Only this pageAll pages
Powered by GitBook
1 of 29

ThreatZone

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Release Notes

All of the releases of Threat.Zone is listed here!

Cover

v2.8.0 - latest

v2.8.0 - latest
Cover

v2.7.2

v2.7.2
Cover

v2.7.1

v2.7.1
Cover

v2.7.0

v2.7.0
Cover

v2.6.1

v2.6.1
Cover

v2.6.0

v2.6.0
Cover

v2.5.2

v2.5.2
Cover

v2.5.1

v2.5.1
Cover

v2.5.0

v2.5.0
Cover

v2.4.0

v2.4.0
Cover

v2.3.0

v2.3.0
Cover

v2.2.0

v2.2.0
Cover

v2.1.0

v2.1.0
Cover

v2.0.0

v2.0.0
Cover

v1.4.0

v1.4.0
Cover

v1.3.0

v1.3.0
Cover

v1.2.0

v1.2.0
Cover

v1.1.0

v1.1.0
Cover

v1.0.0

v1.0.0

v2.7.2

Bug Fixes

  • A critical bug related to Forgot Password has been resolved, huge thanks to @xryptc

v2.7.0

URL Analysis Added to Public API

URL Analysis capability is now available through our Public API! Integrate URL scanning directly into your security workflows and applications. You can access the docs here:

Auto Configuration for Dynamic Scan - Public API

Public API sandbox requests now have an "auto" option, which enables you to automatically fill the configuration for dynamic scan. This simplifies the submission process and ensures optimal scan settings.

New "Auto" field

Submission Report Configuration Visibility

Submission report configuration is now visible in the submission page! Get complete transparency into how your scans are configured.

Analysis Config in Reports Page

Submission Entrypoint Visibility

Submission entrypoint is now available in the submission page! You can see which file has been selected in ZIP, RAR, TAR.GZ, and other countless compressed files to be executed in the dynamic scan environment and other analysis

https://app.threat.zone/public-api/docs
Public API URL Analysis Docs

v2.7.1

Compressed File Entrypoint for Every Analysis

Previously, the entrypoint selected via the UI was used only for determining which file within a compressed archive to execute during Dynamic Scan analysis. However, the entire compressed file was sent to other analysis engines such as Static Scan, Emulations, and YARA Generator. With this latest update, we've enhanced our system so that the user-selected entrypoint is now also utilized by these analysis engines. This improvement simplifies and streamlines your analysis workflow, particularly when handling compressed files.

Landing Page Has a Fresh Look Now!

We've made a quite big update on our landing page! Check it out from here:

Dynamic MIMEType Check for Zip Content

When zip files are uploaded to our system, we now check the MIMETypes of the files inside the zip and set the extensions based on it. This ensures proper analysis of compressed content and improves detection accuracy.

Search Submissions by Tag

Now you can search through submissions with their tags! This powerful filtering option makes it easier to find and organize related samples for more efficient threat analysis.

v1.4.0

Bug Fixes

  • Static Scan Report had a color problem that resulted in grey colors when Malicious/Suspicious/Informative file comes, solved.

v2.5.1

Open In Browser Feature

Open In Browser is here! Now, you can put a URL and open this URL in the dynamic scan environment to observe its behavior in a controlled setting.

Bug Fixes

Several important fixes have been implemented. We've fixed the URL Analysis IP Check, resolved submission chart performance issues, addressed URL Analysis protocol detection, and corrected User Agent problems affecting URL access.

New Landing Page

v2.8.0 - latest

🎯 FRIDAY UPDATE

We’ve just raised the bar for dynamic malware analysis — again.

Threat.Zone now supports files up to 3 GB for detonation, the highest limit among global sandboxes. Security teams in critical environments can finally analyze massive archives, installers, and virtual-disk images without size-related blind spots.


🚀 What’s New in This Release

Expanded File Support

  • Up to 3 GB file detonation — no more blind spots for large installers, archives, or disk images.

Deep Artifact Harvesting

  • Memory and file dumps from every run are now automatically processed and indexed for easier analysis.

Malware Config Extractor

  • Extract campaign IDs, C2 servers, and other runtime configs directly from both samples and artifacts.

YARA Rule Matcher & Generator

  • Instant rule matching against our internal rule-set.

  • One-click custom YARA rule creation from any artifact with ease.

IoC Extractor

  • Automatic extraction of domains, IPs, and hashes across samples, RAM, and dumped files.

Recursive Archive Handling

  • Submit ZIP/RAR files, and each embedded file is detonated separately—no need for manual unpacking.

Full REST API Coverage

  • Access indicators, YARA hits, artifacts, hybrid-analysis scores, and more via API—ready for SOAR, SIEM, or EDR pipelines.

Varist Hybrid Analyzer Integration

  • Enhanced hybrid analysis, combining static and dynamic insights for deeper threat visibility.


