Use WildFire - Detonate file v2 instead.
Detonate one or more files using the Wildfire integration. This playbook returns relevant reports to the War Room and file reputations to the context data. The detonation supports the following file types - APK, JAR, DOC, DOCX, RTF, XLS, XLSX, PPT, PPTX, OOXML, PE32, PE, PDF, DMG, PKG, RAR, 7Z, JS, ELF, HTA, LNK, VBS, PS1, PERL, PYTHON, SHELL.
Note: Base64 encoded files are currently not supported
This playbook is deprecated. please use the WildFire - Detonate file v2 instead.
This playbook uses the following sub-playbooks, integrations, and scripts.
|File object of the file to detonate. The file is taken from the context.
|The duration for executing the polling (in minutes).
|The duration after which to stop polling and to resume the playbook. (in minutes)
|The resource type to download.
|The actual score.
|The type of the indicator.
|The file type, e.g. "PE".
|The file size
|The MD5 hash of the file.
|The SHA1 hash of the file.
|The file object.
|TheSHA256 hash of the file.
|The malicious object.
|The vendor that made the decision that the file is malicious.
|The DBot object.
|The indicator that was tested.
|The vendor used to calculate the score.
|The submission object.
|The status of the submission.
|The SHA256 hash of the submission.
|The report file object.
|The EntryID of the report file.
|The extension of the report file.
|The name of the report file.
|The info of the report file.
|The size of the report file.
|The type of the report file.
|The MD5 hash of the submission.
|The type of the submission.
|The size of the submission.