}
Response samples
- 200
{- "ruleset_name": "Name of the requested YARA ruleset; corresponds to the string specified in the request",
- "ruleset_sha1": "SHA1 hash of the requested ruleset content"
}
TCA-0319: YARA Retro Hunting Status
The YARA Retro Hunting Administration API allows users to manage their own YARA retro hunts and retroactively match YARA rules against files from ReversingLabs Spectra Intelligence.
Authorizations:
path Parameters
ruleset_name required | string [ 3 .. 48 ] characters ^[a-z,A-Z,0-9,_-]*$ Example: RAT_Ratdecoders Required parameter used for checking the retro hunt status for the specified YARA ruleset. Only one ruleset name can be submitted in each request. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/yara/admin/v1/ruleset/ExampleRulesetName/status-retro-hunt' --user <username>:<password>
Response samples
- 200
{- "ruleset_name": "RAT_Ratdecoders",
- "retro_status": "IN_VALIDATION",
- "reason": "Description of the reason for the current status (if applicable)",
- "progress": "0",
- "start_time": "YYYY-MM-DDThh:mm:ss",
- "finish_time": "YYYY-MM-DDThh:mm:ss",
- "estimated_finish_time": "YYYY-MM-DDThh:mm:ss"
}
TCA-0319: YARA Retro Matches Feed
The YARA Retro Matches Feed API returns a recordset of YARA ruleset matches in the requested time range for the authenticated user. The feed will return at most 1000 records, starting from the earliest one. However, if a single second contains more than 1000 matches, all of them will be returned in a single query. When a ruleset reaches 10 000 matches, it will be capped and will no longer store new matches. To continue collecting new matches, the ruleset has to be created again under a new name.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Period between the time specified by this parameter and the time when the request is made. The earliest supported time value is May 20 2016 00:00h UTC (timestamp 1463702400). The latest supported time value is 10 seconds before the current time. The value must be in the format specified by the |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/feed/yara/retro/v1/query/timestamp/1463702400?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "name": "YARA Retro Match Continuous Feed",
- "time_range": {
- "from": 1489968000,
- "to": 1490747180
}, - "last_timestamp": 1489968900,
- "entries": [
- {
- "timestamp": 1489968000,
- "sha1": "dede1c573a4279ae9465e5e7fdf1d5a8445780fe",
- "file_type": "Sample file type",
- "file_size": "Sample file size",
- "ruleset_sha1": "SHA1 hash of the matched ruleset content",
- "ruleset_name": "Name of the matched ruleset",
- "rule": [
- {
- "identifier": "YARA rule identifier",
- "meta": "Meta fields",
- "tag": "Tags",
- "matched_data": [
- {
- "string_identifier": "encoded base64 string",
- "match_offset": "integer",
- "matched_string": "encoded base64 string"
}
]
}
], - "sample_available": "Indicates whether the sample is available for download"
}
]
}
}
}
TCA-0320: Advanced Search
The Advanced Search API allows users to find samples in ReversingLabs Spectra Intelligence by combining various search keywords. Some queries can be performed without using search keywords (non-keyword search), and bulk hash lookup is supported for hash-related keywords. The search is performed on a static data set that is updated daily. If no records are available for the requested search query, an empty response is returned. Note that the API implements limitations as to how many samples can be returned for a search query in one request and in total.
Authorizations:
Request Body schema: application/json
required | string or object |
page | integer Default: 1 |
records_per_page | integer Default: 10000 |
format | string Default: "xml" Enum: "xml" "json" Specifies the format for the response. |
sort | string Default: "firstseen desc" Sort by one of these fields: |
Responses
Request samples
- Payload
- bash
- Python
{- "query": "firstseen:[2017-06-20T00:00:00Z TO 2017-06-21T00:00:00Z] classification:[malicious, suspicious] threatname:win32",
- "page": 2,
- "format": "json",
- "records_per_page": 100,
- "sort": "threatname desc"
}
Response samples
- 200
{- "rl": {
- "web_search_api": {
- "more_pages": true,
- "total_count": 480000,
- "next_page": 2,
- "sample_count": 10,
- "entries": [
- {
- "available": true,
- "sha1": "1f0835afff6207ebe964101a1efefad46d62236c",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/NSIS",
- "antivirus": 39,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:12:12Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "b85be095c95906bfe0ddc760bd7b7baf2777a17e575dff7303c7b555525e890c",
- "md5": "15ec6716e14c6935da1d07435b6573b1",
- "size": 2732920
}, - {
- "available": true,
- "sha1": "2f8f779d45f2b1a0c775bdaaa5daaa5d68a06a72",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 35,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:10:07Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "7be37998370566b1bec6237ee92b7573c4527893aec35c4d994088033ef9519c",
- "md5": "1706fba09cb00c8ada8ce54df5a5428a",
- "size": 39758264
}, - {
- "available": true,
- "sha1": "3ed3ad2e70cdc84038217e091d8d89d42e9071d1",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 40,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:14:58Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "488753bc48e9e5ed0783f15f686a6377e7d0b3180f809d7508ac7d8265c841f0",
- "md5": "16fab27d7460c7ec941af5cc08e49b26",
- "size": 4634105
}, - {
- "available": true,
- "sha1": "405ba94ebced8751c79dad2914dfde258d8a930b",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 35,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:14:58Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "7c5ae2fb51327f4b9eff2e4ed7f37e1bcfe65c389a758e26ff7c1803829e5a34",
- "md5": "1652e403a5e6dae723547e192f82695e",
- "size": 36938765
}, - {
- "available": true,
- "sha1": "574fae621a168035d32f103aa990cd3dbdb74c79",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 37,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:16:47Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "2184609ee6f92669477f16d22b374d4ad07e7205af23ea13d3366b634e509321",
- "md5": "1622bb6805de0b02908aeddd9cb93044",
- "size": 16084668
}, - {
- "available": true,
- "sha1": "6c4327fd65930c637bc0c6a52919c4e6b5495516",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 35,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:12:12Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "d53f52bb67badd8ed7f28aef799d1cbf2d94b4bc21cebcb50a14d43c072e7754",
- "md5": "16223462158aa0ad7d220ea2f18a55de",
- "size": 39099758
}, - {
- "available": true,
- "sha1": "783af5edbc501e2fdfc8edc2f53e9aa5cdd62141",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 22,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2022-05-28T04:53:09Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "586a8ca04b05a039dc6fec7c0cff8cabdab5f2ec6883bda1422458db1114c1ac",
- "md5": "164e4899097d8ef9cca1edac2a774cf0",
- "size": 11389184
}, - {
- "available": true,
- "sha1": "7b3e4e227bfbcfc1f13b30691edb0f096719cc90",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 40,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:14:58Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "2e7a06dfcc8ed3cdff078599762bfa804366b5e6524b71c3ea2178d89034e38b",
- "md5": "1649e1f186e49b5c19e0c37e6542fc73",
- "size": 6029566
}, - {
- "available": true,
- "sha1": "8a625d835fcd689946a3dcbb4487cff88958d360",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 40,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:14:58Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "072a11f07e88d13dbbae70ee155c8dd5eab0ac535dde039803978c3b91d41f67",
- "md5": "16b20dd6cbb2a6684f09c38495bd9460",
- "size": 5909500
}, - {
- "available": true,
- "sha1": "8f4d37073952a4c77cac937686ca5ea85989e226",
- "classification": "MALICIOUS",
- "threatname": "Win32.Worm.Xolxo",
- "sampletype": "PE/Exe/UPX",
- "antivirus": 34,
- "firstseen": "2021-06-20T23:59:59Z",
- "lastseen": "2021-06-21T00:16:45Z",
- "trustfactor": 5,
- "filecount": 0,
- "threatlevel": 5,
- "sha256": "ef003d5876c938b010a5c4aff2e7c736a1acfadf41d21bca969ee835551676b4",
- "md5": "163c97d2d606a2175938c71cf4d4daf6",
- "size": 38040748
}
]
}
}
}
TCA-0321: RHA1 Analytics Single Query
The RHA1 Analytics API provides real-time statistics (counters) for malicious, suspicious and known samples that are functionally similar to the requested SHA1 hash at the requested precision level.
Authorizations:
path Parameters
rha1_type required | string Enum: "pe01" "elf01" "machO01" "pe02" Required parameter. A measure of RHA1 precision level; represents the degree to which a file is functionally similar to another file. The following precision levels are supported - 25% for PE, MachO and ELF files (expressed as pe01, elf01, machO01), and 50% for PE files (expressed as pe02). |
sha1 required | string Must be a valid SHA1 hash. |
query Parameters
extended | boolean Default: "false" Optional parameter. Supported values are true (sends the extended data set in the response) and false (sends only the list of SHA1 hashes). The default is false. If the extended option is selected, each SHA1 hash in the list will be expanded with additional metadata: classification, threat level, trust factor, malware family name, threat name, malware type, targeted platform and subplatform; SHA1, MD5, and SHA256 hashes; sample size, sample type, download availability, first and last seen dates (UTC). |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/rha1/analytics/v1/query/elf01/9c489fcaee9abedd736b474d7f9076d23ea2bb9b?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "unknown_hashes": [
- "70d1d32e783dac03a7000616e63207f17b996807"
], - "entries": [
- {
- "sha1": "70d1d32e783dac03a7000616e63207f17b996809",
- "rha1_type": "pe01",
- "rha1_first_seen": 1302388871000,
- "rha1_last_seen": 1657075523510,
- "sample_counters": {
- "known": 9029,
- "malicious": 19874,
- "suspicious": 743,
- "total": 29646
}
}, - {
- "sha1": "0dd1bc46e96d41591294e8c13c6eb7f6212be2ed",
- "rha1_type": "pe01",
- "rha1_first_seen": 1306365720000,
- "rha1_last_seen": 1656902874644,
- "sample_counters": {
- "known": 6,
- "malicious": 30199631,
- "suspicious": 0,
- "total": 30199637
}
}, - {
- "sha1": "57dafb1b1f5c0e0217fc90e25355386cb087886f",
- "rha1_type": "pe01",
- "rha1_first_seen": 1348848540000,
- "rha1_last_seen": 1654160693743,
- "sample_counters": {
- "known": 124,
- "malicious": 5,
- "suspicious": 1,
- "total": 130
}
}, - {
- "sha1": "eb7f7f9b7744d0f28ab82f8272fbe643e56a070c",
- "rha1_type": "pe01",
- "rha1_first_seen": 1300463554000,
- "rha1_last_seen": 1657109581618,
- "sample_counters": {
- "known": 586790,
- "malicious": 35193,
- "suspicious": 59,
- "total": 622042
}
}
]
}
}
TCA-0321: RHA1 Analytics Bulk Query
The RHA1 Analytics API provides real-time statistics (counters) for malicious, suspicious and known samples that are functionally similar to the requested SHA1 hash at the requested precision level.