🎬 See It in Action

  • Multi-file archive demo →

  • CryptoLocker sample with memory and file dumps →


We’re thrilled to help defenders eliminate size constraints and surface richer telemetry—enabling faster, more precise threat response. Got questions or feedback? Let’s talk!


🧠 Introducing ThreatZone MCP Server

We've published ThreatZone MCP—an MCP server that connects AI assistants directly with Threat.Zone's holistic malware analysis platform.

Key Capabilities:

  • Submit files for analysis from within AI tools.

  • Query results and reports using natural language.

  • Retrieve IOCs, behavioral data, threat intelligence, execution logs, and network traffic.

  • Generate automated threat assessment reports.


📥 Getting Started

Clone the MCP server repo and dive in:


📄 Ready for Production?

This release is packed with powerful upgrades aimed at empowering SOC, IR, and forensic teams. We recommend updating to v2.8.0 to take full advantage of:

  • Superior file size support

  • Enhanced telemetry and artifact processing

  • Seamless integration via REST API and MCP for AI‑driven workflows

v2.4.0

New Network Pages!

We've completely revamped our network analysis capabilities with dedicated pages for different network protocols. These enhanced views provide much more detailed analysis of malware network communication patterns.

New Network Page

Enhanced Network Analysis Capabilities

Our new network analysis pages provide comprehensive visibility into malware communications. View HTTP requests, monitor DNS queries for C2 detection, track TCP/UDP communications, identify network threats, and use our integrated Wireshark interface for detailed packet analysis.

Bug Fixes

Dynamic MIMEType check had some difficulties when determining the extension of some office (CFB) files. This issue has been resolved, ensuring more accurate file type detection and appropriate handling of various Microsoft Office formats.

v2.6.0

Syscalls Monitoring Introduced

We've introduced comprehensive syscalls monitoring! Track system calls made by malware to gain deeper insights into its behavior and interaction with the operating system.

New Syscall Monitoring Page

Behaviour Performance Improvements

Behaviour analysis performance has been significantly improved. Searches and other filters are now extremely fast, enabling more efficient threat investigation!

v2.5.0

URL Analysis Introduced!

We're excited to announce our new URL Analysis feature! Now you can easily analyze suspicious URLs directly in Threat.Zone, examining domain details, IP information, WHOIS data, and threat intelligence without risking your systems. The comprehensive dashboard provides detailed insights into website metadata, blacklist status, DNS records, SSL certificates, and extracted files.

New URL Analysis Page

Coming Soon: Virustotal URL Engine is on the way!

v2.6.1

Syscall Matches in Indicators

Indicators now produce syscall matches! You can identify which syscall has been called when an indicator is found in the system. This powerful correlation feature enhances your ability to understand malware behavior and system interactions.

v2.0.0

New Register Experience!

Some of our customers had problems while trying to register to our system, so we’ve created a brand new system. Right now users are getting verification code to their mails, which is much more easier!

Dynamic MIMEType Checker Implementation!

v2.5.2

Filename Sanitization in Public API

Public API now sanitizes filenames, which resolves initialization errors during submission start. This ensures smoother operation when handling files with special characters or problematic names.

NSRL Database Check Added

v1.3.0

Threat.Zone Static Scan is Live!

Since we begin we only scanned the files in a sandbox, which we call dynamic scan. From now on, you can scan your files statically too! It is much faster, it can do static code analysis on your sample and returns with a comprehensive report.

New Scan Page UI!

v1.0.0

Threat.Zone is Launched!

Our newest platform is called was launched on the 19th of August.

v1.2.0

Get Promotions along with Plans!

Starting from today, you will be able to get promotions if you buy a plan! Right now Researcher plan comes with CDR and CSI modules, Hunter Plan is coming with all of our 3 modules, which are MemProcFS, CDR and CSI.

Free Users can Download Files Now!

Me

Scan

v2.3.0

Chunk-by-Chunk Upload Mechanism

For high file uploads, we've introduced a chunk-by-chunk upload mechanism. This allows for more reliable uploading of large files.

Download Optimization

API Docs

ThreatZone's Full API Documentation

The Threat.Zone Public API provides developers with a robust and intuitive way to interact with Threat.Zone's advanced malware analysis platform programmatically. It offers endpoints to submit files for scanning, retrieve detailed scan reports, and integrate Threat.Zone's powerful analysis capabilities directly into external applications and services.

This API is RESTful and supports standard HTTP methods like GET, POST, and DELETE.

Key Features

Constants

Download

Now files that you’ve sent is can be double checked by Dynamic MIMEType Checker! Enable it to analyze file by its real extension!

Static Scanner is Accepting All Kinds of Files!

Last release we have released Threat.Zone Static Scanner and it is loved by our users. But extension limitation was there and it really bothered us. Now Threat.Zone Static Scanner accepts all kinds of files!

