File hash search summarizes the file details in a report based on data generated
during WildFire analysis. You can download the report as a PDF or MAEC file in
cases where the sample is determined to be malicious, phishing, grayware, or
benign. Unknown samples do not generate a report.
WildFire samples that generate a verdict provide file information and session
information at a minimum; while samples that have undergone additional analysis
produce specific analysis data that is relevant to actions taken by the sample.
You can drill down on the search results to review the following information
categories:
|
File Information—View general file information,
including the file hash, size, and type, as categorized by
WildFire. You can also the see the verdict of the sample
here. Alternatively, you can search directly on
VirusTotal for additional
information about suspicious files, domains, URLs, IP
addresses using the supplied hash value. If the verdict is
classified incorrectly, request for a verdict change. The
Palo Alto Networks threat team investigates further on the
sample and updates the verdict if found incorrect.
You can also download the WildFire report of the selected
sample hash as a PDF or MAEC file.
|
|
Evidence in Your Network—Learn about
detection reasons, as provided by WildFire, for the given
file hash with timestamps when it was initially and last
observed in your network, unique allowed users, and total
hits data for the web request.
|
|
SHA-256 History in Your Network—View
the historical prevalence of the specified file hash in your
network, and globally, based on the allow and block actions
taken by the NGFW.
|
|
Session Information—Learn about the
network session for a sample. Use this data to learn more
about the context of the threat, know the affected hosts and
clients, and the applications used to deliver the
malware.
|
|
Static Analysis—Static analysis looks at the contents
of a specific file before the file is executed in the
WildFire analysis environment. This also shows the
suspicious file properties, processes, and behaviors
detected during static analysis. The search result varies
depending on the file type.
|
Dynamic Analysis—When WildFire encounters a sample
that requires additional analysis, such as an unknown
sample, the file is forwarded to the Advanced WildFire cloud
an is inspected in detail using WildFire dynamic
analysis. You can pivot between the various
analysis environments used to view the specific analysis
results generated by each. This can include samples analyzed
by Advanced WildFire
techniques (Intelligent Run-time Memory Analysis
analysis, hypervisor Dynamic Analysis, Dependency Emulation,
etc.), a cloud-based engine that detects and prevents highly
evasive malware threats. You can view the observed behaviors
and use this information for post execution analysis. You
can check the process activities involved, and the sequence
of events that took place in your system while executing the
file.
|
|
Actions Monitored —Review various sample process
activity details that WildFire recorded during sample
analysis.
|