hash_search
Analyze file hashes to detect malware, suspicious activity, or clean results with detailed threat analysis including reputation scores, security vendor assessments, and statistical summaries.
Instructions
Provides detailed threat analysis for a given hash, including analysis date, reputation, categories, security vendor assessments, threat names, and URL details. Detects malware, suspicious activity, and clean results from various security vendors with statistical summaries.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| query | No | Example value: 0000059fcb7d4275e2019593617f3b9c8aa568792e3eaf035420ed7dbffd44bc |