Download HTML Report from Public API!

We had the functionality of downloading the HTML Report from the UI but one of our API users told us that it would be awesome to have this functionality in Public API too, so we added it!

Enhancements

  • Two Factor Modal’s look has changed!

Bug Fixes

  • CSI Module had a Start Action problem, fixed.

  • Login modal had a problem that it was appearing to the authenticated users, fixed.

  • 500 page was appearing on not-buggy situations, fixed.

Since we’ve added new functionality to our system, which is Static Scan, we want our scan page to be much more flexible. Check it out at this link!

Automatic Hash Detection at Submissions

We had a search bar where you choose the hash type and type the hash, click the search button blah blah. Now just copy and paste the hash to the search table, and you are good to go!

New Submissions Page UI!

Public and My Submissions pages are critical for us and our users cause’ it is the place where you discover new malware samples. So we thought that maybe we can create a better experience by adding filtering to labels and doing minor UI changes. You can check it out and give us feedback!

Re-Analyze Submission Has a Brand New Experience Right Now!

Since we add Static Scan to our system, it was obvious that re-analyze should change too. We changed the whole experience about it and right now you can scan both statically and dynamically a submission, depending on their size/extension too.

Download Samples from Public API!

We had the functionality of downloading the sample from the UI but one of our API users told us that it would be awesome to have this functionality in Public API too, so we added it!

Enhancements

  • PCAP Analyzer is tracking network requests much more precisely right now.

Bug Fixes

  • There were some extension problems while trying to install additional files from Public API, fixed.

  • Listing submissions from the Public API functionality had some problems with MIMETypes, fixed.

‍

From now on, we’ve enabled our Free Plan users to download Additional Files(Memory Dumps, PCAP Dumps), Submission Sample and HTML Report!

Filter Submissions via clicking to Charts!

We got some feedback from our users that was about the charts above the public/my submissions tables. They told us that it would be awesome if pie chart become clickable and has filtering function, we thought the same and did it, check it out from this link!

Install Additional Files from Public API!

Now you can install additional files from our Public API! Check our plans page to see which of our plans have API Support!

Check our VM Timer!

In submission cycle, we have a part that you can connect to the VM environment via VNC and see what is going on inside the VM, now you can see how many time remains before VM is killed! Experience it by submitting a file to the Threat.Zone!

Enhancements

  • Added Plan & Modules to the Settings Section! Now you can see how many modules you have, details about your plan and modules.

  • Now you can undo filters at Submissions section!

Bug Fixes

  • Public API had a problem about sending document links, fixed.

  • There was an error about public submissions order in Public API, fixed.

  • Threat.Zone Public API had a wrong date issue while submitting files, fixed.

  • Public API had a mimetype problem, fixed.

  • Submissions Search Bar had a problem that results in disfunctionality in “enter” key, fixed.

Download submission artifacts performance has been optimized, resulting in faster access to analysis results.

File & URL Submission: Easily upload and scan files and URLs for comprehensive malware analysis.

  • Report Retrieval: Fetch detailed reports including static analysis results, behavioral insights, and extracted indicators of compromise (IOCs).

  • Integration: Seamlessly incorporate Threat.Zone's advanced scanning and malware detection functionalities into your applications and workflows. With this API, you can make integrations to the SOARs too.

  • Threat.Zone
    see in syscall is the option in indicators
    New Syscall Match For The Indicator feature
    New Network Package Analysis Tool

    v2.2.0

    Extended Static Scan Support

    We've expanded our Static Scan capabilities to include APK and ELF file formats. You can now analyze Android applications and Linux executables without execution, providing deeper insights into potential threats across multiple platforms.

    Public API Enhancement

    Public API now provides access to behaviors! You can programmatically access submission behaviors, enabling better integration with your security workflows and automated analysis systems.

    Bug Fixes

    Concurrency issues that occasionally affected submissions have been resolved.

    Search historical analysis data and trends.

    https://app.threat.zone/submission/5cf60a7e-9662-493f-b380-86f1b9969e67/overview
    https://app.threat.zone/submission/2f8e01c0-140f-4e85-adbb-fa18bf1ae911/overview
    git clone https://github.com/threat-zone/threatzonemcp
    We've added NSRL (National Software Reference Library) Database Check to Static Scan! This allows you to quickly identify known & benign files and focus on potentially malicious content.

    Here is a quick review of how we show Real Filename & SHA256 of the given file, also "benign" tag is added after the file is found on the database!

    Real Filename & Real SHA256

    Bug Fixes

    Cookie Error in the Firefox browser has been resolved, improving the overall browsing experience within our analysis environment.

    Get

    v2.1.0

    Advanced Malware Traffic Analysis

    With the new Advanced Malware Traffic Analysis feature, you will be able to access incredible amount of data regarding the malwares’ network related actions. You can access this feature after you go to the Dynamic Scan report, network tab.

