<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Simulated (Fake) Malware To Use With Cortex XDR in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/473539#M1698</link>
    <description>&lt;P&gt;Hi Chukaokonkwo,&amp;nbsp;&lt;/P&gt;&lt;P&gt;additionally to my colleague's link with WF trigerring malware. I would recomend you to install SANS malware analysis and reverse engineering tranining samples on a "Virtual Machine" (because this is real malware) and test it under a closed and controlled environment where you can play with CXDR agent and real malicious stuff. Ive done this before and even tested Forensic Module to see the traces from artifacts and evidences on prefetches, registry to gain persistance ....&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cant remember now a website where you could download even ransomware samples like wannacry, NOT-Petya... and play with it to see that our agents will block it&amp;nbsp;&lt;BR /&gt;Anyways if you find another interesting samples feel free to share here with the community.&lt;/P&gt;&lt;P&gt;And watch out, always test on a closed VM to not to damage any real asset in production&lt;/P&gt;&lt;P&gt;KR,&lt;/P&gt;&lt;P&gt;Luis&lt;/P&gt;</description>
    <pubDate>Wed, 16 Mar 2022 09:44:31 GMT</pubDate>
    <dc:creator>eluis</dc:creator>
    <dc:date>2022-03-16T09:44:31Z</dc:date>
    <item>
      <title>Best Simulated (Fake) Malware To Use With Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/473394#M1687</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Do you all know what the best simulated malware is to use in testing out rules/responsiveness/etc on Cortex XDR and where to download these fake malware from.&amp;nbsp; Ideally it'll be benign specially constructed so they trigger same alerts as actual malware.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A dozen high-fives for tips, suggestions, participation, etc.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 21:29:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/473394#M1687</guid>
      <dc:creator>chukaokonkwo</dc:creator>
      <dc:date>2022-03-15T21:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: Best Simulated (Fake) Malware To Use With Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/473420#M1690</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193230"&gt;@chukaokonkwo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this will be relevant to what you are looking for.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are PA Malware Test File.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/wildfire/9-0/wildfire-admin/submit-files-for-wildfire-analysis/verify-wildfire-submissions/test-a-sample-malware-file" target="_blank"&gt;https://docs.paloaltonetworks.com/wildfire/9-0/wildfire-admin/submit-files-for-wildfire-analysis/verify-wildfire-submissions/test-a-sample-malware-file&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I tested this before, this will just trigger WF alerts.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you are looking in particular like sample malware that trigger BTPs maybe opening a ticket to the support team can help you with this.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 23:00:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/473420#M1690</guid>
      <dc:creator>MarvinC</dc:creator>
      <dc:date>2022-03-15T23:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Best Simulated (Fake) Malware To Use With Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/473539#M1698</link>
      <description>&lt;P&gt;Hi Chukaokonkwo,&amp;nbsp;&lt;/P&gt;&lt;P&gt;additionally to my colleague's link with WF trigerring malware. I would recomend you to install SANS malware analysis and reverse engineering tranining samples on a "Virtual Machine" (because this is real malware) and test it under a closed and controlled environment where you can play with CXDR agent and real malicious stuff. Ive done this before and even tested Forensic Module to see the traces from artifacts and evidences on prefetches, registry to gain persistance ....&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cant remember now a website where you could download even ransomware samples like wannacry, NOT-Petya... and play with it to see that our agents will block it&amp;nbsp;&lt;BR /&gt;Anyways if you find another interesting samples feel free to share here with the community.&lt;/P&gt;&lt;P&gt;And watch out, always test on a closed VM to not to damage any real asset in production&lt;/P&gt;&lt;P&gt;KR,&lt;/P&gt;&lt;P&gt;Luis&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 09:44:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/473539#M1698</guid>
      <dc:creator>eluis</dc:creator>
      <dc:date>2022-03-16T09:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: Best Simulated (Fake) Malware To Use With Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/477737#M1822</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193230"&gt;@chukaokonkwo&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190764"&gt;@eluis&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you would like to simulate a fake attack and use free of cost tool. Please check out Infection Monkey&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.guardicore.com/infectionmonkey/" target="_blank"&gt;https://www.guardicore.com/infectionmonkey/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This should definitely trigger Cortex XDR (Red, Yellow, Blue and Grey)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you would like to fetch some real stuff, you can use URLHaus and browse to malware links which are tagged with Office Doc Tags such as xlsx, docx etc and download, run it in a controlled environment away from production systems or any critical system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: I would personally recommend not to take this route as you will be exposing yourself to real Threat Actors if corrective measures are not taken by yourself.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Apr 2022 20:21:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/477737#M1822</guid>
      <dc:creator>KanwarSingh01</dc:creator>
      <dc:date>2022-04-02T20:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: Best Simulated (Fake) Malware To Use With Cortex XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/477758#M1826</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163390"&gt;@KanwarSingh01&lt;/a&gt;&amp;nbsp; !!! it all adds up&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Apr 2022 14:58:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/best-simulated-fake-malware-to-use-with-cortex-xdr/m-p/477758#M1826</guid>
      <dc:creator>eluis</dc:creator>
      <dc:date>2022-04-03T14:58:08Z</dc:date>
    </item>
  </channel>
</rss>

