- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
09-14-2020 06:57 AM
It's possible to block custom file hash-256 in Palo alto.
Please let me know how I can check the respective file hashes disposition at a wildfire, either it is in block or not.
Here is below the file hashes need to know for disposition.
09-15-2020 06:50 AM
In order to reach PANW TAC, I would suggest a ticket should be opened, referencing your concerns.
The live.paloaltnetworks.com site are community based responses; a mixture of non-PANW employees and some TAC engineers.
This would not be the correct forum for TAC case creation for your issue.
Thank you for your understanding.
09-14-2020 09:32 AM
Have you attempted to upload these files manually on the WF portal page?
This may be the fastest way to know if they are to be blocked or not.
I am not sure if you query is about "CAN" we block custom hashes, or confirming that you believe they are being blocked, and you are simply questioning the ability to block them... (like "hey... i didn't know they could be blocked.. wow. cool)
Thanks
09-14-2020 10:15 AM
You can check the SHA256 hash using the WildFire API and simply check the verdict. The easiest way of doing this is using pan.wfapi
VirusTotal will also tell you if PAN has a listing for the file hash in a prettier fashion.
09-14-2020 10:30 PM
Thanks for your comments. Much Appreciated|||
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLOlCAO
I have studied and found no way to block custom files based on hash-256 only.
As per document file can block but based on patterns of specific file types.
In my case, these Hash-256 only of near firms which recently attacked by these files and damaged therefore it needs to be blocked at my end as well to avoid any risk.
I found few of them are blocked in wildfire but not all, so how I can add all in block state while having no file sample or pattern.
Please advise the way to block all these hashes-256 without a sample or pattern.
Your prompt response will be highly appreciated.
09-15-2020 06:22 AM
It should be possible to use a custom vulnerability profile.
Have you looked at this KB article (and file)
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClOFCA0
Essentially convert your hash into HEX (may already be there) and create a custom vulnerability to drop anything that matches your file hashes.
09-15-2020 06:24 AM
This is to bring in to your notice, few of them mentioned hashes are already listed in Talos File Repute but not in Threat Vault. This is our request to add the following hashes in Threat Vault too to avoid any risk.
09-15-2020 06:50 AM
In order to reach PANW TAC, I would suggest a ticket should be opened, referencing your concerns.
The live.paloaltnetworks.com site are community based responses; a mixture of non-PANW employees and some TAC engineers.
This would not be the correct forum for TAC case creation for your issue.
Thank you for your understanding.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!