    You can now inspect the packets within the Dynamic Scan VM and apply filters. For guidance on filtering, check out the filtering guide here:

    ‍

    v1.1.0

    NEW UI! Market & Plans

    Old plans page had a much more boring look, so we decided to change that. We also added the much popular plan that our users use!

    Submission cycle has a fresh look!

    Some of our users told us that submission cycle page (the page that you see after submitting a file) is too big for little data. Now it has a much more fresh look, check it with submitting a file to the Threat.Zone!

    Scroll to the Infinity - Strings

    Now you are able to see strings part as a infinite scroll page! All you have to do is scroll at the strings part, you can see all of the strings that file has.

    14 Days of Comfort - Research Plan Free Trial!

    Now you can try research plan for 14 days! Just go to the Plans page and click the button, and charm happens!

    Download Report by Parts

    Since the previous version released users are able to download files about the submission but not the report itself. Now you can download the report parts just by clicking the button next to the report part headings!

    Enhancements

    • CSI Module has a timer now! You can see the remaining time of your session at the top-right corner.

    • Modules at the Market section has videos! Now you can see the modules in the action before buying them.

    • Navigator at the top-right is updated.

    Bug Fixes

    • A bug at the behaviour part, which results in users couldn’t type after coming from the Mitre ATT&CK table, fixed.

    • Filename regex had a special character problem, fixed.

    • Threat.Zone Public API had a wrong date issue while submitting files, fixed.

    Hunting Module | YARA Rule Generator

    While developing Threat.Zone, we have focused on both preemptive measures and post-incident responses. Alongside our detailed submission page for gathering submission details, we have also introduced a new module called "Hunting.”

    In the Hunting module, we began development with the YARA Generator Engine. Now, for every submission sent to Threat.Zone, a YARA Rule will be automatically generated.

    New YARA Rule Generator UI

    This allows you to view YARA Rule generated for the sample and download it!

    ‍

    Network Configurations | Proxy, OpenVPN and Wireguard

    Malware often checks the victim's region, utilizing this information in diverse ways. With the new Network Configuration page on Threat.Zone, you now have the freedom to use Proxy or VPN configuration you prefer in your Dynamic Analysis.

    Once you click on the configurations tab, you can view your existing network configurations and create new ones. We provide three options for changing the network configuration for your analysis VM, Proxy OpenVPN and Wireguard.

    New Create Network Configuration UI

    Once you've created a configuration, when you start a new scan process, you'll find your created network configurations at the bottom. Upon selection and submission, your interactive VM will utilize this configuration for its network settings.

    Use Network Configuration in your Analysis

    ‍

    Static Scan Improvements | YARA Match & Strings

    We've made significant enhancements to the scoring capabilities of Threat.Zone's Static Scan. By refining the YARA rules, we've seen a remarkable increase in scoring accuracy and matching capabilities.

    Additionally, when you submit samples to Threat.Zone's Static Scan, you'll now notice that your submission is tagged with possible malware families and types.

    These updates are designed to equip you with amazing tools and insights to enhance your threat analysis endeavors. We remain dedicated to continually improving Threat.Zone to better address your security requirements. If you haven't registered yet, you can do so here.

    Wireshark Filtering Guide
    New Advanced Malware Traffic Analysis UI

    ThreatZone Onpremise Usage Guide

    This document is for using ThreatZone Onpremise & Private Cloud. If you still have questions when trying to solve your problems, immediately contact us at [email protected]

    Introduction

    This document provides instructions on accessing the system, submitting files for analysis, and retrieving results. If you have any further questions, please reach out via the provided email or through Malwation's Slack channel.

    Accessing the System

    First of all you will be given the default email & password, at first it would be these:

    Email: [email protected]

    Password: Will be given to you.

    It is strongly recommended to change the default password immediately via the admin panel, which is accessible at port 9443. All of the management of the system should have been done there, will give details about it below.

    Once logged in, you will be directed to the main interface where you can submit files for analysis:

    ThreatZone Main Page

    As you can see, in this page you will send the file to the system and start the analysis journey. After you've send the submission, there would be two main options:

    1. If file is a Compressed File:

    System will get your Compressed file(tar.gz, zip, tar, rar etc.) and ask an optional password from you. After you pass your password, if the password is correct, you will see a page like this:

    Select entrypoint for analyzing a compressed file

    The entrypoint of a compressed file is used for executing which file when doing the Dynamic Analysis.

    Static Analysis of the compressed files could be limited, because the whole compressed file is passed to the Static Analyzer, would be a good idea to send the entrypoint directly to the Static Analyzer to get the appropriate result from it.

    You will see the config screen after selecting the entrypoint.

    1. If file is Not a Compressed File - Config Screen

    Now, you will see the analysis options, you can change them based of your choices.