Authorizations:
path Parameters
post_format required | string Enum: "xml" "json" Required parameter that defines the POST payload format. Supported options are xml and json. By default, the response format matches the format defined by this parameter. |
Request Body schema: application/jsonrequired
Up to 1000 hashes can be submitted in one request.
required | object | ||||||||||||
|
Responses
Request samples
- Payload
- bash
- Python
{- "rl": {
- "query": {
- "rha1_type": "pe01",
- "extended": false,
- "response_format": "json",
- "hashes": [
- "70d1d32e783dac03a7000616e63207f17b996809",
- "0dd1bc46e96d41591294e8c13c6eb7f6212be2ed",
- "57dafb1b1f5c0e0217fc90e25355386cb087886f",
- "eb7f7f9b7744d0f28ab82f8272fbe643e56a070c",
- "70d1d32e783dac03a7000616e63207f17b996807"
]
}
}
}
Response samples
- 200
{- "rl": {
- "unknown_hashes": [
- "70d1d32e783dac03a7000616e63207f17b996807"
], - "entries": [
- {
- "sha1": "70d1d32e783dac03a7000616e63207f17b996809",
- "rha1_type": "pe01",
- "rha1_first_seen": 1302388871000,
- "rha1_last_seen": 1639050216466,
- "sample_counters": {
- "known": 8809,
- "malicious": 19306,
- "suspicious": 795,
- "total": 28910
}
}, - {
- "sha1": "0dd1bc46e96d41591294e8c13c6eb7f6212be2ed",
- "rha1_type": "pe01",
- "rha1_first_seen": 1306365720000,
- "rha1_last_seen": 1639046654289,
- "sample_counters": {
- "known": 6,
- "malicious": 30193311,
- "suspicious": 3,
- "total": 30193320
}
}, - {
- "sha1": "57dafb1b1f5c0e0217fc90e25355386cb087886f",
- "rha1_type": "pe01",
- "rha1_first_seen": 1348848540000,
- "rha1_last_seen": 1638486763836,
- "sample_counters": {
- "known": 122,
- "malicious": 3,
- "suspicious": 1,
- "total": 126
}
}, - {
- "sha1": "eb7f7f9b7744d0f28ab82f8272fbe643e56a070c",
- "rha1_type": "pe01",
- "rha1_first_seen": 1300463554000,
- "rha1_last_seen": 1639050008713,
- "sample_counters": {
- "known": 577734,
- "malicious": 35170,
- "suspicious": 56,
- "total": 612960
}
}
]
}
}
TCA-9999: Customer Usage Single User Query
The Customer Usage Single User API allows ReversingLabs customers to track their usage of Spectra Intelligence services provisioned to their account. It returns the number of queries made in the requested date range for the current user account (the one that is sending the request). Some products may specify usage quotas in bytes instead of requests. In that case the number of used bytes is returned alongside the number of requests. Provisioned services with no registered usage in the requested date range are not included in the response.
Authorizations:
path Parameters
type required | string Enum: "daily" "date_range" "monthly" "yara" Example: daily Selects the type of query to run. |
query Parameters
date | string <date> Example: date=2020-04-28 Supported only when /daily is used in the endpoint path. Optional parameter that specifies the date for which customer usage information should be returned. Users can submit one value per request in the |
month | string Example: month=2020-04 Supported only when /monthly is used in the endpoint path. Optional parameter that specifies the month for which customer usage information should be returned. Users can submit one value per request in the |
from | string <date> Example: from=2020-01-17 Optional parameter that specifies the start date for the customer usage report. Must be used together with |
to | string <date> Example: to=2020-06-03 Optional parameter that specifies the end date for the customer usage report. Must be used together with |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python for specific month
curl --url 'https://data.reversinglabs.com/api/customer_usage/v1/usage/daily?from=2020-01-17&to=2020-06-03&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "date": "2020-02-01",
- "usage_report": [
- {
- "product": "TCA-0101 File Reputation",
- "number_of_queries": 13487257
}, - {
- "product": "TCAI-0011 Sample Submission Counter",
- "number_of_queries": 59,
- "used_bytes": 311816
}
]
}
}
TCA-9999: Customer Usage Company Query
The Customer Usage Company API allows ReversingLabs customers to track the usage of Spectra Intelligence services provisioned to all accounts in a company. It returns the combined usage for all accounts within the company the current user belongs to. Provisioned services with no registered usage in the requested date range are not included in the response.
Authorizations:
path Parameters
type required | string Enum: "daily" "monthly" "date_range" Example: daily Selects the type of query to run. |
query Parameters
date | string <date> Example: date=2020-04-28 Supported only when /daily is used in the endpoint path. Optional parameter that specifies the date for which customer usage information should be returned. Users can submit one value per request in the |
month | string Example: month=2020-04 Supported only when /monthly is used in the endpoint path. Optional parameter that specifies the month for which customer usage information should be returned. Users can submit one value per request in the |
from | string <date> Example: from=2020-01-17 Optional parameter that specifies the start date for the customer usage report. Must be used together with |
to | string <date> Example: to=2020-01-17 Optional parameter that specifies the end date for the customer usage report. Must be used together with |
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/customer_usage/v1/usage/company/daily?from=2020-01-17&to=2020-06-03&format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "month": "2020-06",
- "usage_report": [
- {
- "product": "TCA-0101 File Reputation",
- "number_of_queries": 1
}, - {
- "product": "TCA-0301 RHA Functional Similarity",
- "number_of_queries": 1
}, - {
- "product": "TCA-0312 APT Indicator Search",
- "number_of_queries": 1
}, - {
- "product": "TCF-0110 Data Change Feed",
- "number_of_queries": 3
}, - {
- "product": "TCAI-0011 Sample Submission Counter",
- "number_of_queries": 59,
- "used_bytes": 311816
}
]
}
}
TCA-9999: Quota Limits (single user)
This query returns current quota limits for APIs accessible to the authenticated user or users belonging to the authenticated user's company. Products are grouped into one object if they share the usage quota and access rights. This means that the same users and products can appear multiple times in the response.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/customer_usage/v1/limits?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "limits": [
- {
- "limit": 500000,
- "limit_type": "daily",
- "limit_exceeded": true,
- "products": [
- "TCA-0101 File Reputation",
- "TCA-0104 RLDATA",
- "TCA-0103 Historic Multi-AV Scan Records"
], - "users": [
- "user1",
- "user2",
- "user3"
]
}, - {
- "limit": 1000,
- "limit_type": "monthly",
- "limit_exceeded": false,
- "products": [
- "TCA-0301 RHA Functional Similarity"
], - "users": [
- "user1"
], - "start_date": "2022-09-15",
- "end_date": "2023-09-15"
}, - {
- "limit_size": {
- "value": 1000,
- "unit": "GB"
}
}, - {
- "limit_size_per_file": {
- "value": 1,
- "unit": "GB"
}, - "free_flex": {
- "limit_size": {
- "value": 1000,
- "unit": "GB"
}, - "start_date": "2022-01-10",
- "end_date": "2023-01-10"
}, - "limit_type": "date_range",
- "limit_exceeded": false,
- "products": [
- "TCAI-0011 Sample Submission Counter"
], - "users": [
- "user1"
], - "entitlements": {
- "hardening": true,
- "licenses": true,
- "malware": true,
- "max_package_size": 10737418240,
- "secrets": true,
- "tampering": true,
- "vulnerabilities": true
}
}
]
}
}
TCA-9999: Quota Limits (company)
This query returns current quota limits for APIs accessible to the authenticated user or users belonging to the authenticated user's company. Products are grouped into one object if they share the usage quota and access rights. This means that the same users and products can appear multiple times in the response.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl --url 'https://data.reversinglabs.com/api/customer_usage/v1/limits/company?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "limits": [
- {
- "limit": 500000,
- "limit_type": "daily",
- "limit_exceeded": true,
- "products": [
- "TCA-0101 File Reputation",
- "TCA-0104 RLDATA",
- "TCA-0103 Historic Multi-AV Scan Records"
], - "users": [
- "user1",
- "user2",
- "user3"
]
}, - {
- "limit": 1000,
- "limit_type": "monthly",
- "limit_exceeded": false,
- "products": [
- "TCA-0301 RHA Functional Similarity"
], - "users": [
- "user1"
], - "start_date": "2022-09-15",
- "end_date": "2023-09-15"
}, - {
- "limit_size": {
- "value": 1000,
- "unit": "GB"
}
}, - {
- "limit_size_per_file": {
- "value": 1,
- "unit": "GB"
}, - "limit_type": "date_range",
- "limit_exceeded": false,
- "products": [
- "TCAI-0011 Sample Submission Counter"
], - "users": [
- "user1"
], - "entitlements": {
- "hardening": true,
- "licenses": true,
- "malware": true,
- "max_package_size": 10737418240,
- "secrets": true,
- "tampering": true,
- "vulnerabilities": true
}
}
]
}
}
TCF-0101 New Malware - Files
This query returns malware detections from the requested timestamp. The feed will return 1000 records at most, or a little bit more than 1000 if there are some records with the same timestamp.
