RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Products & TechnologyOctober 8, 2024

Do More With Your SOAR

Leveraging ReversingLabs File Enrichment in Your SOC.

FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
shadowy figures sitting at monitors in data center

Running any Security Operations Center (SOC) is complex — and running without the best tools to automate as much as possible makes it even more difficult. File enrichment is one of the best ways to augment your hard-working SOC operators, and improve your success rate in identifying malicious malware before it becomes ransomware.

See Webinar: Enhance Your SOC With Threat Intelligence Enrichment

What Is File Enrichment?

File enrichment adds information to raw data to enhance its value, accuracy, and context. This process is critical in cybersecurity to improve threat detection and response. Here are some essential aspects of file enrichment.

Contextual Information

Metadata: Adding details such as file creation date, author, and modification history.
Behavioral Analysis: Insights into the file's behavior, including any suspicious activities or patterns.

Reputation Scores

Trustworthiness: Assigning scores based on the file’s history and known associations with malicious activities.
Classification: Categorizing files as benign, suspicious, or malicious based on aggregated data.

Threat Intelligence Integration

Correlated Indicators: Linking file hashes with known indicators of compromise (IoCs) from threat intelligence feeds.
Historical Data: Providing information on past occurrences and behaviors of similar files.

Automated Analysis

Malware Detection: Using automated tools to scan and analyze files for malware signatures and anomalies.
Behavioral Profiling: Automatically profiling the file’s behavior to detect deviations from standard patterns.

By enriching file data, organizations can better understand potential threats, improve incident response times, and enhance security posture.

Enrichment example in Splunk

Enrichment example in Splunk.

Why Invest In File Enrichment?

  • Contextualization: File hashes without context are almost useless. Enrichment helps identify a threat's origin, nature, and potential impact. For example, if you detect a suspicious IP address, enrichment can provide details about its geographic location, associated domains, and known malicious activities. Your SOC can automate many tasks, improving incident response time and accuracy.

  • Reduction of False Positives: By adding context, enrichment helps to filter out irrelevant alerts, allowing security teams to focus on genuine threats. This is crucial for reducing alert fatigue and improving the efficiency of security operations. Your operators won't spend all day doing repetitive, time-consuming tasks.

  • Enhanced Incident Response: Enriched threat intelligence provides actionable insights to accelerate the investigation and mitigation of security incidents. For instance, knowing that a detected threat is linked to a known malware campaign can guide the response strategy. Your operators can respond to an incident consistently, regardless of skill level.
  • Integration with Security Tools: Many security platforms, such as SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) systems, use threat intelligence enrichment to enhance their detection and response capabilities. Your operators do not have to jump from tool to tool, cutting and pasting all day.
Enrichment example in Palo Alto XSOAR

Enrichment example in Palo Alto XSOAR

What Is Rich Context?

Rich context refers to the additional information and insights that help security analysts better understand and respond to threats. Here are some key aspects:

Attribution: Information about who is behind the threat, such as specific threat actors or groups and their known tactics, techniques, and procedures (TTPs).

Geolocation: Data about the threat's geographic origin can help understand regional threat landscapes and targeting patterns.

Historical Data: Past occurrences of similar threats, including timelines and activity patterns, can indicate whether a threat is part of a more extensive campaign.

Associated Indicators: Related threat indicators, such as IP addresses, domains, file hashes, and URLs, can help identify the scope and scale of the threat.

Behavioral Analysis: provides insights into how the threat behaves, including its propagation methods, payloads, and potential impact on systems and networks.

Reputation Scores: Ratings or scores that indicate the trustworthiness or maliciousness of an entity based on aggregated data from various sources.

Rich Context Example

flowchart of enrichment

Reducing Human Error

Consistent formatting is a crucial feature of file enrichment. For example, malware is highlighted in red, good files are in green, and suspicious files are in yellow. While color marketing may seem obvious if your operators must go through several decision processes to make formatting consistent, human error and stress will cause them to make mistakes.

Automating most incident reporting in a consistent format will significantly reduce human error, speed up mitigation, and reduce operator fatigue.

Hash (SHA256)

2ac4f0f16f41a4e9cf031d8186534e8a668ecfff484d85c171ac4b7d9c89e6

Status

MALICIOUS

Status Description

The sample was classified as malicious by ReversingLabs proprietary algorithms. This classification is reserved for high-accuracy heuristics and named threats, such as Emotet, Dridex and WannaCry. Threat severity is expressed through the threat level value on a scale of 1-5. The higher the value, the more severe the threat.

Threat Name

ByteCode-MSIL.Trojan.RedLine

Threat Level

5

Reason

antivirus - the sample was classified by the ReversingLabs multi-scan algorithm based on aggregated antivirus scan results

File Details

This file (SHA1: dc278e5f402923b7305f361df7a7ed427daf75a) is a 32-bit portable executable

NET application. The application uses the Windows graphical user interface (GUI) subsystem.

According to version information, this is Nemophilas.exe. Module name is Nemophilas.exe with version ID 56711F9D-5FF8-45EA-8709-D83CCA679E9B. It references assemblies Nemophilas, System.Core and mscorlib, among others. Appended data was detected at the file's end. Its length is smaller than the size of the image. Cryptography related data was found in the file. This application has access to device configuration and running processes and has cryptography and security related capabilities. There are 4 extracted files.

Scanner Detection

23 of 25 scanners detected this file

Example of a well-formatted incident in Microsoft Sentinel

ReversingLabs Integrations

ReversingLabs' pre-built integrations and flexible REST API allow customers to seamlessly integrate with existing security tools and workflows.

For further information, technical details, and documentation on the ReversingLabs integrations, see https://www.reversinglabs.com/integrations.

Get even more insights in this ON DEMAND WEBINAR: Do More With Your SOAR | Enhance Your SOC With RL Threat Intelligence Enrichment


Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Products & Technology

More Blog Posts

QR Code Phishing Is Evolving: Here’s How Your Detection Can Keep Up

QR Code Phishing Evolves: How to Keep Up

Here's what you need to know about the rise of quishing — and how your threat hunting team can get out in front of it.

Learn More about QR Code Phishing Evolves: How to Keep Up
QR Code Phishing Evolves: How to Keep Up
Why RL Built Spectra Assure Community

Why RL Built Spectra Assure Community

We set out to help dev and AppSec teams secure the village: OSS dependencies, malware, more. Learn how.

Learn More about Why RL Built Spectra Assure Community
Why RL Built Spectra Assure Community
How a Simple YARA Rule Catches What AV Misses

ClickFix: YARA Rules Catch What AV Misses

Learn about the antivirus detection gap — and how to develop a simple YARA rule using Spectra Analyze.

Learn More about ClickFix: YARA Rules Catch What AV Misses
ClickFix: YARA Rules Catch What AV Misses
Polyglot File Examination with Spectra Analyze

How to Examine Polyglot Files with Spectra Analyze

Here's how to assess a sample using Spectra Analyze in your environment — and create a YARA rule.

Learn More about How to Examine Polyglot Files with Spectra Analyze
How to Examine Polyglot Files with Spectra Analyze

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top