    Analysis Config Screen

    After clicking the "Launch the Submission" button, your submission will start and system will update the statuses of the both Dynamic & Static Analysis in live mode, so make sure your browser supports Websocket.

    Submission Analysis Page's details will not be given in this tutorial, the technical details should be given to you in a meeting. If you have any questions about getting info from the analysis screen, please contact us immediately.

    Admin Panel Access

    The admin panel of the Threat.Zone would be accessible at:

    $IP_OR_DOMAIN:9443/

    You can access the main page of the admin after passing the default credentials:

    Email: [email protected]

    Password: Malwation123!

    Admin Panel Dashboard View

    Admin panel is the main control mechanism above Threat.Zone, you can:

    • Create New Users: New users can access to Threat.Zone by adding them via Admin Panel and assigning plans to them or they can register from the main panel(443) and admin can assign them appropriate plans.

    • Assigning Plan to the User(s): By default, new users will be assigned to the Free plan, you can change it from the "Users>User Detail>Plan and Modules"

    • Checking Worker Core Count: Core count is critic when dealing with big loads of submissions & troubleshooting the "Received" state of the submission(s).

    • Checking Submissions

    • Creating Organizations

    Minor Issues & Solutions

    Worker Service Stuck Cores - Submissions at "Received" State

    ThreatZone efficiently manages concurrent file processing by allocating CPU cores per submission in Dynamic Analysis (no restrictions apply to Static Scan or CDR). By default, the system imposes limits on maximum concurrent processing to optimize performance. These are the maximum concurrent limitations on sandboxes:

    • Windows Sandbox: 20

    • Linux Sandbox: 10

    • MacOS Sandbox: 10

    • Android Sandbox: 10

    When you hit that count, wait for them to finish, or for new submission Threat.Zone will automatically queues them.

    VNC Connection Break Problem

    If you encounter an error while accessing a machine’s VNC during an "In Progress" submission (e.g., "There is an unexpected error"), it may be due to a broken connection. The simplest solution is to refresh the page.

    For further assistance, please contact the support team.

    Threat.Zone – Advanced Malware Analysis Platform with Hypervisor-Powered Sandboxingthreat.zone

    ThreatZone OnPremise Installation Guide

    If you want to test & use our OnPremise version, contact us through [email protected]

    ThreatZone On-Premise Installation Manual

    Prerequisites

    Logo

    Ubuntu 22.04 LTS server

  • Root or sudo access

  • Internet connectivity to

    • https://hub.malwation.com - for Docker & Kubernetes images

    • https://u424762-sub1.your-storagebox.de - for Threat.Zones necessary files for OS Images & Snapshots.

    • APT Repositories - need some packages for installation - E.g rpcsvc-proto, libunbound8 etc. - from official Ubuntu mirrors.

    • Pip repositories - need some packages for installation - E.g fastapi uvicorn python-multipart etc.

  • Installation Steps

    1. Run Installation Script

    2. User Inputs Required

    Proxy Configuration (Optional)

    • y: Continue to proxy setup

    • n: Skip proxy configuration

    If y selected:

    • Enter proxy server IP/hostname (e.g., 192.168.1.100 or proxy.company.com)

    • Enter proxy port (1-65535, e.g., 3128, 8080)

    • Confirm configuration

    Example:

    File Replacement Confirmations

    During proxy configuration, the script may find existing configuration files. You'll see prompts like:

    Recommendations:

    • y: Replace with new proxy settings (recommended for new installations)

    • n: Keep existing configuration (use if you have custom settings)

    Note: Original files are automatically backed up with timestamps (e.g., 99proxy.backup.20250804_143022)

    Server IP Address

    • Enter the external IP address where ThreatZone will be accessible

    • This IP will be used for SSL certificates and service configuration

    Examples:

    • Public IP: 203.0.113.45

    • Private network IP: 192.168.1.100

    • Domain name: threatzone.company.com (if DNS is configured)

    Important: Use the IP/domain that users will access ThreatZone from

    SSL Certificate Configuration

    If y selected:

    • Provide full path to your private key file

    • Provide full path to your certificate file

    Examples:

    Requirements:

    • Files must exist and be readable

    • Key file should be unencrypted

    • Certificate should match the server IP/domain entered earlier

    If n selected:

    • Self-signed certificate will be generated automatically using the provided IP address

    • Certificate will be valid for 365 days

    • Browser will show security warnings (normal for self-signed certificates)

    Installation Process

    After user inputs, the script will:

    1. Configure system proxy settings (if enabled)

    2. Install Docker and configure proxy

    3. Install K3s Kubernetes

    4. Deploy all ThreatZone services

    5. Configure networking and certificates

    6. Start all required components

    Post-Installation

    • Reboot server when installation completes

    • Access ThreatZone via: https://[EXTERNAL_IP]

