Skip to main content


This Script is part of the FireEye (AX Series) Pack.#

Detonates a file or URL through FireEye.

Script Data#

Script Typepython
Tagsfireeye, file, enhancement


This script uses the following commands and scripts.

  • fe-submit-result
  • fe-submit-status
  • fe-submit


Argument NameDescription
fileThe file/entry ID to detonate.
profilesThe FireEye profiles to use (comma-separated).
analysistypeSpecifies live or sandbox analysis mode. "Sandbox", analyzes suspected malware objects in a closed, protected environment. "Live", analyzes suspected malware objects live within the MAS Multivector Virtual Execution (MVX) analysis engine.
prefetchWhether to determine the file target based on an internal determination rather than browsing to the target location. Can be, "No" or "Yes".


There are no outputs for this script.