<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [Proposing Solution] Failure to extract zip file downloaded from ThreatGrid integration command in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/proposing-solution-failure-to-extract-zip-file-downloaded-from/m-p/1240202#M4170</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Cisco Secure Malware Analytics (Threat Grid) v2&lt;/STRONG&gt; is an OOTB integration comes as part of&amp;nbsp;&lt;STRONG&gt;Cisco Secure Malware Analytics&amp;nbsp;&lt;/STRONG&gt;content pack to connect with ThreatGrid(TG) platform and achieve various functionalities.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Issue background&lt;/STRONG&gt;: &lt;EM&gt;!threat-grid-sample-list&lt;/EM&gt;&amp;nbsp;integration command downloads resources for the given sample id from ThreatGrid depending on the type of artifacts provided as input.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;supported artifacts from TG are:&amp;nbsp;&lt;FONT face="comic sans ms,sans-serif" color="#0000FF"&gt;video.webm, network-artifacts.zip, report.html, sample.zip, screenshot.png, extracted-artifacts.zip, timeline.json, analysis.json, processes.json, network.pcap&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sample.zip is one such artifact which downloads zip file from TG encrypted with default password - "infected".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Issue:&lt;/STRONG&gt; Above command downloads the zip file in corrupt format which fails to extract file from the downloaded zip. This is due to a bug in the&amp;nbsp;Cisco Secure Malware Analytics (Threat Grid) v2 integration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Solution:&amp;nbsp;&lt;/STRONG&gt;Proposing a solution (attached in screenshot below) which the XSOAR team may patch in their next release.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN closed support case&amp;nbsp;&lt;SPAN&gt;Case#&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;03676558&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Cortex XSOAR" id="Cortex_XSOAR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1525074605"&gt;@kmcdade&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/217752"&gt;@inagaria&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306009"&gt;@alindsay&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Oct 2025 02:43:53 GMT</pubDate>
    <dc:creator>V.Kopparad</dc:creator>
    <dc:date>2025-10-17T02:43:53Z</dc:date>
    <item>
      <title>[Proposing Solution] Failure to extract zip file downloaded from ThreatGrid integration command</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/proposing-solution-failure-to-extract-zip-file-downloaded-from/m-p/1240202#M4170</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Cisco Secure Malware Analytics (Threat Grid) v2&lt;/STRONG&gt; is an OOTB integration comes as part of&amp;nbsp;&lt;STRONG&gt;Cisco Secure Malware Analytics&amp;nbsp;&lt;/STRONG&gt;content pack to connect with ThreatGrid(TG) platform and achieve various functionalities.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Issue background&lt;/STRONG&gt;: &lt;EM&gt;!threat-grid-sample-list&lt;/EM&gt;&amp;nbsp;integration command downloads resources for the given sample id from ThreatGrid depending on the type of artifacts provided as input.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;supported artifacts from TG are:&amp;nbsp;&lt;FONT face="comic sans ms,sans-serif" color="#0000FF"&gt;video.webm, network-artifacts.zip, report.html, sample.zip, screenshot.png, extracted-artifacts.zip, timeline.json, analysis.json, processes.json, network.pcap&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sample.zip is one such artifact which downloads zip file from TG encrypted with default password - "infected".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Issue:&lt;/STRONG&gt; Above command downloads the zip file in corrupt format which fails to extract file from the downloaded zip. This is due to a bug in the&amp;nbsp;Cisco Secure Malware Analytics (Threat Grid) v2 integration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Solution:&amp;nbsp;&lt;/STRONG&gt;Proposing a solution (attached in screenshot below) which the XSOAR team may patch in their next release.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN closed support case&amp;nbsp;&lt;SPAN&gt;Case#&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;03676558&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Cortex XSOAR" id="Cortex_XSOAR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1525074605"&gt;@kmcdade&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/217752"&gt;@inagaria&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306009"&gt;@alindsay&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 02:43:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/proposing-solution-failure-to-extract-zip-file-downloaded-from/m-p/1240202#M4170</guid>
      <dc:creator>V.Kopparad</dc:creator>
      <dc:date>2025-10-17T02:43:53Z</dc:date>
    </item>
  </channel>
</rss>