To fetch the next batch of records, use the timestamp from the response increased by 1.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/detection/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_detection_feed": {
- "entries": [
- {
- "sha1": "string",
- "sample_size": "string",
- "sample_type": "string",
- "platform": "string",
- "sha256": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0102 - 0106 New Malware - Platform Filtered
This service provides information about new malware samples with detections in the Spectra Intelligence system. The samples are filtered by platform.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
platform | string Enum: "Android" "Boot" "ByteCode" "Document" "DOS" "Firmware" "FreeBSD" "iOS" "Linux" "MacOS" "OS2" "Palm" "Script" "Symbian" "Unix" "Unknown" "Win32" "Win64" Example: platform=Android&platform=Linux One or more values from the list of supported platform names. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/detection/platform/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_detection_platform_feed": {
- "entries": [
- {
- "sha1": "string",
- "record_on": "string",
- "sample_type": "string",
- "platform": "string",
- "sha256": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0102 - 0106 New Malware - Platform Filtered (Start)
This query sets the starting timestamp for the pull
query.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
Responses
Request samples
- bash
- Python
curl --location --request PUT 'https://data.reversinglabs.com/api/feed/malware/detection/platform/v1/query/start/utc/2024-01-01T00:00:00' --user <username>:<password>
TCF-0102 - 0106 New Malware - Platform Filtered (Pull)
This service provides information about new malware samples with detections in the Spectra Intelligence system, starting with the timestamp defined with the start
query.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/detection/platform/v1/query/pull?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_detection_platform_feed": {
- "entries": [
- {
- "sha1": "string",
- "record_on": "string",
- "sample_type": "string",
- "platform": "string",
- "sha256": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0107 Files Scanned for the First Time (Continuous)
This service provides a continuous list of hashes for samples collected from various sources and scanned with the VTEST AV scanning system for the first time in Spectra Intelligence system.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/first_scan/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_first_scan_feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "sample_type": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0107 Files Scanned for the First Time (Start)
This query sets the starting timestamp for the pull
query.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
Responses
Request samples
- bash
- Python
curl --location --request PUT 'https://data.reversinglabs.com/api/feed/malware/first_scan/v1/query/start/utc/2024-01-01T00:00:00' --user <username>:<password>
TCF-0107 Files Scanned for the First Time (Pull)
This query returns a list of hashes for samples scanned for the first time, starting with the timestamp defined with the start
query.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/first_scan/v1/query/pull?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_first_scan_feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "sample_type": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0108 New Files - First and Re-Scan (Continuous)
This service provides a continuous list of samples in the Spectra Intelligence system which have been scanned for the first time or rescanned with the VTEST AV scanner system.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/scan/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_scan_feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "sample_type": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0108 New Files - First and Re-Scan (Start)
This query sets the starting timestamp for the pull
query.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
Responses
Request samples
- bash
- Python
curl --location --request PUT 'https://data.reversinglabs.com/api/feed/malware/scan/v1/query/start/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
TCF-0108 New Files - First and Re-Scan (Pull)
This query returns a list of hashes for scanned samples (first time or rescan), starting with the timestamp defined with the start
query.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/scan/v1/query/pull?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_scan_feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "sample_type": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0109 Files with Detection Changes (Continuous)
This service provides a continuous list of records about samples in the Spectra Intelligence system that show detection changes in their VTEST reports.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/scan/change/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_scan_change_feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "sample_type": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0109 Files with Detection Changes (Start)
This query sets the starting timestamp for the pull
query.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
Responses
Request samples
- bash
- Python
curl --location --request PUT 'https://data.reversinglabs.com/api/feed/malware/scan/change/v1/query/start/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
TCF-0109 Files with Detection Changes (Pull)
This query returns a list of hashes for scanned samples (first time scan or detection change), starting with the timestamp defined with the start
query.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/scan/change/v1/query/pull?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_scan_change_feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "sample_type": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0111 MWP Change Events Feed (Continuous)
This service provides a continuous list of records about samples in the Spectra Intelligence system that show detection changes in their VTEST reports.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com//api/feed/mwp_change_events/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "mwp_change_events_feed": {
- "entries": [
- {
- "sha1": "string",
- "record_on": "string",
- "event_type": "string",
- "classification": "string",
- "sample_size": "string",
- "sample_type": "string",
- "threat_name": "string",
- "sha256": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0111 MWP Change Events Feed (Start)
This query sets the starting timestamp for the pull
query.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
Responses
Request samples
- bash
- Python
curl --location --request PUT 'https://data.reversinglabs.com//api/feed/mwp_change_events/v1/query/start/utc/2024-01-01T00:00:00' --user <username>:<password>
TCF-0111 MWP Change Events Feed (Pull)
This query returns a list of hashes for scanned samples (first time scan or detection change), starting with the timestamp defined with the start
query.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/mwp_change_events/v1/query/pull?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "mwp_change_events_feed": {
- "entries": [
- {
- "sha1": "string",
- "record_on": "string",
- "event_type": "string",
- "classification": "string",
- "sample_size": "string",
- "sample_type": "string",
- "threat_name": "string",
- "sha256": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0601 Certificate Feed API (time range)
This service provides certificate information alongside the information about associated samples signed with the certificate(s). The feed includes valid certificates and self-signed certificates used in impersonation attempts. The information is delivered as a feed. The feed stores records for the last 365 days.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | number [ 1 .. 100 ] Default: 100 The maximum number of records to return in the certificate feed. |
extended | boolean Default: false Enum: true false Example: extended=false The extended data set contains more metadata for samples. |
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/certificate/v1/query/from/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "certificate_feed": [
- {
- "container_sha1": "05f59db3f54d47b7d80a06c057cc68739969352c",
- "signatures": {
- "counter_signatures": [
- {
- "counter_signatures": null,
- "certificate": {
- "valid_from": "2022-04-06T07:41:58Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2033-05-08T07:41:58Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature"
}, - {
- "is_critical": "True",
- "name": "X509v3 Extended Key Usage",
- "value": "Time Stamping"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "5B:6B:7B:F4:70:74:08:C1:0D:2A:C8:EF:F1:C4:B9:40:D2:4A:C6:FD"
}, - {
- "is_critical": "False",
- "name": "X509v3 Certificate Policies",
- "value": "Policy: 1.3.6.1.4.1.4146.1.30\n CPS: https://www.globalsign.com/repository/\n"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:FALSE"
}, - {
- "is_critical": "False",
- "name": "Authority Information Access",
- "value": "OCSP - URI:http://ocsp.globalsign.com/ca/gstsacasha384g4\nCA Issuers - URI:http://secure.globalsign.com/cacert/gstsacasha384g4.crt\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:EA:16:C6:69:E7:E3:CB:57:45:39:33:A4:F0:40:BE:D0:C3:BD:65:96\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 CRL Distribution Points",
- "value": "Full Name:\n URI:http://crl.globalsign.com/ca/gstsacasha384g4.crl\n"
}
