<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom Signature to detect a PDF file in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/258761#M298</link>
    <description>&lt;P&gt;dpharis,&amp;nbsp; on another post it was stated that Palo Alto does not do signatures for specific hashes since the same malware can/will use different hashes.&amp;nbsp; My question is if my org decides to do custom sigs for specific hashes, will it eventually hamper/degrade FW's performance say, after a couple thousand signatures?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 25 Apr 2019 13:24:42 GMT</pubDate>
    <dc:creator>Bart_Burford</dc:creator>
    <dc:date>2019-04-25T13:24:42Z</dc:date>
    <item>
      <title>Custom Signature to detect a PDF file</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/252502#M293</link>
      <description>&lt;P&gt;DISCLAIMER:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As with all custom signatures on this forum, this signature is being provided by the author as a result of enthusiasm for the product and to share ideas with the Palo Alto Networks security community.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Not recommended for deployment in a production network of any kind without internal testing.&lt;/P&gt;
&lt;P&gt;- Not a solution to any vulnerability.&lt;/P&gt;
&lt;P&gt;- Not an official supported Palo Alto Networks signature&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;This write up is to help the Palo Alto Networks community with detecting a specific PDF file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The sample signature was created on PAN OS Version 8.1.x :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;SHA256: cbdf842fba661b85090e7e31fe9ed6b069a01fd82d5bd563a462185b53ab38e3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go to custom signatures under objects, select custom vulnerability signature. Click add&lt;/P&gt;
&lt;P&gt;Fill out the appropriate field under the configuration tab&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 758px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18984i9887E908E144C306/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Open the Signature Tab&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 757px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18982i12E30AA040EFE05E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Select add at the bottom left&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18985iBEBC4C70C4B365F8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since we only have one condition it doesn’t matter if we choose the ‘and’/’or’ condition&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 604px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18981i4069FD261D0F6137/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To determine a unique string the *NIX utility xxd was used in this case, however any hex editor will work for this purpose.&amp;nbsp; The string was then converted to hex and used in a pattern match to detect the file. In this case the author of the file put what we believe to be their name in the file and that was used as a unique identifier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;5220 3120 2038 2030 5d52 432f 6e6f 6574&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18983i4DBAB6434493FB91/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Once this custom signature is applied and a web browser is used to attempt to download the file the firewall will either block or alert on detection depending on the action you set.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;**Warning** any custom signature should be fully tested to see if it works correctly, and for false positives.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 14:13:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/252502#M293</guid>
      <dc:creator>dparris</dc:creator>
      <dc:date>2019-03-06T14:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Signature to detect a PDF file</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/258761#M298</link>
      <description>&lt;P&gt;dpharis,&amp;nbsp; on another post it was stated that Palo Alto does not do signatures for specific hashes since the same malware can/will use different hashes.&amp;nbsp; My question is if my org decides to do custom sigs for specific hashes, will it eventually hamper/degrade FW's performance say, after a couple thousand signatures?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 13:24:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/258761#M298</guid>
      <dc:creator>Bart_Burford</dc:creator>
      <dc:date>2019-04-25T13:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Signature to detect a PDF file</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/258763#M299</link>
      <description>&lt;P&gt;Hello Bart,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your research is correct. We do not create signatures for specific hash values because it is both inefficient, and easily bypassed with a minimal change to the original file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The performance impact is difficult to determine in a hypothetical situation due to the limitless environmental variables. The short answer though is yes, there will be an impact to utilizing large numbers of custom signatures. If you intend to block a large number of files using customer signatures, instead of using hashes, we suggest you identify a unique character string in the file and utilize if after thorough testing, as this improves your changes of catching multiple variants of the same malware.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 14:00:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/258763#M299</guid>
      <dc:creator>dparris</dc:creator>
      <dc:date>2019-04-25T14:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Signature to detect a PDF file</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/258764#M300</link>
      <description>&lt;P&gt;Copy that.&amp;nbsp; Appreciate your quick reply!&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 14:13:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/258764#M300</guid>
      <dc:creator>Bart_Burford</dc:creator>
      <dc:date>2019-04-25T14:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Signature to detect a PDF file</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/421588#M403</link>
      <description>&lt;OL class="X5LH0c"&gt;
&lt;LI&gt;Open the Signature Tab.&lt;/LI&gt;
&lt;LI&gt;Select add at the bottom left.&lt;/LI&gt;
&lt;LI&gt;Since we only have one condition it doesn't matter if we choose the 'and'/'or' condition.&lt;/LI&gt;
&lt;LI&gt;To determine a unique string the *NIX utility xxd was used in this case, however any hex editor will work for this purpose.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 08 Dec 2021 17:07:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/custom-signature-to-detect-a-pdf-file/m-p/421588#M403</guid>
      <dc:creator>Shane98</dc:creator>
      <dc:date>2021-12-08T17:07:16Z</dc:date>
    </item>
  </channel>
</rss>

