<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Virus/Win32.WGeneric.akrgog in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337285#M84949</link>
    <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I'm getting a Threat Detection - Virus/malware identified by the name "Virus/Win32.WGeneric.akrgog" when a user tries to open a particular PDF file. When looking at the Threat log I can see the PDF file being blocked and identified as a 'Virus.' In the same session, I can also see additional files with the extension .aspx being allowed. I think it's a false positive, but I'm not able to confirm this. I ran the hash value of the PDF file on Virus Total, and it did not find a match. I know that I can put an exception on the signature and allow the file, but I wanted to see if anyone has a better way to go about this.&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jul 2020 21:32:41 GMT</pubDate>
    <dc:creator>hedery_hl</dc:creator>
    <dc:date>2020-07-08T21:32:41Z</dc:date>
    <item>
      <title>Virus/Win32.WGeneric.akrgog</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337285#M84949</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I'm getting a Threat Detection - Virus/malware identified by the name "Virus/Win32.WGeneric.akrgog" when a user tries to open a particular PDF file. When looking at the Threat log I can see the PDF file being blocked and identified as a 'Virus.' In the same session, I can also see additional files with the extension .aspx being allowed. I think it's a false positive, but I'm not able to confirm this. I ran the hash value of the PDF file on Virus Total, and it did not find a match. I know that I can put an exception on the signature and allow the file, but I wanted to see if anyone has a better way to go about this.&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 21:32:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337285#M84949</guid>
      <dc:creator>hedery_hl</dc:creator>
      <dc:date>2020-07-08T21:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.akrgog</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337335#M84951</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/103500"&gt;@hedery_hl&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;If you can verify that the PDF isn't malicious it's likely just a false positive on the threat signature, which isn't that uncommon. You'll either need to create an exception for the traffic once you've verified it isn't a threat, or open a case with TAC and see if the signature doesn't need to be tuned a bit since it was just released at the tale end of June.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 04:17:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337335#M84951</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-07-09T04:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.akrgog</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337377#M84959</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/103500"&gt;@hedery_hl&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have taken a look at &lt;SPAN&gt;"Virus/Win32.WGeneric.akrgog"&lt;/SPAN&gt; in the&amp;nbsp;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_self"&gt;PANW Threat Vault&lt;/A&gt;&amp;nbsp;and cross-checked the SHA256s in the VirusTotal - only 2/10 were identified as malicious and with low detection rates (7/61, 9/62):&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/gui/file/7903b51a0840b64c00f6a39ab3e9b4b1a4880a46bc0bdca8b3bba4abf3392def/detection" target="_blank"&gt;https://www.virustotal.com/gui/file/7903b51a0840b64c00f6a39ab3e9b4b1a4880a46bc0bdca8b3bba4abf3392def/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/gui/file/85b51b37e403a7e760b146f26f63f1774b5a041b533b152bb6781e596c4e546a/detection" target="_blank"&gt;https://www.virustotal.com/gui/file/85b51b37e403a7e760b146f26f63f1774b5a041b533b152bb6781e596c4e546a/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;By no means should you trust this file to be safe based only on VirusTotal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can recommend, if possible, uploading it into sandbox solution to get a bigger picture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this file publicly available? Could you possible share the URL or, at least, SHA256?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;have you seen a lot of FPs on AV/WF signatures?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 08:45:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337377#M84959</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-07-09T08:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.akrgog</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337438#M84966</link>
      <description>&lt;P&gt;@Retired Member,&lt;/P&gt;
&lt;P&gt;It's not uncommon for me to see a few false positive signatures a month across all environments. They usually get tuned relatively quickly however as people report issues with the signatures once they've been introduced so its not that big of an issue for me personally.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 14:23:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337438#M84966</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-07-09T14:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.akrgog</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337797#M85016</link>
      <description>&lt;P&gt;Thank you for cross checking the hash on Virus Total. Unfortunelty the file is confidential and cannot be shared&amp;nbsp; outside my organization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm curious about the Sandbox option you mentioned, is this is Palo Alto service?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To answer you question, it is not very common that I experience False positives.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2020 19:09:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/337797#M85016</guid>
      <dc:creator>hedery_hl</dc:creator>
      <dc:date>2020-07-10T19:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Virus/Win32.WGeneric.akrgog</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/338024#M85056</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/103500"&gt;@hedery_hl&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Yes, PANW has a dedicated sandbox service -&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/products/secure-the-network/wildfire" target="_blank"&gt;https://www.paloaltonetworks.com/products/secure-the-network/wildfire&lt;/A&gt;; it can be integrated with PA firewall, used directly through WidlFire Portal (&lt;A href="https://wildfire.paloaltonetworks.com/wildfire/dashboard" target="_blank"&gt;https://wildfire.paloaltonetworks.com/wildfire/dashboard&lt;/A&gt;) or brought on-premise as a dedicated WF-500 Appliance (&lt;A href="https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/hardware/wf-500/wf-500-hardware-reference-guide.pdf" target="_blank"&gt;https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/hardware/wf-500/wf-500-hardware-reference-guide.pdf&lt;/A&gt;).&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2020 09:15:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virus-win32-wgeneric-akrgog/m-p/338024#M85056</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-07-13T09:15:55Z</dc:date>
    </item>
  </channel>
</rss>

