FireEyeDetonateFile
FireEye (AX Series) Pack.#
This Script is part of theDetonates a file or URL through FireEye.
#
Script DataName | Description |
---|---|
Script Type | python |
Tags | fireeye, file, enhancement |
#
DependenciesThis script uses the following commands and scripts.
- fe-submit-result
- fe-submit-status
- fe-submit
#
InputsArgument Name | Description |
---|---|
file | The file/entry ID to detonate. |
profiles | The FireEye profiles to use (comma-separated). |
analysistype | Specifies live or sandbox analysis mode. "Sandbox", analyzes suspected malware objects in a closed, protected environment. "Live", analyzes suspected malware objects live within the MAS Multivector Virtual Execution (MVX) analysis engine. |
prefetch | Whether to determine the file target based on an internal determination rather than browsing to the target location. Can be, "No" or "Yes". |
#
OutputsThere are no outputs for this script.