Cuckoo

Version: 1.4
Updated: Jul 06, 2023
Utilize Cuckoo sandbox to detonate potentially malicious files and URLs during an active investigation.
Actions
- Detonate File (Enrichment) - Submit file for analysis.
- Detonate URL (Enrichment) - Submit URL for analysis.
- Get Task Status (Enrichment) - Get status for a specific Task.
- Get URL Report (Enrichment) - Get report for a specific URL.
- Get File Report (Enrichment) - Get report for a specific file.
Notes
- After submitting (detonation), task has three phases. It can be pending, analyzing, or reported status.
Configure Cuckoo in Automation Service and Cloud SOAR
Before you can use the integration, you must configure it so that the vendor can communicate with Sumo Logic. For general guidance, see Configure Authentication for Integrations.
- Access App Central and install the integration.
- Select the installed integration in the Integrations page.
Classic UI. In the main Sumo Logic menu, select Automation and then select Integrations in the left nav bar.
New UI. In the main Sumo Logic menu, select Automation > Integrations. You can also click the Go To... menu at the top of the screen and select Integrations. - Select the integration.
- Hover over the resource name and click the Edit button that appears.
- In the Add Resource dialog, enter the authentication needed by the resource. When done, click TEST to test the configuration, and click SAVE to save the configuration.
For information about Cuckoo, see Cuckoo documentation.
Change Log
- September 19, 2019 - First upload
- March 19, 2021 - Actions updated
- July 6, 2023 (v1.4)
- Updated the integration with Environmental Variables
- Integration renamed from Cuckoo OIF to Cuckoo