VMRay

Version: 1.2.0

VMRay Threat Identifier (VTI) identifies and flags malicious behavior in an uploaded file, generating an overall severity score of malicious behavior.

Connect VMRay with LogicHub

  1. Navigate to Automations > Integrations.
  2. Search for VMRay.
  3. Click Details, then the + icon. Enter the required information in the following fields.
    • Label: Enter a connection name.
    • Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
    • Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
    • Remote Agent: Run this integration using the LogicHub Remote Agent.
    • Server URL (optional): The Server URL to connect to the VMRay (Default is https://cloud.vmray.com).
    • API Key: The API key to connect to the VMRay.
  4. After you've entered all the details, click Connect.

Actions for VMRay

Check File

Upload file and retrieve VTI score.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input Name

Description

Required

File ID

Jinja-templated text containing the file Id.

Required

File Name

Jinja-templated text containing the file name.

Optional

Output

A JSON object containing multiple rows of result:

  • has_error: True/False
  • error: message/null
  • result: List of events
{
    "has_error": false,
    "result":{
        "vmray_score":"not_suspicious"
  },
    "error": null
}

Release Notes

  • v1.2.0 - Added optional field File Name in Check File action.
  • v1.1.1 - Added documentation link in the automation library.

Did this page help you?
© 2017-2021 LogicHub®. All Rights Reserved.