Skip to main content

ANYRUN Detonate Url Android

This Playbook is part of the ANY.RUN Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

This playbook submits a URL extracted from an indicator to the ANY.RUN cloud sandbox for dynamic analysis in an Android environment. It automates the analysis of potentially malicious URLs on Android OS.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

  • AnyRunSandbox

Scripts#

  • IsIntegrationAvailable

Commands#

  • anyrun-detonate-url-android
  • anyrun-get-analysis-report
  • anyrun-get-analysis-verdict

Playbook Inputs#


NameDescriptionDefault ValueRequired
obj_urlTarget URL. Size range 5-512. Example: (http/https)://(your-link).${URL.Data}Optional
env_localeOperation system language. Use locale identifier or country name (Ex: "en-US" or "Brazil"). Case insensitive.en-USOptional
opt_network_connectNetwork connection state.TrueOptional
opt_network_fakenetFakeNet feature status.FalseOptional
opt_network_torTOR using.FalseOptional
opt_network_geoTor geo location option. Example: US, AU.fastestOptional
opt_network_mitmHTTPS MITM proxy option.FalseOptional
opt_network_residential_proxyResidential proxy using.FalseOptional
opt_network_residential_proxy_geoResidential proxy geo location option. Example: US, AU.fastestOptional
opt_privacy_typePrivacy settings. Supports: public, bylink, owner, byteam.bylinkOptional
opt_timeoutTimeout option. Size range: 10-660.60Optional
obj_ext_browserBrowser name. Supports: Google Chrome, Mozilla FirefoxGoogle ChromeOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


ANYRUN Detonate URL Android