], - "signature": "2E6B3E8F7FB0B060D9F19D84DC95B6DF5F0DBF2451E31A06AA5504CB61C1EF6571AE0BFD94245700C7E4F60CBC18957D2F196A6033A6BED008555604B6E3FE1EBBE51076543BAB5C215E2A354D46CBA64CBA044060602CDBD3F69DDECA32100C78B0BB56C5074B70BCA70FAB72BC8DCBEBEEC14C6BD9FA98A1743EE9A8C8797C767748FDCFE3F00DC1E9C392E0070C132F3F6B7F35D9D5B7EE6F7C58C0F13F0C19B202A3494C9C04C3F0B497A7E04D6A25BA34166266C878BC6973AA5F72A235581E26EBBF3214AA127AEBF4966B7F72ACEAA739083301363E61247E119D111E762254E340BB2E860C769E69D2C41C3DA20B8C88040354DEE91B17FE2C2B9ED9D65B2238FC644086CD177FE1A99FB9BF9241A86F266AF40F28B04091902F4EB67650BC4D23D97F4F6B9329A76CE7D0303EA9931FC2502B39C5B2F84D2724D1FD76D8BEF993F4A9540AD57658D13C9EEA1AE824C4FB36F12F59D392C3ECCB60521E1C462508FF7ED993AE1495A8868A072E548B734C371538505687F14FAE1C8FC9A16C2F0BFCBB1C6F2DBDAAB6EB6823F0ED94271463CBACF4678A2C81D3141218013F847AAEEC47603F685899C94AC2A1991505C2ADDEA2EFD7A7557CBC841B4D94BB8E4A8544D9813DAAA325555FA46BCD366C00F9FF72DE5AECFFC9A041961A406A85911CAF7563A8CB5A33B594337EB28D0F73BE87FCAF3A731F7B20DB72",
- "common_name": "Globalsign TSA for MS Authenticode Advanced - G4",
- "serial_number": "0148903DC28ABCA7A1194D0C1C57B829",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "abbab631b4b8926f6f4f4ed197d4b885"
}, - {
- "name": "SHA1",
- "value": "31030e176aa4592eab2c8bade83299fcb5585dcf"
}, - {
- "name": "SHA256",
- "value": "E5C526FBD114DAA4C3719CC8E2BE718A04084CAE1298D95F322692036066BAEE"
}
], - "issuer": {
- "valid_from": "2018-06-20T00:00:00Z",
- "signature_algorithm": "sha384WithRSAEncryption",
- "valid_to": "2034-12-10T00:00:00Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature, Certificate Sign, CRL Sign"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:TRUE, pathlen:0"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "EA:16:C6:69:E7:E3:CB:57:45:39:33:A4:F0:40:BE:D0:C3:BD:65:96"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:AE:6C:05:A3:93:13:E2:A2:E7:E2:D7:1C:D6:C7:F0:7F:C8:67:53:A0\n"
}, - {
- "is_critical": "False",
- "name": "Authority Information Access",
- "value": "OCSP - URI:http://ocsp2.globalsign.com/rootr6\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 CRL Distribution Points",
- "value": "Full Name:\n URI:http://crl.globalsign.com/root-r6.crl\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Certificate Policies",
- "value": "Policy: X509v3 Any Policy\n CPS: https://www.globalsign.com/repository/\n"
}
], - "signature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
- "common_name": "GlobalSign Timestamping CA - SHA384 - G4",
- "serial_number": "01EC1C9240DEFD2E405D7C4774",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "52508c97e039d3e94d7e0b5ae8b99f8d"
}, - {
- "name": "SHA1",
- "value": "f585500925786f88e721d235240a2452ae3d23f9"
}, - {
- "name": "SHA256",
- "value": "F642418E4D0C63DEC785C960EFA68BA745F38851744EF81F225CB89305314D50"
}
], - "issuer": {
- "valid_from": "2014-12-10T00:00:00Z",
- "signature_algorithm": "sha384WithRSAEncryption",
- "valid_to": "2034-12-10T00:00:00Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Certificate Sign, CRL Sign"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:TRUE"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "AE:6C:05:A3:93:13:E2:A2:E7:E2:D7:1C:D6:C7:F0:7F:C8:67:53:A0"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:AE:6C:05:A3:93:13:E2:A2:E7:E2:D7:1C:D6:C7:F0:7F:C8:67:53:A0\n"
}
], - "signature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
- "common_name": "GlobalSign",
- "serial_number": "45E6BB038333C3856548E6FF4551",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "4fdd07e4d42264391e0c3742ead1c6ae"
}, - {
- "name": "SHA1",
- "value": "8094640eb5a7a1ca119c1fddd59f810263a7fbd1"
}, - {
- "name": "SHA256",
- "value": "2CABEAFE37D06CA22ABA7391C0033D25982952C453647349763A3AB5AD6CCF69"
}
], - "issuer": "GlobalSign"
}
}
}
}
], - "certificate": {
- "valid_from": "2022-06-14T04:02:43Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2025-07-12T07:06:34Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature"
}, - {
- "is_critical": "False",
- "name": "Authority Information Access",
- "value": "CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt\nOCSP - URI:http://ocsp.globalsign.com/gsgccr45evcodesignca2020\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Certificate Policies",
- "value": "Policy: 1.3.6.1.4.1.4146.1.2\n CPS: https://www.globalsign.com/repository/\nPolicy: 2.23.140.1.3\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Basic Constraints",
- "value": "CA:FALSE"
}, - {
- "is_critical": "False",
- "name": "X509v3 CRL Distribution Points",
- "value": "Full Name:\n URI:http://crl.globalsign.com/gsgccr45evcodesignca2020.crl\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Extended Key Usage",
- "value": "Code Signing"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:25:9D:D0:FC:59:09:86:63:C5:EC:F3:B1:13:3B:57:1C:03:92:36:11\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "B9:8B:D3:79:F7:03:DC:12:78:E5:28:C2:AF:E8:61:4D:3E:E1:AC:E3"
}
], - "signature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
- "common_name": "Reallusion Inc.",
- "serial_number": "67C6DAAFB381A5567534EB0F",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "3b5d3951bd5930863767cd86a4ba27c5"
}, - {
- "name": "SHA1",
- "value": "e18af391a8ba1ae94eb61794c573c5a9856c80d3"
}, - {
- "name": "SHA256",
- "value": "A481635184832F09BC3D3921A335634466C4C6FC714D8BBD89F65E827E5AF1B1"
}
], - "issuer": "GlobalSign GCC R45 EV CodeSigning CA 2020"
}
}, - "classification": "KNOWN",
- "certificate_status": "undefined",
- "sample_available": "False",
- "first_seen": "2022-09-14 08:06:05",
- "threat_level": "0",
- "trust_factor": "5",
- "sample_type": "PE+/Dll",
- "inserted_on": "2022-09-14 08:38:37",
- "sha256": "b4684dfb5e482ce8a229839ab371a5f196d3c84ce8c57a916616b38af5d9a9bb",
- "pe_sha256": "37f0e0e3d17de5ca6658e5df717698a...",
- "certificate_first_seen": "2022-09-14 08:05:10",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "3b5d3951bd5930863767cd86a4ba27c5"
}, - {
- "name": "SHA1",
- "value": "e18af391a8ba1ae94eb61794c573c5a9856c80d3"
}, - {
- "name": "SHA256",
- "value": "A481635184832F09BC3D3921A335634466C4C6FC714D8BBD89F65E827E5AF1B1"
}
], - "md5": "e60244db3a6aa2779de6d30803f8b95e",
- "sha1": "05f59db3f54d47b7d80a06c057cc68739969352c",
- "pe_sha1": "412c9e1fafbd0188bad7bdd77ef1fbe85d484768",
- "sample_size": "5312776",
- "validation": [
- "untrusted certificate"
], - "last_seen": "2022-09-14 08:38:28"
}
], - "next_page": "166314471761f18aaffd0b8bc4d96ce43b55ed044d8cde6c8c",
- "request": {
- "limit": 1,
- "response_format": "json"
}
}
}
TCF-0601 Certificate Feed API (time range) (paginated)
This service provides certificate information alongside the information about associated samples signed with the certificate(s). The feed includes valid certificates and self-signed certificates used in impersonation attempts. The information is delivered as a feed. The feed stores records for the last 365 days.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
page required | string The pagination value for the next page is provided in the previous request response. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | number [ 1 .. 100 ] Default: 100 The maximum number of records to return in the certificate feed. |
extended | boolean Default: false Enum: true false Example: extended=false The extended data set contains more metadata for samples. |
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/certificate/v1/query/from/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "certificate_feed": [
- {
- "container_sha1": "05f59db3f54d47b7d80a06c057cc68739969352c",
- "signatures": {
- "counter_signatures": [
- {
- "counter_signatures": null,
- "certificate": {
- "valid_from": "2022-04-06T07:41:58Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2033-05-08T07:41:58Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature"
}, - {
- "is_critical": "True",
- "name": "X509v3 Extended Key Usage",
- "value": "Time Stamping"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "5B:6B:7B:F4:70:74:08:C1:0D:2A:C8:EF:F1:C4:B9:40:D2:4A:C6:FD"
}, - {
- "is_critical": "False",
- "name": "X509v3 Certificate Policies",
- "value": "Policy: 1.3.6.1.4.1.4146.1.30\n CPS: https://www.globalsign.com/repository/\n"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:FALSE"
}, - {
- "is_critical": "False",
- "name": "Authority Information Access",
- "value": "OCSP - URI:http://ocsp.globalsign.com/ca/gstsacasha384g4\nCA Issuers - URI:http://secure.globalsign.com/cacert/gstsacasha384g4.crt\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:EA:16:C6:69:E7:E3:CB:57:45:39:33:A4:F0:40:BE:D0:C3:BD:65:96\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 CRL Distribution Points",
- "value": "Full Name:\n URI:http://crl.globalsign.com/ca/gstsacasha384g4.crl\n"
}
], - "signature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
- "common_name": "Globalsign TSA for MS Authenticode Advanced - G4",
- "serial_number": "0148903DC28ABCA7A1194D0C1C57B829",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "abbab631b4b8926f6f4f4ed197d4b885"
}, - {
- "name": "SHA1",
- "value": "31030e176aa4592eab2c8bade83299fcb5585dcf"
}, - {
- "name": "SHA256",
- "value": "E5C526FBD114DAA4C3719CC8E2BE718A04084CAE1298D95F322692036066BAEE"
}
], - "issuer": {
- "valid_from": "2018-06-20T00:00:00Z",
- "signature_algorithm": "sha384WithRSAEncryption",
- "valid_to": "2034-12-10T00:00:00Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature, Certificate Sign, CRL Sign"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:TRUE, pathlen:0"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "EA:16:C6:69:E7:E3:CB:57:45:39:33:A4:F0:40:BE:D0:C3:BD:65:96"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:AE:6C:05:A3:93:13:E2:A2:E7:E2:D7:1C:D6:C7:F0:7F:C8:67:53:A0\n"
