- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
01-23-2023 05:08 PM
We are receiving a large quantity of logs affecting a limited number of users for this threat
IDName: Trojan-Downloader/Win32.guloader.ao
Unique Threat ID: 479496371
Create Time: 2022-04-05 09:11:48 (UTC)
Threat ID: 2837943
Current Release: 4338 (2023-01-23 UTC)
First Release: 4044 (2022-04-05 UTC)
We suspect that this is a false positive, Is anyone experiencing the same Issue or have any ideas on weather this can be resolved?
Thanks.
01-23-2023 06:38 PM
You may also want to look at the WildFire submission log. If the WildFire analysis profile is already enabled, you can find the corresponding log with the file hash and its verdict.
By the way, as the file was transferred over SMBv3, the filename might be incorrect.
Reference:
What to do when file information is blank and using SMBv3
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boOXCAY
01-23-2023 06:21 PM
I would suggest to find the sample which is being blocked by the signature and check the verdict (you can upload it to the WildFire cloud to see the verdict). If it's benign, you can set an exception to allow the file temporarily as needed. It is called 'signature collision'.
The signature was created for a bunch of malware samples. We should keep the signature enabled instead of disabling it.
https://threatvault.paloaltonetworks.com/?query=479496371&type=
References:
- Manually Upload Files to the WildFire Portal
https://docs.paloaltonetworks.com/wildfire/9-1/wildfire-admin/submit-files-for-wildfire-analysis/man...
- What is an Antivirus collision in the case of a False Positive, and how can we deal with it?
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClWICA0
- How to Use Anti-Spyware, Vulnerability and Antivirus Exceptions to Block or Allow Threats
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcrCAC
01-23-2023 06:31 PM
Thanks for replying!
The issue we are facing is that in the Logs we are seeing it does not supply a file Hash or any other indication to which files are actively causing these alerts to occur, It only shows the application as MS-DS-SMBv3 which does not really sound correct.
I will look into the AV collision to check if this is applicable.
Thanks, Matt.
01-23-2023 06:38 PM
You may also want to look at the WildFire submission log. If the WildFire analysis profile is already enabled, you can find the corresponding log with the file hash and its verdict.
By the way, as the file was transferred over SMBv3, the filename might be incorrect.
Reference:
What to do when file information is blank and using SMBv3
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boOXCAY
01-23-2023 06:59 PM
Thanks @ymiyashita, After checking that last link you posted it explains why a lot of the information within the logs is missing and why it would be picked up as a virus within the firewall.
There were no wildfire submissions related to the threat logs either so I suspect that a false positive is the case
Thanks again, Matt
03-12-2023 12:29 PM
Thanks for the solution, you made my day 🙂
03-20-2023 11:15 PM
Thanks for the link, you made my day.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!