Skip to main content

ANYRUN Detonate Url Linux

This Playbook is part of the ANY.RUN Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

This playbook submits a URL extracted from an indicator to the ANY.RUN cloud sandbox for dynamic analysis in an Linux environment. It automates the analysis of potentially malicious URLs on Ubuntu OS.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

  • AnyRunSandbox

Scripts#

  • IsIntegrationAvailable

Commands#

  • anyrun-detonate-url-linux
  • anyrun-get-analysis-report
  • anyrun-get-analysis-verdict

Playbook Inputs#


NameDescriptionDefault ValueRequired
obj_urlTarget URL. Size range 5-512. Example: (http/https)://(your-link)${URL.Data}Optional
env_localeOperation system language. Use locale identifier or country name (Ex: "en-US" or "Brazil"). Case insensitive.en-USOptional
env_osOperation systemubuntuOptional
opt_network_connectNetwork connection state.TrueOptional
opt_network_fakenetFakeNet feature status.FalseOptional
opt_network_torTOR using.FalseOptional
opt_network_geoTor geo location option. Example: US, AU.fastestOptional
opt_network_mitmHTTPS MITM proxy option.FalseOptional
opt_network_residential_proxyResidential proxy using.FalseOptional
opt_network_residential_proxy_geoResidential proxy geo location option. Example: US, AU.fastestOptional
opt_privacy_typePrivacy settings. Supports: public, bylink, owner, byteam.bylinkOptional
opt_timeoutTimeout option. Size range: 10-660.120Optional
obj_ext_browserOptional command lineGoogle ChromeOptional
obj_ext_extensionChange extension to validTrueOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


ANYRUN Detonate URL Linux