}, - {
- "is_critical": "False",
- "name": "Authority Information Access",
- "value": "OCSP - URI:http://ocsp2.globalsign.com/rootr6\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 CRL Distribution Points",
- "value": "Full Name:\n URI:http://crl.globalsign.com/root-r6.crl\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Certificate Policies",
- "value": "Policy: X509v3 Any Policy\n CPS: https://www.globalsign.com/repository/\n"
}
], - "signature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
- "common_name": "GlobalSign Timestamping CA - SHA384 - G4",
- "serial_number": "01EC1C9240DEFD2E405D7C4774",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "52508c97e039d3e94d7e0b5ae8b99f8d"
}, - {
- "name": "SHA1",
- "value": "f585500925786f88e721d235240a2452ae3d23f9"
}, - {
- "name": "SHA256",
- "value": "F642418E4D0C63DEC785C960EFA68BA745F38851744EF81F225CB89305314D50"
}
], - "issuer": {
- "valid_from": "2014-12-10T00:00:00Z",
- "signature_algorithm": "sha384WithRSAEncryption",
- "valid_to": "2034-12-10T00:00:00Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Certificate Sign, CRL Sign"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:TRUE"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "AE:6C:05:A3:93:13:E2:A2:E7:E2:D7:1C:D6:C7:F0:7F:C8:67:53:A0"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:AE:6C:05:A3:93:13:E2:A2:E7:E2:D7:1C:D6:C7:F0:7F:C8:67:53:A0\n"
}
], - "signature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
- "common_name": "GlobalSign",
- "serial_number": "45E6BB038333C3856548E6FF4551",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "4fdd07e4d42264391e0c3742ead1c6ae"
}, - {
- "name": "SHA1",
- "value": "8094640eb5a7a1ca119c1fddd59f810263a7fbd1"
}, - {
- "name": "SHA256",
- "value": "2CABEAFE37D06CA22ABA7391C0033D25982952C453647349763A3AB5AD6CCF69"
}
], - "issuer": "GlobalSign"
}
}
}
}
], - "certificate": {
- "valid_from": "2022-06-14T04:02:43Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2025-07-12T07:06:34Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "True",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature"
}, - {
- "is_critical": "False",
- "name": "Authority Information Access",
- "value": "CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt\nOCSP - URI:http://ocsp.globalsign.com/gsgccr45evcodesignca2020\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Certificate Policies",
- "value": "Policy: 1.3.6.1.4.1.4146.1.2\n CPS: https://www.globalsign.com/repository/\nPolicy: 2.23.140.1.3\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Basic Constraints",
- "value": "CA:FALSE"
}, - {
- "is_critical": "False",
- "name": "X509v3 CRL Distribution Points",
- "value": "Full Name:\n URI:http://crl.globalsign.com/gsgccr45evcodesignca2020.crl\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Extended Key Usage",
- "value": "Code Signing"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:25:9D:D0:FC:59:09:86:63:C5:EC:F3:B1:13:3B:57:1C:03:92:36:11\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "B9:8B:D3:79:F7:03:DC:12:78:E5:28:C2:AF:E8:61:4D:3E:E1:AC:E3"
}
], - "signature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
- "common_name": "Reallusion Inc.",
- "serial_number": "67C6DAAFB381A5567534EB0F",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "3b5d3951bd5930863767cd86a4ba27c5"
}, - {
- "name": "SHA1",
- "value": "e18af391a8ba1ae94eb61794c573c5a9856c80d3"
}, - {
- "name": "SHA256",
- "value": "A481635184832F09BC3D3921A335634466C4C6FC714D8BBD89F65E827E5AF1B1"
}
], - "issuer": "GlobalSign GCC R45 EV CodeSigning CA 2020"
}
}, - "classification": "KNOWN",
- "certificate_status": "undefined",
- "sample_available": "False",
- "first_seen": "2022-09-14 08:06:05",
- "threat_level": "0",
- "trust_factor": "5",
- "sample_type": "PE+/Dll",
- "inserted_on": "2022-09-14 08:38:37",
- "sha256": "b4684dfb5e482ce8a229839ab371a5f196d3c84ce8c57a916616b38af5d9a9bb",
- "pe_sha256": "37f0e0e3d17de5ca6658e5df717698a...",
- "certificate_first_seen": "2022-09-14 08:05:10",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "3b5d3951bd5930863767cd86a4ba27c5"
}, - {
- "name": "SHA1",
- "value": "e18af391a8ba1ae94eb61794c573c5a9856c80d3"
}, - {
- "name": "SHA256",
- "value": "A481635184832F09BC3D3921A335634466C4C6FC714D8BBD89F65E827E5AF1B1"
}
], - "md5": "e60244db3a6aa2779de6d30803f8b95e",
- "sha1": "05f59db3f54d47b7d80a06c057cc68739969352c",
- "pe_sha1": "412c9e1fafbd0188bad7bdd77ef1fbe85d48...",
- "sample_size": "5312776",
- "validation": [
- "untrusted certificate"
], - "last_seen": "2022-09-14 08:38:28"
}
], - "next_page": "166314471761f18aaffd0b8bc4d96ce43b55ed044d8cde6c8c",
- "request": {
- "limit": 1,
- "response_format": "json"
}
}
}
TCF-0601 Certificate Feed API (latest)
This service provides certificate information alongside the information about associated samples signed with the certificate(s). The feed includes valid certificates and self-signed certificates used in impersonation attempts. The information is delivered as a feed. The feed stores records for the last 365 days.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | number [ 1 .. 100 ] Default: 100 The maximum number of records to return in the certificate feed. |
extended | boolean Default: false Enum: true false Example: extended=false The extended data set contains more metadata for samples. |
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/certificate/v1/query/latest?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "certificate_feed": [
- {
- "container_sha1": "d3c8a28b6e0b4c97aafcf2ea91c3b91cbf6fd294",
- "signatures": {
- "counter_signatures": null,
- "certificate": {
- "valid_from": "2022-07-26T03:28:48Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2023-07-25T00:00:00Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "False",
- "name": "X509v3 Extended Key Usage",
- "value": "1.3.6.1.4.1.311.10.3.24, 1.3.6.1.4.1.311.10.3.37, 1.3.6.1.4.1.311.10.3.6, Code Signing"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Alternative Name",
- "value": "DirName:/OU=Microsoft Operations Puerto Rico/serialNumber=232770+464922"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:D1:95:9E:10:CC:93:86:CF:14:43:A2:B9:FA:7A:A0:91:5C:E4:41:19\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "1C:FF:0B:20:AF:14:48:AB:9F:5E:0B:C3:E9:25:8C:54:37:B7:32:93"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:FALSE"
}
], - "signature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
- "common_name": "Microsoft Windows",
- "serial_number": "4511C27EE01099834FCE3BC0F9C05AA1",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "a64b8d29c958315d482db0e37de12f11"
}, - {
- "name": "SHA1",
- "value": "1c46222fe1f776e2d410807c04f0e23834ec1a37"
}, - {
- "name": "SHA256",
- "value": "C79CDA1BAF6C5008E51AAB7A3200495FFDED771B200558C9D7A4A2D70C0F40BF"
}
], - "issuer": {
- "valid_from": "2022-07-26T03:28:47Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2037-07-26T00:10:00Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "False",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature, Certificate Sign, CRL Sign"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:TRUE"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:AF:D0:13:42:DD:C7:0F:0F:7B:4F:10:F8:6E:5E:85:8A:64:EA:AC:94\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "D1:95:9E:10:CC:93:86:CF:14:43:A2:B9:FA:7A:A0:91:5C:E4:41:19"
}
], - "signature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
- "common_name": "Microsoft Windows Production PCA 2011",
- "serial_number": "70D6517E6CEFE6B44153C21A1CAD49A5",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "ded6ec8ca1938a39006f7e59470bdbe0"
}, - {
- "name": "SHA1",
- "value": "ecd68fb4561e68724f4a4d0bba1bac9a8c170cb4"
}, - {
- "name": "SHA256",
- "value": "01BDCB7396F817F2B77B555B2BED12D2DBE5D46F0F7B14B492F49C133BAC93A5"
}
], - "issuer": "Microsoft Root Certificate Authority 2010"
}
}
}, - "malware_type": "Trojan",
- "classification": "MALICIOUS",
- "certificate_status": "undefined",
- "threat_name": "Win32.Trojan.Vilsel",
- "sample_available": "True",
- "first_seen": "2022-09-19 09:45:38",
- "threat_level": "5",
- "trust_factor": "5",
- "malware_family": "Vilsel",
- "sample_type": "PE/Exe",
- "platform": "Win32",
- "inserted_on": "2022-09-19 09:57:16",
- "sha256": "b8918b580370d0a02c2eaf7fa9846b08948085204bf34fb935977bd491ebc49c",
- "pe_sha256": "37f0e0e3d17de5ca6658e5df717698a...",
- "certificate_first_seen": "2022-08-03 11:43:01",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "a64b8d29c958315d482db0e37de12f11"
}, - {
- "name": "SHA1",
- "value": "1c46222fe1f776e2d410807c04f0e23834ec1a37"
}, - {
- "name": "SHA256",
- "value": "C79CDA1BAF6C5008E51AAB7A3200495FFDED771B200558C9D7A4A2D70C0F40BF"
}
], - "md5": "7fb1a979d1e723f6c3f86941a33c1f00",
- "sha1": "d3c8a28b6e0b4c97aafcf2ea91c3b91cbf6fd294",
- "pe_sha1": "01ca2faea18907eab8eae228b3535ee080486cec",
- "sample_size": "461668",
- "validation": [
- "bad signature",
- "malformed certificate",
- "impersonation attempt",
- "untrusted certificate"
], - "last_seen": "2022-09-19 09:57:10"
}
], - "next_page": "1663581436f53e0d3087f2428f3480ebe514c55e98b58c62c1",
- "request": {
- "limit": 1,
- "classification": "MALICIOUS",
- "response_format": "json"
}
}
}
TCF-0601 Certificate Feed API (latest) (paginated)
This service provides certificate information alongside the information about associated samples signed with the certificate(s). The feed includes valid certificates and self-signed certificates used in impersonation attempts. The information is delivered as a feed. The feed stores records for the last 365 days.
