<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Vault and Virus/Win32.WGeneric.aalbaq in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/threat-vault-and-virus-win32-wgeneric-aalbaq/m-p/258403#M73290</link>
    <description>&lt;P&gt;Thanks! &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Apr 2019 16:08:30 GMT</pubDate>
    <dc:creator>Curt.Schwarder</dc:creator>
    <dc:date>2019-04-23T16:08:30Z</dc:date>
    <item>
      <title>Threat Vault and Virus/Win32.WGeneric.aalbaq</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-vault-and-virus-win32-wgeneric-aalbaq/m-p/258240#M73246</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Curious if anyone can point me toward amplifying info regarding Threat Vault signatures? From what I can tell, these generic signatures usually tend to generate false positives. It's hard to investigate why the alert is getting triggered when the Threat Vault only shows a hash without any context or information regarding why it's deemed malicious. Is the hash the only thing&amp;nbsp; triggering these? I search for the hash on other my other security systems and I get no results, so I have no idea how to chase it down. This particular case is getting triggered by&amp;nbsp;MSVCR80.DLL, which is pretty common on Windows systems. Any guidance is greatly appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2019 16:05:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-vault-and-virus-win32-wgeneric-aalbaq/m-p/258240#M73246</guid>
      <dc:creator>Curt.Schwarder</dc:creator>
      <dc:date>2019-04-22T16:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Vault and Virus/Win32.WGeneric.aalbaq</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-vault-and-virus-win32-wgeneric-aalbaq/m-p/258310#M73275</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/79988"&gt;@Curt.Schwarder&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Generally what you would do with a signature like this is take the MD5 hash value displayed by threatvault and run it through a search on VirusTotal. However, I'm not currently getting anything off of the displayed signature.&amp;nbsp;&lt;/P&gt;&lt;P&gt;With this being a newer signature I would report the false positives you're seeing to support so they can pass it along internally and see if the signature isn't a bit too broad.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 02:59:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-vault-and-virus-win32-wgeneric-aalbaq/m-p/258310#M73275</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-04-23T02:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Vault and Virus/Win32.WGeneric.aalbaq</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/threat-vault-and-virus-win32-wgeneric-aalbaq/m-p/258403#M73290</link>
      <description>&lt;P&gt;Thanks! &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 16:08:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/threat-vault-and-virus-win32-wgeneric-aalbaq/m-p/258403#M73290</guid>
      <dc:creator>Curt.Schwarder</dc:creator>
      <dc:date>2019-04-23T16:08:30Z</dc:date>
    </item>
  </channel>
</rss>

