Searching

The primary method of searching for malware samples is to use the built-in Malware Analysis Center Query Language (MACQL). This query language provides a simple, powerful, and easy-to-use interface to find malware samples that meet specific criteria.

Example


    name contains "emotet" and positives > 20
    
This query will return all files where at least 20 AV engines detected it as malicious and at least one AV engine had "emotet" in the resulting output from the AV detection.

Definitions

Fields

Field Description Operators Type Example
name This field will match on any positive AV detection result where the comparison returns true. The comparison performed is case-insensitive. contains string "dridex"
total The total number of AV engines that scanned this particular file. >, >=, <, <=, and = integer 42
positives The number of positive AV engine detections. >, >=, <, <=, and = integer 25
md5 The MD5 hash of the file. The search is case-insensitive. = string 02cfa3e6fdb4301528e5152de76b2abf
sha1 The SHA1 hash of the file. The search is case-insensitive. = string ed205f958fc9a60f3396384d9e1c75feb5b76a91
sha256 The SHA256 hash of the file. The search is case-insensitive. = string 7bcb0abcfbea20ecfe31d8dd65146b8b1ffd0d81479d11dc329b2f99e263bd78
list Either Whitelist, Blacklist, Greylist, or Unknown. = string Blacklist
filetype The extension of the file type. = string exe
submitted The date the file was submitted to the Malware Analysis Center. >, >=, <, <=, and = string "1 May 2019"
rulename The name of the a Yara rule contained within a Yara ruleset. This field will match on all files where the specified rulename fired. contains string Win_Trojan_Dridex_24
rulesetname The name of the a Yara rule set. This field will match on all files where any rule in the specified ruleset fired. contains string ClamAV - Windows Trojans