    Notes

    • Installation takes 30-60 minutes depending on network speed

    • All services will auto-start after reboot

    • Proxy settings apply system-wide if configured

    Troubleshooting

    Common Issues

    Invalid Proxy Port

    Solution: Enter a numeric port between 1-65535 (common ports: 3128, 8080, 1080)

    Missing Certificate Files

    Solution: Verify certificate file paths exist and are accessible

    File Permission Errors

    Solution: Ensure running script with sudo for system file modifications

    Configuration File Locations

    After installation, proxy settings are stored in:

    • /etc/apt/apt.conf.d/99proxy - APT package manager

    • /etc/profile.d/proxy.sh - Shell environment

    • /etc/systemd/system/docker.service.d/http-proxy.conf - Docker daemon

    • /etc/systemd/system/containerd.service.d/http-proxy.conf - Containerd daemon

    • /etc/systemd/system/k3s.service.env - Kubernetes

    • /etc/environment - System-wide environment variables

    • /threatzone/threatzone_proxy_config - Passed proxy host & port is stored here

    Backup Files

    All replaced configuration files are backed up with timestamps:

    • Format: filename.backup.YYYYMMDD_HHMMSS

    • Location: Same directory as original file

    • Use these to restore previous settings if needed

    sudo ./start.sh
    Do you want to configure proxy settings? (y/n):
    Enter proxy host/IP: [IP_ADDRESS]
    Enter proxy port: [PORT_NUMBER]
    Is this correct? (y/n):
    Enter proxy host/IP: 116.203.244.19
    Enter proxy port: 3128
    Is this correct? (y/n): y
    File /etc/apt/apt.conf.d/99proxy already exists!
    Current content:
    ----------------------------------------
    Acquire::http::Proxy "http://old.proxy.com:8080/";
    Acquire::https::Proxy "http://old.proxy.com:8080/";
    ----------------------------------------
    
    New content to be replaced:
    ----------------------------------------
    Acquire::http::Proxy "http://proxy.company.com:3128/";
    Acquire::https::Proxy "http://proxy.company.com:3128/";
    ----------------------------------------
    
    Do you want to replace this file? (y/n):
    IP Address you want to server Threat.Zone: [EXTERNAL_IP]
    Do you want to use your own certificate? (y/n):
    TLS key file path: [PATH_TO_KEY]
    TLS crt file path: [PATH_TO_CRT]
    TLS key file path: /home/admin/ssl/server.key
    TLS crt file path: /home/admin/ssl/server.crt
    [ERROR] Invalid port number. Please enter a valid port (1-65535).
    cp: cannot stat '/path/to/cert.crt': No such file or directory

    Get account details, limits, and plan information

    get

    Get account details, limits, and plan information in a detailed way of used workspace

    Authorizations
    AuthorizationstringRequired

    Communication key

    Responses
    200

    User information retrieved successfully

    application/json
    401

    Unauthorized

    get
    /public-api/me

    URL will be analyzed by Threat.Zone URL Scanner, use the UUID to track the status of the submission

    post
    Authorizations
    AuthorizationstringRequired

    Communication key

    Body
    urlstringOptional

    URL to be analyzed

    Example: https://example.com
    privatebooleanOptional

    Determines if the scan should be private

    Default: false
    Responses
    200

    Successful analysis

    No content

    400

    Bad Request - Invalid URL or body

    401

    Unauthorized

    post
    /public-api/scan/url-analysis

    No content

    File will be scanned by Threat.Zone Sandbox & Static Scanner, use the UUID to track the status of the submission

    post
    Authorizations
    AuthorizationstringRequired

    Communication key

    Query parameters
    autostringOptional

    If this passed as "true", all of the metafields and environment will be set automatically

    Example: false
    Body
    filestring · binaryRequired

    File to be analyzed

    extensionCheckstringOptional

    Make a MIMEType check for the file and auto-assign the extension

    Example: true
    modulesstring[]Optional

    Modules to be used in analysis

    Example: ["csi","cdr"]
    entrypointstring | nullableOptional

    Select the file to be executed within the archive

    Example: file.exe
    passwordstring | nullableOptional

    Enter the password that will be used to open the archive file

    Example: password
    Responses
    200

    Successful analysis

    No content

    401

    Unauthorized

    422

    Unprocessable Entity - Invalid file or body

    post
    /public-api/scan/sandbox

    No content

    File will be scanned by Threat.Zone Static Scanner, use the UUID to track the status of the submission

    post

    This endpoint allows users to upload a file and perform a static scan on it.

