VirusTotal Lookups
Use VirusTotal effectively for file and URL reputation analysis.
Last updated: February 2026Purpose and Scope
VirusTotal aggregates results from 70+ antivirus engines, URL scanners, and sandbox environments. This playbook covers how to use VirusTotal effectively for file and URL analysis, interpret results correctly, and integrate lookups into SOC workflows.
Prerequisites
- VirusTotal account: Free account for basic lookups, premium for advanced features
- API key: For automated queries and integration
- Sample handling procedures: Safe methods for extracting hashes
- Understanding of AV detection: How different engines classify threats
What VirusTotal Provides
File Analysis
- Detection verdicts from 70+ AV engines
- File metadata (size, type, timestamps)
- Behavioral analysis from sandboxes
- Embedded strings and imports
- Relationships to other files, domains, and IPs
URL and Domain Analysis
- URL scanning against multiple engines
- Domain reputation and categorization
- WHOIS and DNS information
- SSL certificate details
- Historical resolution data
IP Address Analysis
- Reputation based on hosted content
- Associated domains (passive DNS)
- Files that communicated with the IP
- Geolocation and ASN information
Lookup Workflow
File Hash Lookup
- Extract the file hash (prefer SHA256 for accuracy)
- Search the hash on VirusTotal
- Review detection ratio and engine names
- Check the Behavior tab for sandbox results
- Examine Relations for connected infrastructure
- Review Community comments for analyst insights
URL Lookup
- Submit the URL for scanning or search existing results
- Review detection verdicts from URL scanners
- Check the final destination after redirects
- Examine downloaded files if any
- Review the screenshot if available
Domain Lookup
- Search the domain name
- Review reputation and categorization
- Check WHOIS for registration details
- Examine DNS records and resolutions
- Review associated files and URLs
Interpreting Results
Detection Ratios
Understand what detection counts mean:
- 0 detections: Not necessarily clean; could be new, targeted, or undetected
- 1-5 detections: May be false positives; check which engines detected
- 5-20 detections: Likely malicious; review detection names for classification
- 20+ detections: High confidence malicious
Detection count alone is not definitive. Review the specific engines and detection names.
Detection Names
Parse detection names for context:
- Family names indicate malware type (Emotet, Cobalt Strike, AgentTesla)
- Generic names (Trojan.Generic, Malware.AI) provide less context
- PUP/PUA indicates potentially unwanted software, not necessarily malware
- Heuristic detections may have higher false positive rates
Sandbox Behavior
Review what the file did when executed:
- Network connections (C2 communication)
- File system modifications (dropped files, persistence)
- Registry changes (Windows persistence)
- Process creation (child processes, injection)
- API calls (suspicious function usage)
Relationships Graph
Explore connections between entities:
- Files downloaded from a domain
- Domains resolved to an IP
- Files that contacted an IP
- Similar files by behavior or structure
Common Pitfalls
- Trusting zero detections: New or targeted malware may not be detected
- Ignoring context: A file detected as a "hacking tool" may be legitimate if used by your red team
- Uploading sensitive files: Uploaded files become available to premium subscribers
- Stale data: Old scans may not reflect current detection
- Shared infrastructure: Legitimate services on the same IP as malware
API Integration
Basic API Usage
- Search by hash, URL, domain, or IP
- Submit files or URLs for scanning
- Retrieve detailed reports programmatically
- Free tier: 4 requests per minute, 500 per day
SOAR Integration
- Auto enrich alerts with VT data
- Block files with high detection counts
- Create cases for files with sandbox IOCs
- Add VT links to alert context
Privacy Considerations
- Do not upload files containing sensitive data
- Use hash lookups instead of file uploads when possible
- Be aware that file names are visible to other users
- Submitted URLs are publicly searchable
- Premium subscribers can access all uploaded files
Escalation Guidance
Escalate when VirusTotal shows:
- High detection count with known malware family
- Sandbox behavior indicating C2 or data theft
- Relationships to known threat actor infrastructure
- Files actively spreading in your environment
References
- VirusTotal: virustotal.com
- VirusTotal API documentation: developers.virustotal.com
- MITRE ATT&CK: attack.mitre.org
Was this helpful?