Authorizations:
path Parameters
page required | string The pagination value for the next page is provided in the previous request response |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
limit | number [ 1 .. 100 ] Default: 100 The maximum number of records to return in the certificate feed. |
extended | boolean Default: false Enum: true false Example: extended=false The extended data set contains more metadata for samples. |
classification | string Enum: "known" "malicious" "suspicious" "unknown" Example: classification=malicious Optional parameter that allows filtering the results by their classification status. If this parameter is provided in the request, the response will include only those samples that match the requested status. Supported values are: known, malicious, suspicious, unknown (case-insensitive). |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/certificate/v1/query/latest?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "certificate_feed": [
- {
- "container_sha1": "d3c8a28b6e0b4c97aafcf2ea91c3b91cbf6fd294",
- "signatures": {
- "counter_signatures": null,
- "certificate": {
- "valid_from": "2022-07-26T03:28:48Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2023-07-25T00:00:00Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "False",
- "name": "X509v3 Extended Key Usage",
- "value": "1.3.6.1.4.1.311.10.3.24, 1.3.6.1.4.1.311.10.3.37, 1.3.6.1.4.1.311.10.3.6, Code Signing"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Alternative Name",
- "value": "DirName:/OU=Microsoft Operations Puerto Rico/serialNumber=232770+464922"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:D1:95:9E:10:CC:93:86:CF:14:43:A2:B9:FA:7A:A0:91:5C:E4:41:19\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "1C:FF:0B:20:AF:14:48:AB:9F:5E:0B:C3:E9:25:8C:54:37:B7:32:93"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:FALSE"
}
], - "signature": "7D252E8DCD3101139E4B52176D98239F81D2A7188C06DBF2F03A36CCB2C64A6ABB93B148EF2B27EED6DFCA9CB572BA5DCCB71A7B6EA6E10F2C1A1574295B7FE1F600BFB4424025B7C0167639612203A1E642D94921D7C62DEC6F93647F3E22B7261BA1792D4D301D6C893DBC5CB093A5F4BC3131766691932FF25CA8649E6424D6713CC0AC901E5F3833425A6F12AD86EBD98900C1F5A645913D805151F1A46CE29871A69D543A4A9FB2E6C84C67432F35DCCB93F3216CBE9B7BBF94F7FA74A06CD43DA8FE45155313DE5BE4FC61C8181E5765508E505EE6F81B931D71698DC38383407B6310640FC555F0C49224B9BBE820C9F25B37693F7626C0E63FE8D922",
- "common_name": "Microsoft Windows",
- "serial_number": "4511C27EE01099834FCE3BC0F9C05AA1",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "a64b8d29c958315d482db0e37de12f11"
}, - {
- "name": "SHA1",
- "value": "1c46222fe1f776e2d410807c04f0e23834ec1a37"
}, - {
- "name": "SHA256",
- "value": "C79CDA1BAF6C5008E51AAB7A3200495FFDED771B200558C9D7A4A2D70C0F40BF"
}
], - "issuer": {
- "valid_from": "2022-07-26T03:28:47Z",
- "signature_algorithm": "sha256WithRSAEncryption",
- "valid_to": "2037-07-26T00:10:00Z",
- "version": "2",
- "extensions": [
- {
- "is_critical": "False",
- "name": "X509v3 Key Usage",
- "value": "Digital Signature, Certificate Sign, CRL Sign"
}, - {
- "is_critical": "True",
- "name": "X509v3 Basic Constraints",
- "value": "CA:TRUE"
}, - {
- "is_critical": "False",
- "name": "X509v3 Authority Key Identifier",
- "value": "keyid:AF:D0:13:42:DD:C7:0F:0F:7B:4F:10:F8:6E:5E:85:8A:64:EA:AC:94\n"
}, - {
- "is_critical": "False",
- "name": "X509v3 Subject Key Identifier",
- "value": "D1:95:9E:10:CC:93:86:CF:14:43:A2:B9:FA:7A:A0:91:5C:E4:41:19"
}
], - "signature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
- "common_name": "Microsoft Windows Production PCA 2011",
- "serial_number": "70D6517E6CEFE6B44153C21A1CAD49A5",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "ded6ec8ca1938a39006f7e59470bdbe0"
}, - {
- "name": "SHA1",
- "value": "ecd68fb4561e68724f4a4d0bba1bac9a8c170cb4"
}, - {
- "name": "SHA256",
- "value": "01BDCB7396F817F2B77B555B2BED12D2DBE5D46F0F7B14B492F49C133BAC93A5"
}
], - "issuer": "Microsoft Root Certificate Authority 2010"
}
}
}, - "malware_type": "Trojan",
- "classification": "MALICIOUS",
- "certificate_status": "undefined",
- "threat_name": "Win32.Trojan.Vilsel",
- "sample_available": "True",
- "first_seen": "2022-09-19 09:45:38",
- "threat_level": "5",
- "trust_factor": "5",
- "malware_family": "Vilsel",
- "sample_type": "PE/Exe",
- "platform": "Win32",
- "inserted_on": "2022-09-19 09:57:16",
- "sha256": "b8918b580370d0a02c2eaf7fa9846b08948085204bf34fb935977bd491ebc49c",
- "pe_sha256": "37f0e0e3d17de5ca6658e5df717698a...",
- "certificate_first_seen": "2022-08-03 11:43:01",
- "certificate_thumbprints": [
- {
- "name": "MD5",
- "value": "a64b8d29c958315d482db0e37de12f11"
}, - {
- "name": "SHA1",
- "value": "1c46222fe1f776e2d410807c04f0e23834ec1a37"
}, - {
- "name": "SHA256",
- "value": "C79CDA1BAF6C5008E51AAB7A3200495FFDED771B200558C9D7A4A2D70C0F40BF"
}
], - "md5": "7fb1a979d1e723f6c3f86941a33c1f00",
- "sha1": "d3c8a28b6e0b4c97aafcf2ea91c3b91cbf6fd294",
- "pe_sha1": "412c9e1fafbd0188bad7bdd77ef1fbe85d484768",
- "sample_size": "461668",
- "validation": [
- "bad signature",
- "malformed certificate",
- "impersonation attempt",
- "untrusted certificate"
], - "last_seen": "2022-09-19 09:57:10"
}
], - "next_page": "1663581436f53e0d3087f2428f3480ebe514c55e98b58c62c1",
- "request": {
- "limit": 1,
- "classification": "MALICIOUS",
- "response_format": "json"
}
}
}
TCF-0301 Network IOCs Feed
Returns information about malicious URLs from 3rd party sources and URLs from which we have downloaded malicious files.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware_uri/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_uri_feed": {
- "entries": [
- {
- "record_on": "string",
- "uri": "string",
- "samples": [
- {
- "threat_name": "string",
- "sha1": "string",
- "sha256": "string"
}
], - "uri_type": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0301 Network IOCs Feed (latest)
Returns information about malicious URLs from 3rd party sources and URLs from which we have downloaded malicious files.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware_uri/v1/query/latest?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "malware_uri_feed": {
- "entries": [
- {
- "record_on": "string",
- "uri": "string",
- "samples": [
- {
- "threat_name": "string",
- "sha1": "string",
- "sha256": "string"
}
], - "uri_type": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0201 CVEs Exploited in the Wild (by date)
This query returns a document containing a list of all detected CVE identifiers for the requested day.
Authorizations:
path Parameters
date required | string <date> Example: 2020-04-20 |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/cve/v1/2024-01-01' --user <username>:<password>
Response samples
- 200
2021-04-20 CVE-2021-3156 CVE-2021-27065 CVE-2021-26855 CVE-2021-26411 CVE-2021-21206 CVE-2021-1732 CVE-2021-1647 CVE-2020-7961 CVE-2020-3153 CVE-2020-16040 CVE-2020-1472 CVE-2020-1054 CVE-2020-1048 CVE-2020-0796 CVE-2019-7123 CVE-2019-2725 CVE-2019-1405 CVE-2019-1132 CVE-2019-0841
TCF-0201 CVEs Exploited in the Wild (latest)
Use the “latest” endpoint to retrieve results from the latest day for which we have data.
Authorizations:
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/cve/v1/latest' --user <username>:<password>
Response samples
- 200
2021-04-20 CVE-2021-3156 CVE-2021-27065 CVE-2021-26855 CVE-2021-26411 CVE-2021-21206 CVE-2021-1732 CVE-2021-1647 CVE-2020-7961 CVE-2020-3153 CVE-2020-16040 CVE-2020-1472 CVE-2020-1054 CVE-2020-1048 CVE-2020-0796 CVE-2019-7123 CVE-2019-2725 CVE-2019-1405 CVE-2019-1132 CVE-2019-0841
TCF-0201 CVEs Exploited in the Wild (all)
Use this query to fetch all CVE identifiers detected since the creation of this feed.
Authorizations:
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/cve/v1/all_cves' --user <username>:<password>
Response samples
- 200
2021-04-20 CVE-2021-3156 CVE-2021-27065 CVE-2021-26855 CVE-2021-26411 CVE-2021-21206 CVE-2021-1732 CVE-2021-1647 CVE-2020-7961 CVE-2020-3153 CVE-2020-16040 CVE-2020-1472 CVE-2020-1054 CVE-2020-1048 CVE-2020-0796 CVE-2019-7123 CVE-2019-2725 CVE-2019-1405 CVE-2019-1132 CVE-2019-0841
TCF-0202 Reports on CVEs Exploited in the Wild
This query returns a document containing the list of malware hashes (SHA1, SHA256, MD5), threat names, and threat counts associated with CVE identifiers for the requested day.
Authorizations:
path Parameters
time_format required | string Enum: "utc" "date" Example: date Specifies the time format for the time_value parameter. |
time_value required | string Accepts values formatted according to the format set in the time_format parameter. |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/report/cve/daily/v1/query/date/2024-01-01?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "cve_daily_report": {
- "time_range": {
- "from": "string",
- "to": "string"
}, - "entries": [
- {
- "cve_id": "string",
- "total_count": 0,
- "single_scan": {
- "count": 0,
- "samples": [
- {
- "sha256": "string",
- "sha1": "string",
- "threat_names": [
- { }
], - "md5": "string"
}
]
}, - "multiple_scan": {
- "count": 0,
- "samples": [
- {
- "sha256": "string",
- "sha1": "string",
- "threat_names": [
- { }
], - "md5": "string"
}
]
}
}
]
}
}
}
TCF-0202 Reports on CVEs Exploited in the Wild (latest)
This query returns a document containing the list of malware hashes (SHA1, SHA256, MD5), threat names, and threat counts associated with CVE identifiers for the latest day for which we have data.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/report/cve/daily/v1/query/latest?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "cve_daily_report": {
- "time_range": {
- "from": "string",
- "to": "string"
}, - "entries": [
- {
- "cve_id": "string",
- "total_count": 0,
- "single_scan": {
- "count": 0,
- "samples": [
- {
- "sha256": "string",
- "sha1": "string",
- "threat_names": [
- { }
], - "md5": "string"
}
]
}, - "multiple_scan": {
- "count": 0,
- "samples": [
- {
- "sha256": "string",
- "sha1": "string",
- "threat_names": [
- { }
], - "md5": "string"
}
]
}
}
]
}
}
}
TCF-0203 New Exploit or CVE Samples Found In-the-Wild (Hourly List)
This service provides a list of new file hashes that contain CVE or Exploit Identification and that are detected within the requested one-hour period in the Spectra Intelligence system.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
active_cve | boolean Default: true Enum: true false Example: active_cve=true When true (default), returns only exploits with active CVE identifiers. When false, returns only exploit candidates. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/detection/exploit/hourly/v2/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "entries": [
- {
- "scanner_count": "string",
- "first_seen_on": "string",
- "cve_id": "string",
- "scanner_percent": "string",
- "md5": "string",
- "sha1": "string",
- "record_on": "string",
- "scanner_match": "string",
- "last_seen_on": "string",
- "sample_type": "string",
- "active_cve": "string",
- "sha256": "string"
}
], - "name": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0203 New Exploit or CVE Samples Found In-the-Wild (Hourly List) - latest
This query returns the results from the latest hour for which we have data.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
active_cve | boolean Default: true Enum: true false Example: active_cve=true When true (default), returns only exploits with active CVE identifiers. When false, returns only exploit candidates. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/detection/exploit/hourly/v2/query/latest?format=json&sample_available=true' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "entries": [
- {
- "scanner_count": "string",
- "first_seen_on": "string",
- "cve_id": "string",
- "scanner_percent": "string",
- "md5": "string",
- "sha1": "string",
- "record_on": "string",
- "scanner_match": "string",
- "last_seen_on": "string",
- "sample_type": "string",
- "active_cve": "string",
- "sha256": "string"
}
], - "name": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0204 New Exploit and CVE Samples Found In-the-Wild (Daily List)
This service provides per-day information about new file hashes in the Spectra Intelligence system that contain CVE or Exploit identifications.
