Note: Support for this Pack was moved to Partner on June 17, 2025.
The Challenge
Modern SOCs are overwhelmed with incident alerts and lack
fast, reliable ways to assess and prioritize them effectively.
This leaves critical infrastructures vulnerable to attacks like
ransomware and data theft, which might slip through security gaps and cause major damage and downtime.
ANY.RUN Content Pack for Cortex XSOAR
The Palo Alto Networks Cortex XSOAR and ANY.RUN integration enables SOCs to automate triage, expand threat
coverage, and increase the detection rate, including hidden and missed malware.
With the ANY.RUN content pack for Cortex XSOAR, your
organization can:
- Submit files and URLs to a secure sandbox for analysis across Windows, Linux, and Android to streamline triage.
- Retrieve detailed reports in JSON, HTML, or IoC formats for incident response.
- Ingest fresh threat data in real time from over 15,000 organizations for threat hunting.
- Query threat details for IoCs, indicators of attack (IoAs), and indicators of behavior (IoBs) to enrich incident investigations.
- Automate workflows using Cortex XSOAR playbooks to reduce manual workload.
Palo Alto Networks and ANY.RUN Integrations
Product integrations between Palo Alto Networks and ANY.RUN include:
Key Benefits
- Slash incident response time with automated, secure
malware analysis in Cortex XSOAR® - Increase detection rates via interactive sandboxing across Windows, Linux, and Android.
- Improve proactive security with fresh indicators of compromise (IoCs) from 15,000 SOCs, updated in real time.
- Enhance incident context with threat analysis results right in Cortex XSOAR.
- Reduce SOC workload by automating threat triage and response tasks.
- Help ensure compliance with SOC 2/GDPR via a secure, private analysis mode.
Support
This is an ANY.RUN’s supported connector. You can write to us for help with integration via support@any.run.
Contact us for a quote or demo via this form
Pack Contributors:
- ANY.RUN
Contributions are welcome and appreciated. For more info, visit our Contribution Guide.




