<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trying (still) to understand Wildfire in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37681#M27609</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Milkand,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have see false negatives based on Virus total analysis or based on the behavior that was observed leading up to the download of the executable (java downloads leading up to the exe download) or social engineering (clicking on links in emails from bad guys).&amp;nbsp; In these cases we try to get a copy of the executable and attach it to the case we submit to support along with supporting documentation (virus total report, URL of wildfire report ).&amp;nbsp; We have done this on numerous occasions&amp;nbsp; with positive outcomes (virus definitions inclusion).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Jul 2013 11:48:11 GMT</pubDate>
    <dc:creator>HITSSEC</dc:creator>
    <dc:date>2013-07-16T11:48:11Z</dc:date>
    <item>
      <title>Trying (still) to understand Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37677#M27605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got two files sent to me for analysis and I ran them through Wildfire to get a verdict...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately im still not comfortable with what Wildfire thinks is a malware and what me (and obviously the rest of the world) belives is a malware...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could perhaps somebody from PaloAlto themselfs (or somebody else) explain to me why both files have the verdict "Benign" when they obviously is anything BUT benign?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;File1:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Overview&lt;/P&gt;&lt;P&gt;Filename:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b14620ee8cd512565ce5e0ecd6ab55ca.exe&lt;/P&gt;&lt;P&gt;SHA256:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0f57e8e9334daf3769be5a1ddd19337f7ef8d11a9b2297e71a1c8b2cc2ee7ec3&lt;/P&gt;&lt;P&gt;User:&lt;/P&gt;&lt;P&gt;Received:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7/15/2013 9:40:01 PM&lt;/P&gt;&lt;P&gt;Attacker:&lt;/P&gt;&lt;P&gt;Victim:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Hostname/Mgmt. IP:&lt;/P&gt;&lt;P&gt;Application:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Verdict:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Benign&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Analysis Summary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Behavior&lt;/P&gt;&lt;P&gt;Changed security settings of Internet Explorer&lt;/P&gt;&lt;P&gt;Created or modified files&lt;/P&gt;&lt;P&gt;Modified Windows registries&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Detailed Events&lt;/P&gt;&lt;P&gt;Registry&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Personal&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{e86064ca-57e4-11e0-bef8-806d6172696f}\BaseClass&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common Documents&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Desktop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common Desktop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Local AppData&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Micorosoft\Server\SmartAssemblyReportUsage&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Control Panel\Keyboard\InitialKeyboardIndicators&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Process&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Parent Process&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action&lt;/P&gt;&lt;P&gt;C:\sample.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; explorer.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Create&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;File&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Process&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Administrator\Local Settings\Application Data\IsolatedStorage\2uvfwpzx.c5m\ayzczy0y.0ay\Url.xvrp4itmvjamqpvqmgo5332dmzim1pjr\identity.dat&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\sample.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Write&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Administrator\Local Settings\Application Data\IsolatedStorage\2uvfwpzx.c5m\ayzczy0y.0ay\Url.xvrp4itmvjamqpvqmgo5332dmzim1pjr\info.dat&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\sample.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Write&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Administrator\Local Settings\Application Data\IsolatedStorage\2uvfwpzx.c5m\ayzczy0y.0ay\Url.xvrp4itmvjamqpvqmgo5332dmzim1pjr\AssemFiles\BB41470D\Usages.bin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\sample.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Delete&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Administrator\Local Settings\Application Data\IsolatedStorage\2uvfwpzx.c5m\ayzczy0y.0ay\Url.xvrp4itmvjamqpvqmgo5332dmzim1pjr\AssemFiles\BB41470D\D&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\sample.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Delete&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Administrator\Local Settings\Application Data\IsolatedStorage\2uvfwpzx.c5m\ayzczy0y.0ay\Url.xvrp4itmvjamqpvqmgo5332dmzim1pjr\AssemFiles\BB41470D\Usages.bin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\sample.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Write &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here is what Virustotal thinks of the above file: &lt;A href="https://www.virustotal.com/en/file/0f57e8e9334daf3769be5a1ddd19337f7ef8d11a9b2297e71a1c8b2cc2ee7ec3/analysis/1373918339/" title="https://www.virustotal.com/en/file/0f57e8e9334daf3769be5a1ddd19337f7ef8d11a9b2297e71a1c8b2cc2ee7ec3/analysis/1373918339/"&gt; Antivirus scan for 5fa713436f4820532eb6ea70a9e1ff21 at2013-07-15 19:58:59 UTC - VirusTotal &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;File2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Overview&lt;/P&gt;&lt;P&gt;Filename:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; e762428b721a1de0e50cb93c91ca629c.exe&lt;/P&gt;&lt;P&gt;SHA256:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; df97bc506772110d83e081bcc80226483176be6de1da85239ac81440eba89ec0&lt;/P&gt;&lt;P&gt;User:&lt;/P&gt;&lt;P&gt;Received:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7/15/2013 9:40:18 PM&lt;/P&gt;&lt;P&gt;Attacker:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Victim:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Hostname/Mgmt. IP:&lt;/P&gt;&lt;P&gt;Application:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Verdict:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Benign&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Analysis Summary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Behavior&lt;/P&gt;&lt;P&gt;Created or modified files&lt;/P&gt;&lt;P&gt;Spawned new processes&lt;/P&gt;&lt;P&gt;Modified Windows registries&lt;/P&gt;&lt;P&gt;Changed security settings of Internet Explorer&lt;/P&gt;&lt;P&gt;Changed the proxy settings for Internet Explorer&lt;/P&gt;&lt;P&gt;Modified the network connections setting for Internet Explorer&lt;/P&gt;&lt;P&gt;Attempted to sleep for a long period&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Detailed Events&lt;/P&gt;&lt;P&gt;Registry&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Personal&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{e86064ca-57e4-11e0-bef8-806d6172696f}\BaseClass&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common Documents&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Desktop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common Desktop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\AppData&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Personal&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cookies&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\History&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Common AppData&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\MigrateProxy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Delete&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Delete&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Delete&lt;/P&gt;&lt;P&gt;HKLM\SYSTEM\ControlSet001\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Process&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Parent Process&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action&lt;/P&gt;&lt;P&gt;C:\sample.