    Authorizations
    AuthorizationstringRequired

    Communication key

    Body
    filestring · binaryRequired

    The file to be scanned

    extensionCheckone ofOptional

    Option to check file extension

    booleanOptional
    or
    stringOptional
    isPublicbooleanOptional

    Whether the scan results should be public

    entrypointstring | nullableOptional

    Select the file to be executed within the archive

    Example: file.exe
    passwordstring | nullableOptional

    Enter the password that will be used to open the archive file

    Example: password
    Responses
    200

    The file has been successfully scanned

    No content

    401

    Unauthorized

    422

    Unprocessable Entity - Invalid file or body

    post
    /public-api/scan/static-scan

    No content

    Perform a CDR (Content Disarm and Reconstruction) scan on an uploaded file

    post

    This endpoint allows users to upload a file and perform a CDR scan on it, extension check is not optional because it is necessary for CDR module to work properly.

    Authorizations
    AuthorizationstringRequired

    Communication key

    Body
    filestring · binaryRequired

    The file to be scanned

    isPublicbooleanOptional

    Whether the scan results should be public

    entrypointstring | nullableOptional

    Select the file to be executed within the archive

    Example: file.exe
    passwordstring | nullableOptional

    Enter the password that will be used to open the archive file

    Example: password
    Responses
    200

    The file has been successfully submitted for CDR

    application/json
    401

    Unauthorized

    422

    Unprocessable Entity - Invalid file or body

    post
    /public-api/scan/cdr

    Get metafields that can be used in the Threat.Zone API

    get

    Retrieve metafields to use in the Threat.Zone's /scan/sandbox endpoint

    Authorizations
    AuthorizationstringRequired

    Communication key

    Responses
    200

    Successfully retrieved metafields

    application/json
    get
    /public-api/constants/metafields
    200

    Successfully retrieved metafields

    Get all available levels used in Threat.Zone API

    get

    Retrieve all available levels for a Threat.Zone submission that can be used

    Responses
    200

    Successfully retrieved levels

    application/json
    get
    /public-api/constants/levels
    200

    Successfully retrieved levels

    Get all available statuses used in Threat.Zone API

    get

    Retrieve all available statuses for a submission

    Responses
    200

    Successfully retrieved statuses

    application/json
    get
    /public-api/constants/statuses
    200

    Successfully retrieved statuses

    Get sample metafield to use while sending requests to the /scan/sandbox endpoint

    get

    Retrieve a sample metafield to use while sending requests to the /scan/sandbox endpoint

    Responses
    200

    Successfully retrieved sample metafield

    application/json
    get
    /public-api/constants/samplemetafield
    200

    Successfully retrieved sample metafield

    Download the sanitized file for a given submission UUID, sanitized by CDR

    get

    Download the sanitized file for a given submission UUID, sanitized by CDR

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    Successfully downloaded the sanitized file

    No content

    400

    Bad request - CDR module not purchased or report not ready

    404

    Submission not found

    get
    /public-api/download/cdr/{uuid}

    No content

    Download HTML report for a submission

    get
    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission ID

    Responses
    200

    HTML report downloaded successfully

    No content

    404

    HTML report not found

    500

    Internal server error

    get
    /public-api/download/html-report/{uuid}

    No content

    Get submission details by providing UUID

    get

    Get submission details by providing UUID

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    Submission details retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}

    No content

    Get submission indicators

    get

    Get all indicators for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    Indicators retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/indicators

    No content

    Get submission IoCs

    get

    Get all Indicators of Compromise for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    IoCs retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/iocs

    No content

    Get submission YARA rules

    get

    Get all matched YARA rules for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    YARA rules retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/matched-yara-rules

    No content

    Get submission Varist Hybrid Analyzer

    get

    Get Varist Hybrid Analyzer results for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    Varist Hybrid Analyzer results are retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/varist-hybrid-analyzer-results

    No content

    Get submission artifacts

    get

    Get all artifacts for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    Artifacts retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/analysis-artifacts

    No content

    Get submission config extractor results

    get

    Get all extracted configurations for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    Config extractor results retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/config-extractor-results

    No content

    Get submission DNS queries

    get

    Get all DNS queries for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    DNS queries retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/dns

    No content

    Get submission HTTP requests

    get

    Get all HTTP requests and packets for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    HTTP requests retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/http

    No content

    Get submission TCP requests

    get

    Get all TCP requests and packets for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    TCP requests retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/tcp

    No content

    Get submission UDP requests

    get

    Get all UDP requests and packets for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    UDP requests retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/udp

    No content

    Get submission network threats

    get

    Get all network threats for a specific submission

    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    uuidstringRequired

    Submission UUID

    Responses
    200

    Network threats retrieved successfully

    No content

    404

    Submission not found

    get
    /public-api/get/submission/{uuid}/threats

    No content

    Get user submissions

    get
    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    pagenumberRequired

    Page number

    jumpnumberRequired

    Number of items per page

    Responses
    200

    User submissions retrieved successfully

    No content

    get
    /public-api/get/my-submissions/{page}/{jump}
    200

    User submissions retrieved successfully

    No content

    Get public submissions

    get
    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    pagenumberRequired

