PolySwarmPolySwarmPolySwarmPolySwarm
Go to PolySwarm
Home

Searching with the UI

PolySwarm supports Hash Searching, Metadata Searching and IOC Searching. This section will cover how to use these functions in the UI.

Hash Searching

Searching by Hash allows you to find Artifacts that match a given hash. We support searching by MD5, SHA1, and SHA256.

Hashes can be entered into the multi-use text box below the “Select file” button on the Scan page. They can also be entered into the text box on the Search page’s Hash Searching tab.

On the Hash Searching tab, clicking the "Search Multiple" toggle above the search box will allow the user to enter a list of hashes to be searched. When multiple hashes are searched, the hash results will display in the same order as the list of hashes provided.

Hash Search Results

Hash search results are listed on the Search -> Hash Searching tab. The below covers what is displayed in the table once you search a hash.

Searching Hash

Button What is it for?
Hash SHA256 hash of the Artifact with the file MIME type.
PolyScore Threat scoring algorithm that provides the probability that a given file contains Malware. One being the highest number and will contain Malware, Zero being the least chance.
Scan Date Date that the Artifact was last scanned by the Engines.
Detections Detections column shows the engine detection results, which can be one of Four items:
  • M/T (Malicious/Total) - Where Malicious is the number of engines that found the artifact to be malicious and Total is the total number of engines that analyzed the artifact.
  • Scan Now - This means we have an artifact matching the hash, but it has not been scanned. Click on "Scan Now" to trigger a scan of that artifact.
  • Not Found - No artifact matching the hash was found.
  • Invalid Hash - The hash string was not a SHA256, SHA1, or MD5 hash.
Network Icons to highlight the available network data via the metadata, if the icon is colored, that type of network data is available:
  • Link Icon - URL Network Data.
  • Globe Icon - Domain Network Data.
  • Water Drop - IP Network Data.
Actions The Actions column has an icon that allows you to get more information about the artifact:
  • Down Arrow - Show Artifact data and data extracted from Static Tools only.
  • Open in New Tab - Opens the Scan Results Page for that artifact in a new tab, so you can view the metadata related to that artifact.
  • Download - Download the artifact encapsulated in an encrypted .zip file, which is password protected.

Metadata Searching

Searching by Metadata allows you to find Artifacts that have a variety of attributes or content. We support queries using the ElasticSearch Query String syntax.

Metadata searches can be entered into the search bubble on the landing page. They can also be entered into the Search Metadata box on the Search -> Metadata Searching tab. See the CLI -> Metadata Search documentation for the full list of query terms and a variety of usage examples.

The Search Metadata box records your most recent queries and will suggest them as you type future queries. You can remove queries from the list of recent queries by clicking the "X" icon at the far right side of the query entry.

Metadata Search Results

When a Metadata Search Query is run, the search results will be listed in a table below the Search Metadata box. The below covers what is displayed in the table once you search a hash.

Searching Metadata

Button What is it for?
Hash SHA256 hash of the Artifact with the file MIME type.
Malware Family The Malware Family shows the PolyUnite malware family.
First Seen Date the Artifact was first seen in PolySwarm.
Last Seen Date the Artifact was last seen in PolySwarm.
PolyScore Threat scoring algorithm that provides the probability that a given file contains Malware. One being the highest number and will contain Malware, Zero being the least chance.
Detections Detections column shows M/T (Malicious/Total) where Malicious is the number of engines that found the artifact to be malicious and Total is the total number of engines that analyzed the artifact.
File Size Size of the Artifact File.
File Type File Extension Type of the Artifact.
Actions The Actions column has icon that allow you to get more information about the artifact:
  • Open in New Tab - Opens the Scan Results Page for that artifact in a new tab, so you can view the metadata related that artifact.
  • Download - Download the artifact encapsulated in an encrypted .zip file, which is password protected.

At the top right of the table are buttons that allow you to change how the results are displayed as well as to save the results.

  • Gear: Drop down that allows you to check/un-check column names to hide/unhide them. Plus, you can drag/drop column names in the drop down to re-order them.
  • Floppy Disk: Allows you to save the currently displayed results as a CSV file. Only the data in the visible columns of the current page of results are saved.

Notes:

  • The results in the table are sorted with the most recently submitted file first.
  • The results are paginated, defaulting to 25 per page.
  • You can edit the page size using the dropdown menu in the lower left of the table.
  • Next to that are buttons to go to first, previous, and next page of the results.

Be aware that each page of metadata search results that is viewed is counted as one use of your Metadata Search quota. Changing the "Rows per page" will reload the page, and also uses one use of your Metadata Search quota.

IOC Searching

IOC Searching can be split into two types of Searches, these are:

  • Searching for Associated IOCs related to a Hash
  • Searching for Associated Hashes related to an IP, URL, imphash or MITRE TTP

Access the IOC Search Functionality by Navigating to Search > IOC Searching.

Searching for Associated IOCs

The Default option for this page is the Switch button will be on By Hash meaning searching on a Hash will provide a list of associated IOCs.

Once a hash has been searched, the results page will list the imphash, urls, ips and MITRE TTPs

Searching Associated IOCs

These associated items have been extracted from the Metadata for the Artifact and have been discovered by Static Tools and Sandboxing.

Searching for Associated Hashes

Moving the Switch to the By IOC option will provide the ability to search on a IOC (imphash, urls, ips and MITRE TTPs) and find related hashes.

This page provides the ability to select a start and end date criteria for the hash results to meet, and choose the IOC type.

Once an IOC has been searched on, the results table will show a list of sha256 hashes that are associated to the IOC along with the ability to Download the results as a csv and view each result in a new tab.

Searching Associated Hashes

2024 © PolySwarm Pte. Ltd.