ANYRUN Detonate File Android
ANY.RUN Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.0.0 and later.
This playbook submits a file extracted from an incident attachment to the ANY.RUN cloud sandbox for dynamic analysis in an Android environment. It helps to automate malware detonation and behavior observation on Android OS.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
Integrations- AnyRunSandbox
#
Scripts- IsIntegrationAvailable
#
Commands- anyrun-detonate-file-android
- anyrun-get-analysis-report
- anyrun-get-analysis-verdict
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
file | XSOAR Entry ID | ${File.EntryID} | Optional |
incident_info | XSOAR Incident | ${incident} | Optional |
env_locale | Operation system language. Use locale identifier or country name (Ex: "en-US" or "Brazil"). Case insensitive. | en-US | Optional |
opt_network_connect | Network connection state. | True | Optional |
opt_network_fakenet | FakeNet feature status. | False | Optional |
opt_network_tor | TOR using. | False | Optional |
opt_network_geo | Tor geo location option. Example: US, AU. | fastest | Optional |
opt_network_mitm | HTTPS MITM proxy option. | False | Optional |
opt_network_residential_proxy | Residential proxy using. | False | Optional |
opt_network_residential_proxy_geo | Residential proxy geo location option. Example: US, AU. | fastest | Optional |
opt_privacy_type | Privacy settings. Supports: public, bylink, owner, byteam. | bylink | Optional |
opt_timeout | Timeout option. Size range: 10-660. | 240 | Optional |
obj_ext_cmd | Optional command line | Optional |
#
Playbook OutputsThere are no outputs for this playbook.