Skip to content

FalconX - Issue with results from sandbox.get_reports() #523

Answered by jshcodes
philldtaylor asked this question in Q&A
Discussion options

You must be logged in to vote

Here's what I've done so far.

  1. Downloaded a sample of this malware using MalQuery. (Thank you for providing the sha256 hash.)
    from falconpy import MalQuery
    
    mq = MalQuery(client_id="ID_HERE", client_secret="SECRET_HERE")
    
    with open("testmalware", "wb") as save_file:
        save_file.write(mq.get_download(ids="998746d0f5d0c13df720f0bf3981d652c828ea64d64d2e16736a80123fb534aa"))
  2. Fed this malware to our Falcon X single scan sample (located here)
    python3 falconx_scan_example.py -k "ID_HERE" -s "SECRET_HERE" -e win10 -f testmalware
  3. Results were received for both Win 10 and Win 7 environments. (After I fixed a bug on line 270 in the sample.)
    Detonated on: Windows 10 64 bit
    File type: PE32 executa…

Replies: 5 comments 4 replies

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
2 replies
@jshcodes
Comment options

@jshcodes
Comment options

Answer selected by philldtaylor
Comment options

You must be logged in to vote
2 replies
@jshcodes
Comment options

@jshcodes
Comment options

Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
Falcon Intelligence Falcon Intelligence issues and questions
2 participants