Cmdlets
Get-FalconMalQuery
Verify the status and results of an asynchronous Falcon MalQuery request, such as a hunt or exact-search. Permissions:MalQuery: Read
Request identifier (UUID format)
Example
Get-FalconMalQueryQuota
Retrieve Falcon MalQuery search and download quotas. Permissions:MalQuery: Read
Example
Get-FalconMalQuerySample
Retrieve Falcon MalQuery indexed file metadata. Permissions:MalQuery: Read
SHA256 hash value
Example
Group-FalconMalQuerySample
Schedule MalQuery samples for download. Permissions:MalQuery: Write
SHA256 hash value
Example
Invoke-FalconMalQuery
Initiate a Falcon MalQuery YARA hunt, exact search, or fuzzy search. Permissions:MalQuery: Write
Schedule a YARA-based search
Search pattern type. Valid values:
hex, ascii, wideSearch pattern value
File type to include with the result. Valid values:
cdf,cdfv2,cjava,dalvikdoc,docx,elf32,elf64email,html,hwp,java.arclnk,macho,pcap,pdfpe32,pe64,perl,ppt,pptxpython,pythonc,rtf,swftext,xls,xlsx
Subset of metadata fields to include in the result. Valid values:
sha256, md5, type, size, first_seen, label, familyMinimum file size specified in bytes or multiples of KB/MB/GB
Maximum file size specified in bytes or multiples of KB/MB/GB
Limit results to files first seen after this date (format: YYYY/MM/DD)
Limit results to files first seen before this date (format: YYYY/MM/DD)
Maximum number of results per request
Search MalQuery quickly but with more potential for false positives
Example
Receive-FalconMalQuerySample
Download a sample or sample archive from Falcon MalQuery. Permissions:MalQuery: Read
Downloaded sample archives are password-protected with the password: infected
Destination path
SHA256 hash value or MalQuery sample archive identifier
Overwrite an existing file when present
Example
Search-FalconMalQueryHash
Perform a simple Falcon MalQuery YARA Hunt for a SHA256 hash. Permissions:MalQuery: Write
This cmdlet performs a YARA Hunt for the given hash, then checks every 5 seconds—for up to 60 seconds—for a result.
SHA256 hash value
Example
MalQuery Hunting Workflow
Initiate Search
Use
Invoke-FalconMalQuery to start a YARA hunt, exact search, or fuzzy search. Save the request ID returned.Poll for Results
Use
Get-FalconMalQuery with the request ID to check search status. Repeat until status is complete.Analyze Metadata
Use
Get-FalconMalQuerySample with SHA256 hashes from results to retrieve detailed file metadata.YARA Hunt Examples
Exact vs Fuzzy Search
Exact Search
Use when: You need precise matches with no false positivesCharacteristics:
- Slower execution
- Higher accuracy
- Consumes more quota
- Best for known indicators
Fuzzy Search
Use when: You need quick results for broad huntingCharacteristics:
- Faster execution
- Potential false positives
- Consumes less quota
- Best for exploratory hunting
Tips and Best Practices
Related Resources
Falcon Intelligence
Access threat intelligence indicators
Sandbox Analysis
Submit samples for dynamic analysis
Sample Uploads
Upload samples to CrowdStrike