ThreatConnect Marketplace
  • Apps
  • Playbooks
  • Apps
  • Playbooks
Home » Apps Overview » Joe Sandbox
Back to Apps

Categories:
  • Malware Analysis
Built by

ThreatConnect

Joe Sandbox

The integration between Joe’s Sandbox and ThreatConnect allows users to automatically detonate, analyze, and report files or URLs in Joe’s from ThreatConnect to understand if they are malicious and return any contextualized telemetry.  With the Playbook Apps below, users can perform the following actions automatically:

  • Analyze File with Joe’s Sandbox – automate the submission of binary files to Joe’s Sandbox for analysis.
  • Analyze URL with Joe’s Sandbox – automate the submission of suspicious URLs to Joe’s Sandbox for analysis.
  • Get Analysis HTML from Joe’s Sandbox – automate the retrieval of Joe’s Sandbox analysis HTML.
  • Get Analysis Info from Joe’s Sandbox – automate the retrieval of Joe’s Sandbox analysis.
  • Get Analysis Report from Joe’s Sandbox – automate the retrieval of Joe’s Sandbox Analysis Report JSON.
  • Get Analysis Sample from Joe’s Sandbox – automate the retrieval of Joe’s Sandbox Analysis Sample.

This app can be found in the ThreatConnect App Catalog under the name: Joe Sandbox.

Related Apps

McAfee ATD Playbooks
Malware Analysis

This listing contains multiple Playbook templates for McAfee ATD.

ReversingLabs Playbooks
Malware Analysis

This listing contains multiple Playbook templates for ReversingLabs.

Hybrid Analysis
Malware Analysis

With this Playbook app, you can submit suspicious files and URLs to retrieve analyses from the Hybrid Analysis malware s...

Developers

  • Knowledge Base
  • Training Site

Company

  • ThreatConnect
  • Contact Us
  • Blog
  • Twitter
  • Facebook
  • Linkedin
© Copyright - ThreatConnect Marketplace
Scroll to top