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; explorer.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Create&lt;/P&gt;&lt;P&gt;C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\sample.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Create&lt;/P&gt;&lt;P&gt;C:\WINDOWS\system32\userinit.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\WINDOWS\system32\winlogon.exe&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Terminate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;File&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Process&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Administrator\Local Settings\Temp\dw.log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Write&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Administrator\Local Settings\Temp\8750.dmp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; C:\Program Files\Common Files\Microsoft Shared\DW\DW20.EXE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Write &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here is what Virustotal thinks of the above file: &lt;A href="https://www.virustotal.com/en/file/df97bc506772110d83e081bcc80226483176be6de1da85239ac81440eba89ec0/analysis/1373918301/" title="https://www.virustotal.com/en/file/df97bc506772110d83e081bcc80226483176be6de1da85239ac81440eba89ec0/analysis/1373918301/"&gt; Antivirus scan for 8b00c2d2face7267c2eb16c93e75a662 at2013-07-15 19:58:21 UTC - VirusTotal &lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jul 2013 20:06:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37677#M27605</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-15T20:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: Trying (still) to understand Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37678#M27606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This could be a possible False_negative.&lt;/P&gt;&lt;P&gt;Can you please open a support case specifying the &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;SHA&lt;/SPAN&gt; of both these files.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jul 2013 21:38:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37678#M27606</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-15T21:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: Trying (still) to understand Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37679#M27607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have forwarded this to "my" support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jul 2013 21:44:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37679#M27607</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-15T21:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Trying (still) to understand Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37680#M27608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have created a case and made sure the SHA for both files as well as a link to this forum post is part of the same case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 06:50:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37680#M27608</guid>
      <dc:creator>radpointsupport</dc:creator>
      <dc:date>2013-07-16T06:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: Trying (still) to understand Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37681#M27609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Milkand,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have see false negatives based on Virus total analysis or based on the behavior that was observed leading up to the download of the executable (java downloads leading up to the exe download) or social engineering (clicking on links in emails from bad guys).&amp;nbsp; In these cases we try to get a copy of the executable and attach it to the case we submit to support along with supporting documentation (virus total report, URL of wildfire report ).&amp;nbsp; We have done this on numerous occasions&amp;nbsp; with positive outcomes (virus definitions inclusion).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 11:48:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37681#M27609</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2013-07-16T11:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Trying (still) to understand Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37682#M27610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A __default_attr="5926" __jive_macro_name="user" class="jive_macro jive_macro_user" data-objecttype="3" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; This is true for AV,Spyware and Vulnerability.For Wildfire you just need SHA of the suspected file.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 13:08:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37682#M27610</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-16T13:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: Trying (still) to understand Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37683#M27611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In this case Radpoint ("my" support &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; returned to me asking for the files in question - seems like 2nd line support (over at PA) doesnt have proper access to the files being uploaded to wildfire (or because these files were identified as benign wildfire doesnt store them - only files identified as malware and not previously seen is stored within wildfire, anyone who knows what happens behind the scenes?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway - support has got the files and case id 147980 is open regarding this... hopefully it wont take too long to get an explanation in return for why wildfire identified both files as benign...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because, and this has been discussed previously in this forum, I fully understand if for example a downloader isnt identified as malware (even if I somewhat doesnt agree but still) but rather the file which the downloader is downloading (unless the downloader on its own is exploiting stuff) - but neither of the files seems to match that criteria.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 14:00:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37683#M27611</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-16T14:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Trying (still) to understand Wildfire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37684#M27612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It turns out this was actually a false-negative as I got this in return from the support:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;The verdict in production has been changed to malware and these samples will be covered by Virus/Win32.generic.jnrgg and Virus/Win32.generic.jnrgh in WF AV: 16814&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jul 2013 07:41:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trying-still-to-understand-wildfire/m-p/37684#M27612</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-19T07:41:35Z</dc:date>
    </item>
  </channel>
</rss>

