icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading VirusTotal App
SHA256 checksum (virustotal-app_120.tgz) 613785044be8db97aa5e7603c3f218559180bab505e971e000930cf815bf9050 SHA256 checksum (virustotal-app_111.tgz) ed06a9bb6ce16423831915cae37225f9474c8c567309b11c254a78af804b5396 SHA256 checksum (virustotal-app_110.tgz) 30a7ad0cbdb82adca191249e0cea1275b80687483a421943abff2a677afb3f0f SHA256 checksum (virustotal-app_100.tgz) 689011b72246859842cfeffb2e59cb98ddcba833a505b403b235662fcdcba3bf
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

VirusTotal App

Splunk Cloud
Overview
Details
VirusTotal App for Splunk

VirusTotal App for Splunk is a lightweight Splunk App that allows you to enrich your security events with file reputation data retrieved from [VirusTotal](https://www.virustotal.com/), using the existing IOC Reputation API.

This app provides a custom search command that accepts file hashes (MD5, SHA-1, or SHA-256), IP addresses, URLs, and domains, and queries the corresponding VirusTotal endpoints to retrieve relevant threat intelligence data — all without submitting new files or URLs for analysis.


Key Features

- Provides a custom SPL command (`vt`) that is easy to integrate into searches
- Supports enrichment of multiple IOCs types: file hashes, IP addresses, URLs, and domains
- Compatible with file hash formats: MD5, SHA-1, and SHA-256
- Automatically selects and queries the appropriate VirusTotal API endpoint based on the indicator type
- Enrich data with stats, categorizations, tags, detection details by antivirus engines, and much more
- Designed to work efficiently within automated alert enrichment pipelines
- Includes a user-friendly UI for configuring the VirusTotal API key
- Lightweight by design — no dashboards, saved searches, or additional objects
- Fully compatible with Splunk Enterprise and Splunk Cloud

VirusTotal App for Splunk

VirusTotal App for Splunk is a lightweight Splunk App that allows you to enrich your security events with file reputation data retrieved from VirusTotal, using the existing IOC Reputation API.

This app provides a custom search command that accepts file hashes (MD5, SHA-1, or SHA-256), IP addresses, URLs, and domains, and queries the corresponding VirusTotal endpoints to retrieve relevant threat intelligence data — all without submitting new files or URLs for analysis.

Key Features

  • Provides a custom SPL command (vt) that is easy to integrate into searches
  • Supports enrichment of multiple IOCs types: file hashes, IP addresses, URLs, and domains
  • Compatible with file hash formats: MD5, SHA-1, and SHA-256
  • Automatically selects and queries the appropriate VirusTotal API endpoint based on the indicator type
  • Enrich data with stats, categorizations, tags, detection details by antivirus engines, and much more
  • Designed to work efficiently within automated alert enrichment pipelines
  • Includes a user-friendly UI for configuring the VirusTotal API key
  • Lightweight by design — no dashboards, saved searches, or additional objects
  • Fully compatible with Splunk Enterprise and Splunk Cloud

Why Choose This App?

While there are other Splunk apps and add-ons that integrate with VirusTotal, many of them include dashboards, saved searches, or additional components that may not be required for all environments.

This app is intentionally lightweight and minimalistic.
It focuses solely on providing a custom search command (vt) to interact with the VirusTotal API for file, url, domain and ip reputation checks, without introducing:

  • No dashboards
  • No knowledge objects
  • No inputs or scheduled tasks
  • No unnecessary UI components

This makes it ideal for security teams who:

  • Prefer to build their own dashboards or alerts
  • Need API-based enrichment integrated directly into SPL queries
  • Value minimal dependencies and transparency in behavior

Use Cases

  • Forensic Analysis: Verify if a file hash, IP address, URL, or domain has been reported as malicious by security vendors.
  • Alert Enrichment: Add contextual threat intelligence to security events containing IOCs (Indicators of Compromise).
  • Threat Hunting: Investigate suspicious entities such as external connections, downloads, or domains seen in your environment.
  • Automation of Decisions: Enrich events automatically and take actions based on reputation (e.g., block an IP, quarantine a file, escalate an alert).

Requirements

  • Valid VirusTotal API key (free or commercial)
  • HTTPS connectivity from the Splunk environment to the VirusTotal API endpoint

Example Usages

Example 1: Enrich events with VirusTotal reputation based on hash event field

index=security_logs sourcetype=malware_alerts
| vt hash=file_hash_sha256
| where last_analysis_stats_malicious > 5

Example 2: Query manually for a specific hash without any input events

| makeresults
| vt hash="178ba564b39bd07577e974a9b677dfd86ffa1f1d0299dfd958eb883c5ef6c3e1"
| where last_analysis_stats_malicious > 5

Release Notes

Version 1.2.0
June 29, 2025
  • Added new option to get URL, Domain and IPs reports.
    Examples:
    ... | vt url="https://example.com"
    ... | vt domain="example.com"
    ... | vt ip="8.8.8.8"
Version 1.1.1
June 24, 2025
  • Splunk Cloud App Vetting changes
Version 1.1.0
June 24, 2025
  • Added new capability to set up a proxy connection
  • Renamed vthash command to vt
  • Fixed bug loading Splunk libraries
  • Added CHANGELOG.md and README.md files
Version 1.0.0
June 13, 2025

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.