AI Infection Analysis (NEW)

πŸ§ͺ Infection Analysis API Guide

Endpoint: /search-by-stealer/infection-analysis

Required Permissions: infection-analysis

Endpoint: POST search-by-stealer/infection-analysis
API Reference: View on Docs

The search-by-stealer/infection-analysis endpoint provides a detailed, AI-generated forensic analysis of how a specific identity was compromised. This is particularly useful for incident responders, threat hunters, and analysts who need to trace infection chains and identify malicious entry points.

🚧

Works only when the identity has a rich browsing/download history from the infostealer log - especially among Lumma infostealers


πŸ” Purpose

This endpoint analyzes browsing behavior and download history (from infostealer logs) to determine:

  • The most likely URL responsible for the compromise
  • A confidence score for that determination
  • A timeline of suspicious activity
  • A natural-language summary of the infection path

🧾 Request Format

curl --location 'https://api.hudsonrock.com/json/v3/search-by-stealer/infection-analysis' \
--header 'accept: application/json' \
--header 'api-key: <API_KEY>' \
--header 'content-type: application/json' \
--data '{"stealer": "[IN]175.101.37.65"}'

πŸ“¦ Example Response

{
  "data": {
    "likely_infection_url": "https://www.mediafire.com/file_premium/psx65h6kf34z9lr/Adobe.Premiere.Pro.2025.v28.3.1.rar/file",
    "infection_confidence": 0.95,
    "infection_reasoning": "The download of a cracked version of Adobe Premiere Pro from MediaFire, a file hosting service, is likely the source of the infostealer infection. The context of attempting to download and crack Adobe software is a common vector for malware infection.",
    "infection_flow": [
      {
        "timestamp": "2025-05-06T10:17:30.000Z",
        "url": "https://www.youtube.com/watch?v=H7MolYXxKog",
        "notes": "Watched a video on how to activate Adobe Premiere Pro for free."
      },
      {
        "timestamp": "2025-05-06T10:15:09.000Z",
        "url": "https://www.mediafire.com/file_premium/psx65h6kf34z9lr/Adobe.Premiere.Pro.2025.v28.3.1.rar/file",
        "notes": "Downloaded a file named 'Adobe.Premiere.Pro.2025.v28.3.1.rar' which is likely malicious."
      },
      {
        "timestamp": "2025-05-06T10:15:00.000Z",
        "url": "https://www.mediafire.com/folder/nupzd33tzw4ht/M4",
        "notes": "Redirect from a YouTube video to a MediaFire folder."
      },
      {
        "timestamp": "2025-05-06T10:13:36.000Z",
        "url": "https://www.youtube.com/watch?v=oFLk7c-O8fU",
        "notes": "Watched a YouTube video about downloading Adobe Premiere Pro for free."
      }
    ],
    "analyst_summary": "The user downloaded a potentially malicious RAR file from MediaFire after following instructions from YouTube videos promoting free cracked software."
  }
}

πŸ“˜ Field Descriptions

FieldTypeDescription
likely_infection_urlstring (URL)The most probable source of infection.
infection_confidencefloat (0–1)Confidence level in the AI’s determination of the infection source.
infection_reasoningstringRationale behind the confidence and infection vector.
infection_flowarray<object>Timeline of URLs visited around the infection window.
analyst_summarystringA human-readable explanation of the infection incident.

πŸ“ˆ Use Cases

  • SOC teams: Automate enrichment of compromised identity reports.
  • IR analysts: Quickly assess how the compromise occurred to take preventive measures.
  • Malware researchers: Understand stealer delivery mechanisms and top infection vectors.
  • Threat intelligence feeds: Tag domains or URLs with higher confidence based on AI analysis.

πŸ› οΈ Notes

  • Requires infection-analysis permission.
  • Works best when the identity has a rich browsing/download history from the infostealer log - especially Lumma infostealers.
  • Confidence scores below 0.5 should be treated with caution.