Skip to main content

ANYRUN Detonate File Linux

This Playbook is part of the ANY.RUN Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

This playbook submits a file extracted from an incident attachment to the ANY.RUN cloud sandbox for dynamic analysis in an Linux environment. It helps to automate malware detonation and behavior observation on Ubuntu OS.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

  • AnyRunSandbox

Scripts#

  • IsIntegrationAvailable

Commands#

  • anyrun-detonate-file-linux
  • anyrun-get-analysis-report
  • anyrun-get-analysis-verdict

Playbook Inputs#


NameDescriptionDefault ValueRequired
fileXSOAR Entry ID${File.EntryID}Optional
incident_infoXSOAR Incident${incident}Optional
run_as_rootRun file with superuser privilegesFalseOptional
env_localeOperation system language. Use locale identifier or country name (Ex: "en-US" or "Brazil"). Case insensitive.en-USOptional
env_osOperation systemubuntuOptional
opt_network_connectNetwork connection state.TrueOptional
opt_network_fakenetFakeNet feature status.FalseOptional
opt_network_torTOR using.FalseOptional
opt_network_geoTor geo location option. Example: US, AU.fastestOptional
opt_network_mitmHTTPS MITM proxy option.FalseOptional
opt_network_residential_proxyResidential proxy using.FalseOptional
opt_network_residential_proxy_geoResidential proxy geo location option. Example: US, AU.fastestOptional
opt_privacy_typePrivacy settings. Supports: public, bylink, owner, byteam.bylinkOptional
opt_timeoutTimeout option. Size range: 10-660.240Optional
obj_ext_cmdOptional command lineOptional
obj_ext_startfolderStart object from. Supports: desktop, home, downloads, appdata, temp, windows, roottempOptional
obj_ext_extensionChange extension to validTrueOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


ANYRUN Detonate File Linux