Authorizations:
path Parameters
time_format required | string Enum: "utc" "date" Example: date Specifies the time format for the time_value parameter. |
time_value required | string Accepts values formatted according to the format set in the time_format parameter. |
query Parameters
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
format | string Default: "xml" Enum: "xml" "json" "htsv" Specifies the format in which the resulting data will be returned. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/exploit/daily/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "sample_type": "string"
}
], - "name": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0204 New Exploit and CVE Samples Found In-the-Wild (Daily List) - latest
Use the “latest” endpoint to retrieve results from the latest day for which we have data.
Authorizations:
query Parameters
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
format | string Default: "xml" Enum: "xml" "json" "htsv" Example: format=json Specifies the format in which the resulting data will be returned. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/exploit/daily/v1/query/latest?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "sample_type": "string"
}
], - "name": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0501 Whitelisted Files - New
This query returns a list of newly whitelisted samples since the requested time.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/whitelisted/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "whitelisted_feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "record_on": "string",
- "platform": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0501 Whitelisted Files - New (Start)
This query sets the starting timestamp for the pull
query.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
Responses
Request samples
- bash
- Python
curl --location --request PUT 'https://data.reversinglabs.com/api/feed/whitelisted/v1/query/start/utc/2024-01-01T00:00:00' --user <username>:<password>
TCF-0501 Whitelisted Files - New (Pull)
This query returns a list of newly whitelisted samples, starting with the timestamp defined with the start
query.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
sample_available | boolean Default: false Enum: true false Example: sample_available=true If |
limit | number [ 0 .. 1000 ] Default: 1000 Example: limit=1000 The number of records to return in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/whitelisted/v1/query/pull?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "whitelisted_feed": {
- "entries": [
- {
- "sha256": "string",
- "sha1": "string",
- "record_on": "string",
- "platform": "string",
- "md5": "string"
}
], - "last_timestamp": "string",
- "time_range": {
- "to": "string",
- "from": "string"
}
}
}
}
TCF-0502 Whitelisted Files - Changes
This query returns the samples which changed their whitelist status since the requested time.
Authorizations:
path Parameters
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/whitelisted_change/v1/query/utc/2024-01-01T00:00:00?format=json' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "whitelisted_change_feed": {
- "entries": [
- {
- "sha256": "ec235efd03ca219ba0bb00608ca19defab47a364e5754ca299edf5ecc93aacb0",
- "sha1": "deadaadf1279f72db1dc1af0be2532fbad6005ff",
- "record_on": "2022-10-19T05:09:52",
- "platform": "Windows",
- "md5": "264c6e0d8aac808ce9a8558c1aaa32c2"
}, - {
- "sha256": "c3475665abbade4ce9ea3aced069dcf7e063ef202fce1417f74a5db3cea6f5a5",
- "sha1": "25cef601b3c1446c5c19d64fc8cc7d6e9bc5bbf1",
- "record_on": "2022-10-19T06:32:22",
- "platform": "Windows",
- "md5": "a2f1e1666d4a4afd9b2faeb4c566cbd6"
}, - {
- "sha256": "c2227d138b14ec1c7a6bf76d41a15313f6c04c49d0be0bd525827e439b85d19d",
- "sha1": "a4e3d814ca7a25106851ba0febdea7f8e699d360",
- "record_on": "2022-10-19T07:02:49",
- "platform": "Archive",
- "md5": "3cc0694ca98883a0185f97e2f542cd37"
}, - {
- "sha256": "d6a6ce01d9bf3d7e1bb2d85992db4b2828977ac30688a9d7507515e1b496bd3e",
- "sha1": "c0296967675fbe3ffc1fe08c67019343030343a6",
- "record_on": "2022-10-19T07:15:20",
- "platform": "Windows",
- "md5": "4413e7623452de5c814e0d1e9f809253"
}, - {
- "sha256": "873a5f1afa27b3af906c829b5f3668e8b6ca507c8785e6654b668135aba6e24e",
- "sha1": "416c81403a687733ba0746589c1e10d114530f7d",
- "record_on": "2022-10-19T07:32:13",
- "platform": "Windows",
- "md5": "a194da7f2aa34f74fb60e8f712dacd14"
}, - {
- "sha256": "3bb434e2e8c3113750d0c9fe982ca04372798cd4e1e3a644dd017a5d0d61c269",
- "sha1": "72420e47b7a86f5f357f4092a7fac363763acb67",
- "record_on": "2022-10-19T07:32:19",
- "platform": "Windows",
- "md5": "72becad16ddadcabc44515c4a06c058a"
}, - {
- "sha256": "5ea2d4fb351dcdfa8f0cc11502b24b86639136e57792708bf234a4aa91159f50",
- "sha1": "973ccd3b8b52da43f1a05fc442147bc326708ac5",
- "record_on": "2022-10-19T07:51:11",
- "platform": "Windows",
- "md5": "a4c146d10be4d0de2635d67282d2ebdd"
}, - {
- "sha256": "8d291ccdd53fb3ce41de0a7d6a89318ac6fd03f213246cb79bf295045a9b3191",
- "sha1": "8cf1473837381a7ebc2db5410a4bc228c330a32b",
- "record_on": "2022-10-19T07:54:43",
- "platform": "Android",
- "md5": "62e0acbe1f2118018456ff4a44412636"
}, - {
- "sha256": "e1d2af9df556a080bd7fb7d8ba034b5c4c7a0227af56a7db5f61f80e7da8ddd1",
- "sha1": "3158b5467f49eb7e88662871ce7122694a14e400",
- "record_on": "2022-10-19T08:20:58",
- "platform": "Windows",
- "md5": "f28f0407a63620910d100771ee3e76c4"
}, - {
- "sha256": "bbd4da85069adc7af9d527dcdb6a5665ee4a3b3d91f609b4e8b65e78a3fab5d3",
- "sha1": "ceaec29ede24613b538eb80e4a1c4a8726611b37",
- "record_on": "2022-10-19T08:58:49",
- "platform": "Windows",
- "md5": "885233fdde4fe5439a40e6565a9a9340"
}, - {
- "sha256": "8b3bb153795d692b17dda95772a16a640b7c332f877d2b58705ca6ec3e3a9c9e",
- "sha1": "f855580ab634d9db3f1443b866ef29796dfccedd",
- "record_on": "2022-10-19T08:59:35",
- "platform": "Windows",
- "md5": "a53a905df32bac48de55c1ebf600d94b"
}, - {
- "sha256": "00b50ba3edc0db703900bcff143ae2cfe3f997e60720a3736459c9c4c6bd2869",
- "sha1": "3dab75d6f1ee073b230870417e609a612149d17b",
- "record_on": "2022-10-19T09:01:22",
- "platform": "Windows",
- "md5": "40e484b00bfc9e79e5bc0f139e783c81"
}, - {
- "sha256": "af5205deb32cf3ccc0073ea696754ae581b5fcf5513a0c3e6a0d13957a5336e4",
- "sha1": "96b6177c0c39e3549bf3ffac4d0a9350df7086bf",
- "record_on": "2022-10-19T09:08:11",
- "platform": "Windows",
- "md5": "6c333d4724ffc8a209e22e8e582077c8"
}, - {
- "sha256": "cba4c7c333ea7042cb3387dda142963e127a865f4f38de4c5ab6faffab5ada59",
- "sha1": "5b2cfa6c613633847dff86e7e5837bcbe69c643a",
- "record_on": "2022-10-19T09:08:16",
- "platform": "Windows",
- "md5": "ae197e33638dc60e9196ef1c81e4305c"
}, - {
- "sha256": "a26351f9bda43420e84ec98399cb38efcfbe5f26e0dcfe1ddab665571b07f6fa",
- "sha1": "a8f8ac39ff8f306e0397623cb0f05aad13cc54ca",
- "record_on": "2022-10-19T09:08:17",
- "platform": "Windows",
- "md5": "d92abe825987feddc135cc9316ca0ad9"
}, - {
- "sha256": "8b0eee095baf514b412a4a73166c0a04c778f5637d7b3f86f0288fe39f95fb50",
- "sha1": "4383b3391ae3e8d05b9adb168b746a03da012170",
- "record_on": "2022-10-19T09:08:20",
- "platform": "Windows",
- "md5": "c5b2f1f15bea82bd0dcd811cad53e713"
}, - {
- "sha256": "180f44858f0cedc0a451672b0fe40df3db85dcdef7328b8709ee64fae1c99b59",
- "sha1": "3e4673818fb3a413bca3b62dcf406d103e597eca",
- "record_on": "2022-10-19T09:15:31",
- "platform": "Windows",
- "md5": "54521b989fabc9085d1c1677071b33b9"
}, - {
- "sha256": "b3ae3c18e186f072f2347a8f8b2d6d0a2539190671606731d23aac48791f0654",
- "sha1": "036de0617a97010a169d2a93f8be361c5e792fa4",
- "record_on": "2022-10-19T09:21:31",
- "platform": "Windows",
- "md5": "7bcff3f841906b229ebea22e3039eb7a"
}, - {
- "sha256": "8fd87f768a5fb52967b30a36c619e8749e4936e38a3b7a86ff2ac63f1cadd8c7",
- "sha1": "90304af5202303ef8e7b6af00f2daa347503e8e7",
- "record_on": "2022-10-19T09:23:13",
- "platform": "Windows",
- "md5": "221e48f69495e3d7e47a23173ed93a50"
}, - {
- "sha256": "ee5e53c5f7593569693e084eb4cc880974bc0ee50f7e92eb7994b4f32b0855e0",
- "sha1": "7043a6aa077e7393d54e2a7c97fc89ddc9f2380a",
- "record_on": "2022-10-19T09:24:52",
- "platform": "Windows",
- "md5": "817fbe7132ebcbbbd600d3bef9e60a1e"
}, - {
- "sha256": "cf806610ae8abe98ebe05a6300e7785de4d428cafeadc3a897ea81c2e16aeeed",
- "sha1": "dd38b5950460c9d9ec1f06fb828ae891fb0445b4",
- "record_on": "2022-10-19T09:29:09",
- "platform": "Windows",
- "md5": "c679759e5f321c998cc663e755161677"
}, - {
- "sha256": "ce4a3af26fd29ed9e8d82fe7228d8f2c2e61f5ce29b675e85c54cb98f7c3ab95",
- "sha1": "d9197ca22dbde2a9860358c2372a3a7617b39751",
