I have a specific question. Our firewalls are able to decompress some files like .zip or gzip and after that we are able to analyze their content and detect some malicious files with threat prevention or WildFire.
For the .cab file, the cabinet file compressed by Windows, which is not cyphered, I saw some tests and I was surprised that the content of a cab file is not analyzed. I created my own cab file with a malicious file inside. I understand that normally the cab files are signed by Microsoft and trust. But recently we have a lot of malware campaigns with some cab files in the emails attachment. I want to know if we are able to protect users from this type of campaign?
Do you know if the behavior in my tests are normal or maybe I missed something?
Yes of course, I created a "file blocking profile" with a default action for all files to forward. I created 3 cabinet files with the following command line : makecab.exe. Each cab file contains a malware or virus. I think when you're creating a cab file, there is no protection by password something like that.
In the log file, you can see the status "alert".
Thanks for your help.
PAN does not support any compressed files except zip/gzip because PAN scans malware by stream-based.
Following KB might be helpful for you even it's talking about IPS.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!