Intel Owl v5.2 releases: analyze files, domains, IPs in multiple ways

Intel Owl

Do you want to get threat intelligence data about a file, an IP, or a domain?

Do you want to get this kind of data from multiple sources at the same time using a single API request?

You are in the right place!

This application is built to scale out and to speed up the retrieval of threat info.

It can be integrated easily in your stack of security tools to automate common jobs usually performed, for instance, by SOC analysts manually.

Intel Owl is composed of analyzers that can be run to retrieve data from external sources (like VirusTotal or AbuseIPDB) or to generate intel from internal analyzers (like Yara or Oletools)

This solution is for everyone who needs a single point to query for info about a specific file or observable (domain, IP, URL, hash).

Features

  • Provides enrichment of threat intel for malware as well as observables (IP, Domain, URL, and hash).
  • This application is built to scale out and to speed up the retrieval of threat info.
  • It can be integrated easily in your stack of security tools (pyintelowl) to automate common jobs usually performed, for instance, by SOC analysts manually.
  • Intel Owl is composed of analyzers that can be run to retrieve data from external sources (like VirusTotal or AbuseIPDB) or to generate intel from internal analyzers (like Yara or Oletools)
  • API is written in Django and Python 3.7.
  • Inbuilt frontend client: IntelOwl-ng provides features such as dashboard, visualizations of analysis data, easy to use forms for requesting new analysis, etc. Live Demo.

Available services or analyzers

You can see the full list of all available analyzers in the documentation or live demo.

Inbuilt modules External Services Free modules that require additional configuration
– Static Document, RTF, PDF, PE, Generic File Analysis
– Strings analysis with ML
– PE Emulation with Speakeasy
– PE Signature verification
– PE Capabilities Extraction
– Emulated Javascript Analysis
– Android Malware Analysis
– SPF and DMARC Validator
– more…
– GreyNoise v2
– Intezer Scan
– VirusTotal v2+v3
– HybridAnalysis
– Censys.io
– Shodan
– AlienVault OTX
– Threatminer
– Abuse.ch
– many more..
– Cuckoo (requires at least one working Cuckoo instance)
– MISP (requires at least one working MISP instance)
– Yara (Community, Neo23x0, Intezer and McAfee rules are already available. There’s the chance to add your own rules)

Changelog v5.2

Important usability changes

  • We added a new section in the “Scan” page called “Recent Scans” which allows the users to better interact with its own and other users’ already made analysis, improving the efficiency of the users and their communication.
  • By default jobs are executed with TLP:AMBER which means that they are shared with the other members of your organization only. (previously the default was TLP:CLEAR). This is to avoid possible users errors.
  • From now on, VT file analyzers send files to VT only when TLP is CLEAR and not anymore based on a specific parameter. As a consequence, VirusTotal_v3_Get_File_And_Scan is not available anymore. Please use the new VirusTotal_v3_Get_File instead and set the analysis to the correct TLP.
    • Same behavior has been extended to other analyzers: Intezer_ScanMWDB_ScanVirushee_Upload_File (renamed to Virushee_Scan), YARAify_File_Scan.

General improvements

  • Added First Visit Guide
  • Improved the documentation with the goal to help the users to understand better how all the available Plugins work.
  • For OpenCTI users having problems in integrating IntelOwl, now you can use a workaround: doc
  • A new organization role is available to better manage the org: adminDoc
  • Improvements in the “Jobs History” table: now it shows executed Playbooks and file/observables types correctly.
  • We added a new “Pivot” section in the “Plugin” GUI for the new Plugin type introduced in the v5.1.0 release. We added a new dedicated visualizer which allows the user to see when a Pivot has been executed in the “Job Result” page. We are still working on it and planning to add more documentation and GUI usability soon.
  • Improvements in the “Jobs Result” page: now playbooks are more relevant, warnings are shown next to errors, Raw JSON data has been moved next to the other raw data.
  • Changed JSON viewer library because the old one was deprecated

New/Improved Plugins:

  • deprecated VirusTotal_v2_* analyzers have been removed.
  • added LOLDrivers Rules to ClamAV default signatures.
  • added Netlas.io analyzer.
  • removed CryptoScam analyzer because the service has been dismissed.
  • added timeout to InQuest analyzers to avoid long time running jobs.
  • fixed XLMMacroDeobfuscator always saying it decrypted the analyzed file even when the file was not encrypted.
  • Malpedia_Scan has been deprecated and disabled because the service seems no more active.
  • added more analyzers in the default Sample_Static_Analysis playbook.
  • adjusted few analyzers: CAPESandbox, Dehashed, YARAify, GoogleWebRisk

Fixes / adjusts / minor changes

  • Now “Restart” button in the Job Page does correctly work after having used a Playbook.
  • basic support for IPv6
  • big refactors both in the backend and the frontend
  • lot of fixes everywhere 😉
  • improved documentation
  • upgraded a lot of packages

Install && Use

Copyright (C) 2019 Matteo Lodi