- "record_on": "2022-10-19T09:29:09",
- "platform": "Windows",
- "md5": "00c1246d70a7ffa62a58ab789136873c"
}, - {
- "sha256": "83ba75b434194631c8d6b5ff5c7630ffb18bdae05ec4c7f9abe8441a90d3d08c",
- "sha1": "4377ba411c751b3c58ffd306269b0527c9cab4d1",
- "record_on": "2022-10-19T09:41:37",
- "platform": "Windows",
- "md5": "4cb015dc6f152203c82fc63a72178473"
}, - {
- "sha256": "1aad765f1c013e06286970f21a6f46c7c6a48ef611532d89f968493863e3d1dc",
- "sha1": "6c9900bcbdf3272e1914366d8f9e3c976e1e92ee",
- "record_on": "2022-10-19T09:41:40",
- "platform": "Windows",
- "md5": "0bb0de0df7b22824fe88d8c8eb3319c1"
}, - {
- "sha256": "b1924351cb5247815a0164bb079546eb8b7701aa8da62a14491d4ad9737485e8",
- "sha1": "34bd44f3787b3180c15658f87d203d93dda921b2",
- "record_on": "2022-10-19T09:41:49",
- "platform": "Windows",
- "md5": "cddf4ee4dcbf50e51bf61accf58e1ca2"
}, - {
- "sha256": "962e7523483d04bb41ce24abb3c3de9a801d15e70263b04d33b46f7d60ec2dea",
- "sha1": "a6aab49ceebc11a6c31afb13a6948ae128cd61e6",
- "record_on": "2022-10-19T09:43:56",
- "platform": "Windows",
- "md5": "e3b7c8a9695ebd4fe3dafd984a5447d5"
}, - {
- "sha256": "e57fe2e56933beb542b5c19579e977857e5e027217601a88976ce16ec7d30e81",
- "sha1": "094a518aae9ac8c98b2fe550c116a2ec33c9420b",
- "record_on": "2022-10-19T10:13:40",
- "platform": "Windows",
- "md5": "476a805fa7608b65d15ae579b2b2fdac"
}, - {
- "sha256": "8aeabffe09764fccf735af73dd0fdc4839061f323e5dcd33e1a004a5167f2e8f",
- "sha1": "ec38441f1902de042f948e6ef97e55dd045c4b79",
- "record_on": "2022-10-19T10:43:50",
- "platform": "Windows",
- "md5": "ee9b9932672bd2c4cb811959e11e50d0"
}, - {
- "sha256": "cc234ece46598f2772d401e837ed241b5a011a6f9dc0337cac87b93afd61a183",
- "sha1": "198a814f75fe06cb533c05c74c45468d615696ad",
- "record_on": "2022-10-19T11:00:41",
- "platform": "Windows",
- "md5": "3532b17b831c7a632b3782ffb9328e89"
}, - {
- "sha256": "c63fb9f3262f09c8b791513615d43e2b24548e0c1b1f8a2d73d0d486a1d05cbb",
- "sha1": "4ce1929a72630c2e533bbec5dfa926895cc2182c",
- "record_on": "2022-10-19T11:08:25",
- "platform": "Windows",
- "md5": "bf97e301f304dc629aa612455b8a3264"
}, - {
- "sha256": "e4dd461c055c1dbb71c2f99eab10b724f6d56edf1550f52fb328ead0e382f7cf",
- "sha1": "0aed8c128339a4315401f70d8f782df4b91a06ce",
- "record_on": "2022-10-19T11:41:48",
- "platform": "Windows",
- "md5": "e757236f229f0d5b264b7ba92b595f3f"
}, - {
- "sha256": "4de42c366687a6af1f66d5263ba1a64a44b01fca922541b69c67f73cb5f01fa4",
- "sha1": "2c725baff966a2052fb2b26f048251f9551e8287",
- "record_on": "2022-10-19T11:50:12",
- "platform": "Windows",
- "md5": "1690c0d75bc8eb211954bd88a817512d"
}, - {
- "sha256": "1a31e7e2ab3cd56e4edd5023d5313b30ab8167552a7a8126b9ea1e68eb6758a9",
- "sha1": "e99760e58087ca73c9e12ec84929d89288ded099",
- "record_on": "2022-10-19T11:52:50",
- "platform": "Windows",
- "md5": "4ce6e943c1e43596a15458c6b6f9e54c"
}, - {
- "sha256": "bb98b7cc74348798ec85a513198682b80f3a70b80ca9d488a31f5f40e82de45f",
- "sha1": "7a4844c9ea534eb988c4e41e3aad48d06cdaa28b",
- "record_on": "2022-10-19T11:54:23",
- "platform": "Windows",
- "md5": "7c29d9bd72ef7978dd0be41380fd1966"
}
], - "last_timestamp": "2022-10-19T11:54:23",
- "time_range": {
- "to": "2022-10-19T11:54:23",
- "from": "2022-10-19T00:00:00"
}
}
}
}
TCF-0502 Whitelisted Files - Changes (latest)
This query returns the 1000 latest samples which changed their whitelist status.
Authorizations:
query Parameters
format | string Default: "xml" Enum: "xml" "json" "tsv" Example: format=tsv Optional parameter that allows choosing the response format. Supported values: xml, json, tsv. When the parameter is not included in the request, defaults to xml. |
Responses
Response samples
- 200
{- "rl": {
- "whitelisted_change_feed": {
- "entries": [
- {
- "sha256": "bb98b7cc74348798ec85a513198682b80f3a70b80ca9d488a31f5f40e82de45f",
- "sha1": "7a4844c9ea534eb988c4e41e3aad48d06cdaa28b",
- "record_on": "2022-10-19T11:54:23",
- "platform": "Windows",
- "md5": "7c29d9bd72ef7978dd0be41380fd1966"
}, - {
- "sha256": "df53f4d58c85750012fa695d84cf11de206fafefa3a8b1cf84bdd79294fb4277",
- "sha1": "e764103aa58bcecb547c4e747d548f0da38c7d74",
- "record_on": "2022-10-19T12:09:05",
- "platform": "Windows",
- "md5": "181d47e3004e11730d80fb260193412e"
}
], - "last_timestamp": 1666181345,
- "time_range": {
- "to": "2022-10-19T12:09:05",
- "from": "2022-10-19T11:54:23"
}
}
}
}
TCF-0401-0406 (time range)
ReversingLabs Targeted and Industry-Specific Indicators are early-warning feeds that provide information about new malware samples detected in the ReversingLabs Spectra Intelligence system. The samples are filtered by category. Every category corresponds to one feed. The feeds are specialized collections of malware families that are known to have significant impact within specific industries (Retail, Financial), as well as of malware families that share a common trait (exploits, ransomware). ReversingLabs carefully selects malware families for each feed based on public and internal research. The feed stores records for the last 365 days.
Authorizations:
path Parameters
category required | string Enum: "apt" "financial" "ransomware" "retail" "exploit" "configuration" Example: apt
|
time_format required | string Enum: "timestamp" "utc" Required parameter that specifies the time format for the |
time_value required | string Example: 2020-04-20T00:00:00 Accepts values in the format set by |
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
count | number [ 1 .. 1000 ] Default: 100 Allows specifying how many of the latest hashes in the selected category should be returned in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/detection/family/v2/query/apt/utc/2024-01-01T00:00:00?format=json&count=200' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "name": "string",
- "time_range": {
- "from": 0,
- "to": 0
}, - "entries": [
- {
- "record_on": 0,
- "sha1": "string",
- "priority": 0,
- "family_name": "string",
- "sample_available": true,
- "container_hash": "string",
- "sha256": "string",
- "md5": "string",
- "sample_size": 0,
- "sample_type": "string",
- "first_seen_on": 0,
- "last_seen_on": 0,
- "cvssv3": {
- "attack_vector": "string",
- "integrity_impact": "string",
- "attack_complexity": "string",
- "cvssv3_base_score": 0,
- "availability_impact": "string",
- "confidentiality_impact": "string"
}, - "tags": {
- "versions": [
- { }
], - "affects": [
- { }
], - "actors": [
- { }
]
}
}
], - "category": "string"
}
}
}
TCF-0401-0406 (latest)
ReversingLabs Targeted and Industry-Specific Indicators are early-warning feeds that provide information about new malware samples detected in the ReversingLabs Spectra Intelligence system. The samples are filtered by category. Every category corresponds to one feed. The feeds are specialized collections of malware families that are known to have significant impact within specific industries (Retail, Financial), as well as of malware families that share a common trait (exploits, ransomware). ReversingLabs carefully selects malware families for each feed based on public and internal research. The feed stores records for the last 365 days.
Authorizations:
path Parameters
category required | string Enum: "apt" "financial" "ransomware" "retail" "exploit" "configuration" Example: apt
|
query Parameters
format | string Default: "xml" Enum: "xml" "json" Example: format=json Optional parameter that allows choosing the response format. Supported values: xml, json. When the parameter is not included in the request, defaults to xml. |
count | number [ 1 .. 1000 ] Default: 100 Allows specifying how many of the latest hashes in the selected category should be returned in the response. |
Responses
Request samples
- bash
- Python
curl 'https://data.reversinglabs.com/api/feed/malware/detection/family/v2/query/apt/latest?format=json&count=200' --user <username>:<password>
Response samples
- 200
{- "rl": {
- "feed": {
- "name": "string",
- "time_range": {
- "from": 0,
- "to": 0
}, - "entries": [
- {
- "record_on": 0,
- "sha1": "string",
- "priority": 0,
- "family_name": "string",
- "sample_available": true,
- "container_hash": "string",
- "sha256": "string",
- "md5": "string",
- "sample_size": 0,
- "sample_type": "string",
- "first_seen_on": 0,
- "last_seen_on": 0,
- "cvssv3": {
- "attack_vector": "string",
- "integrity_impact": "string",
- "attack_complexity": "string",
- "cvssv3_base_score": 0,
- "availability_impact": "string",
- "confidentiality_impact": "string"
}, - "tags": {
- "versions": [
- { }
], - "affects": [
- { }
], - "actors": [
- { }
]
}
}
], - "category": "string"
}
}
}