Skip to main content

Polygon

Download With Dependencies

Analyze your files and URLs with Polygon playbooks and extract deep IOCs that appear when malicious code is triggered and executed.

Nowadays every system can be attacked by adrversaries and it can start, for example, with a malicious url or file in simple e-mail to your employee.

This can be solved with Polygon Pack that represents our product THF Polygon.
It is a Malware Detonation & Research platform designed for deep dynamic analysis and enhanced indicators extraction.
Polygon could be used either for application-level tasks (like smtp-based mail filtering) and analytical purposes (files/urls analysis for verdict, report and indicators).

What does this pack do?

  • Detonate URLs.
  • Detonate files.

Nowadays every system can be attacked by adrversaries and it can start, for example, with a malicious url or file in simple e-mail to your employee.

This can be solved with Polygon Pack that represents our product THF Polygon.
It is a Malware Detonation & Research platform designed for deep dynamic analysis and enhanced indicators extraction.
Polygon could be used either for application-level tasks (like smtp-based mail filtering) and analytical purposes (files/urls analysis for verdict, report and indicators).

What does this pack do?

  • Detonate URLs.
  • Detonate files.

PUBLISHER

Group-IB

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByPartner
CreatedSeptember 23, 2020
Last ReleaseApril 7, 2024
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.