    Page number

    jumpnumberRequired

    Number of items per page

    Responses
    200

    Public submissions retrieved successfully

    No content

    get
    /public-api/get/public-submissions/{page}/{jump}
    200

    Public submissions retrieved successfully

    No content

    Search submissions by hash

    get
    Authorizations
    AuthorizationstringRequired

    Communication key

    Path parameters
    hashstringRequired

    File hash (MD5, SHA1, or SHA256)

    pagenumberRequired

    Page number

    jumpnumberRequired

    Number of items per page

    Responses
    200

    Submissions found successfully

    No content

    400

    Invalid hash type

    get
    /public-api/get/{hash}/{page}/{jump}

    No content

    GET /public-api/me HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    {
      "userInfo": {
        "email": "text",
        "fullName": "text",
        "workspace": {
          "name": "text",
          "alias": "text",
          "private": true,
          "type": "text"
        },
        "limitsCount": {
          "apiRequestCount": 1,
          "dailySubmissionCount": 1,
          "concurrentSubmissionCount": 1
        }
      },
      "plan": {
        "planName": "text",
        "startTime": "text",
        "endTime": "text",
        "subsTime": "text",
        "fileLimits": {
          "extensions": {},
          "fileSize": "text"
        },
        "submissionLimits": {
          "apiLimit": 1,
          "dailyLimit": 1,
          "concurrentLimit": 1
        }
      },
      "modules": [
        {
          "moduleId": "text",
          "moduleName": "text",
          "startTime": "text",
          "endTime": "text"
        }
      ]
    }
    POST /public-api/scan/url-analysis HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: application/json
    Accept: */*
    Content-Length: 45
    
    {
      "url": "https://example.com",
      "private": false
    }
    POST /public-api/scan/sandbox HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: multipart/form-data
    Accept: */*
    Content-Length: 671
    
    {
      "file": "binary",
      "analyzeConfig": [
        {
          "metafieldId": "environment",
          "value": "w10_x64"
        },
        {
          "metafieldId": "private",
          "value": false
        },
        {
          "metafieldId": "timeout",
          "value": 180
        },
        {
          "metafieldId": "work_path",
          "value": "desktop"
        },
        {
          "metafieldId": "mouse_simulation",
          "value": true
        },
        {
          "metafieldId": "https_inspection",
          "value": false
        },
        {
          "metafieldId": "internet_connection",
          "value": false
        },
        {
          "metafieldId": "raw_logs",
          "value": false
        },
        {
          "metafieldId": "snapshot",
          "value": false
        },
        {
          "metafieldId": "sleep_evasion",
          "value": false
        },
        {
          "metafieldId": "smart_tracing",
          "value": false
        },
        {
          "metafieldId": "dump_collector",
          "value": false
        }
      ],
      "extensionCheck": "true",
      "modules": [
        "csi",
        "cdr"
      ],
      "entrypoint": "file.exe",
      "password": "password"
    }
    POST /public-api/scan/static-scan HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: multipart/form-data
    Accept: */*
    Content-Length: 103
    
    {
      "file": "binary",
      "extensionCheck": "text",
      "isPublic": true,
      "entrypoint": "file.exe",
      "password": "password"
    }
    POST /public-api/scan/cdr HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Content-Type: multipart/form-data
    Accept: */*
    Content-Length: 79
    
    {
      "file": "binary",
      "isPublic": true,
      "entrypoint": "file.exe",
      "password": "password"
    }
    {
      "message": "text",
      "uuid": "text"
    }
    GET /public-api/constants/metafields HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    [
      {
        "metafieldId": "timeout",
        "value": 60
      }
    ]
    GET /public-api/constants/levels HTTP/1.1
    Host: 
    Accept: */*
    
    [
      {
        "value": 0,
        "description": "Unknown"
      }
    ]
    GET /public-api/constants/statuses HTTP/1.1
    Host: 
    Accept: */*
    
    [
      {
        "value": 1,
        "description": "File received"
      }
    ]
    GET /public-api/constants/samplemetafield HTTP/1.1
    Host: 
    Accept: */*
    
    [
      {
        "metafieldId": "timeout",
        "value": 60
      }
    ]
    GET /public-api/download/cdr/{uuid} HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/download/html-report/{uuid} HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid} HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/indicators HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/iocs HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/matched-yara-rules HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/varist-hybrid-analyzer-results HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/analysis-artifacts HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/config-extractor-results HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/dns HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/http HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/tcp HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/udp HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/submission/{uuid}/threats HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/my-submissions/{page}/{jump} HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/public-submissions/{page}/{jump} HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    
    GET /public-api/get/{hash}/{page}/{jump} HTTP/1.1
    Host: 
    Authorization: Bearer YOUR_SECRET_TOKEN
    Accept: */*
    

    Models