docker pull ghcr.io/boredchilada/al4-joesandbox:latest
JoeSandboxV2 is an Assemblyline service that retrieves and displays existing Joe Sandbox analysis results in IRJsonFixed format. This service searches for existing analyses by file hash and presents the results in Assemblyline.
Joe Sandbox is a deep malware analysis platform that detects and analyzes potential malicious files, URLs, and other artifacts. This service allows you to leverage existing Joe Sandbox analyses within your Assemblyline workflow.
- Searches for existing Joe Sandbox analyses by file hash
- Retrieves detailed analysis information
- Downloads and processes IRJsonFixed reports
- Displays results in Assemblyline with scoring
- Extracts key information such as:
- Detection verdict and score
- Network indicators (domains, IPs, URLs)
- Behavior information
- Dropped files
The service is organized into a modular structure for better maintainability:
joesandbox.py
: Main entry point for the servicejoesandboxv2/
: Package containing the service modules__init__.py
: Package initializationservice.py
: Main service classapi_client.py
: Client for interacting with the Joe Sandbox APIreport_processor.py
: Coordinator for processing reportsprocessors/
: Package containing specialized processors__init__.py
: Package initializationontology_processor.py
: Processor for creating and managing ontologysignature_processor.py
: Processor for handling signaturesnetwork_processor.py
: Processor for network-related datafile_processor.py
: Processor for file-related data
The service requires the following configuration:
api_key
: Your Joe Sandbox API keyapi_url
: Joe Sandbox API URL (default: https://www.joesandbox.com/api/)
Paste the service_manifest.yml into your "Add service" button
JBX_API_KEY
: Your Joe Sandbox API key
The service accepts any file type and will:
- Extract the SHA256 hash from the file
- Search Joe Sandbox for analyses matching the hash
- If found, retrieve the most recent analysis details
- Download and process the IRJsonFixed report
- Display the results in Assemblyline
The service uses the following heuristics:
- Heuristic 1: Joe Sandbox detected the file as malicious (Score: 1000)
- Heuristic 2: Joe Sandbox detected the file as suspicious (Score: 500)
- Heuristic 3: Joe Sandbox detected the file as clean or unknown (Score: 0)
This project is licensed under the MIT License
- Joe Security for providing the Joe Sandbox platform
- Assemblyline team for the service framework and help they provided!