ATTENTION Customers, All Partners and Employees: The Customer Support Portal (CSP) will be undergoing maintenance and unavailable on Saturday, November 7, 2020, from 11 am to 11 pm PST. Please read our blog for more information.
Good day! community,
I have a question, what treatment is given to executables that are signed as weak hash?
I understand that cortex XDR will block its execution.
Can it be excepted considering that it is a utility software?
The hash is unaltered and WF's verdict is benign.
What things should I verify or take into account as best practices to expedite the investigation and take actions on the alarms.
Thanks in advance.
Cortex XDR is going to calculate the hash of the file and check with WildFire if a verdict is known. If it is not known, the file (depending on config) will be uploaded for several checks: static analysis, dynamic analysis, and possible bare metal analysis. Once it has been analyzed, that verdict will be retained by WildFire. From that point on, if the file is deemed malware -- your option is to whitelist the file. If you believe that the file verdict is incorrect and you want another check, you can can submit it as an incorrect verdict. At that point, a member of our Unit 42 team, will check even deeper.
Regardless of the verdict, if you're trying to investigate what is going on -- I would locate any alerts that are raised -- right click and analyze them. From there, you can get a great deal of information on what was / is going on.
Hope this helps.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!