ELF Malware Test File
Table of Contents
Expand all | Collapse all
-
- Advanced WildFire Support for EML Files
- Advanced WildFire Dashboard Enhancements
- Mach-O Support for WildFire Inline ML
- Advanced WildFire Public Sector Cloud
- Advanced WildFire Government Cloud
- WildFire Spain Cloud
- WildFire Saudi Arabia Cloud
- WildFire Israel Cloud
- WildFire South Africa Cloud
- WildFire South Korea Cloud
- WildFire Qatar Cloud
- WildFire France Cloud
- WildFire Taiwan Cloud
- WildFire Indonesia Cloud
- WildFire Poland Cloud
- WildFire Switzerland Cloud
- Advanced WildFire Support for Intelligent Run-time Memory Analysis
- Shell Script Analysis Support for Wildfire Inline ML
- Standalone WildFire API Subscription
- WildFire India Cloud
- MSI, IQY, and SLK File Analysis
- MS Office Analysis Support for Wildfire Inline ML
- WildFire Germany Cloud
- WildFire Australia Cloud
- Executable and Linked Format (ELF) Analysis Support for WildFire Inline ML
- Global URL Analysis
- WildFire Canada Cloud
- WildFire UK Cloud
- HTML Application and Link File Analysis
- Recursive Analysis
- Perl Script Analysis
- WildFire U.S. Government Cloud
- Real Time WildFire Verdicts and Signatures for PDF and APK Files
- Batch File Analysis
- Real Time WildFire Verdicts and Signatures for PE and ELF Files
- Real Time WildFire Verdicts and Signatures for Documents
- Script Sample Analysis
- ELF Malware Test File
- Email Link Analysis Enhancements
- Sample Removal Request
- Updated WildFire Cloud Data Retention Period
- DEX File Analysis
- Network Traffic Profiling
- Additional Malware Test Files
- Dynamic Unpacking
- Windows 10 Analysis Environment
- Archive (RAR/7z) and ELF File Analysis
- WildFire Analysis of Blocked Files
- WildFire Phishing Verdict
ELF Malware Test File
Palo Alto Networks now provides an ELF sample
malware file to test your WildFire deployment. The new file can
be downloaded using a direct download link using your browser or
through the WildFire API. Download one of the new sample files and
verify that it gets forwarded to WildFire for analysis.
- Download one of the new malware test files. Select from either direct or API download.
- Direct Download:
- If you have SSL decryption enabled on the firewall, use the following URL: https://wildfire.paloaltonetworks.com/publicapi/test/elf
- If you do not have SSL decryption enabled on the firewall, use the following URL instead: http://wildfire.paloaltonetworks.com/publicapi/test/elf
- API Download: Make a GET request to the /test resource with the file type you want to retrieve. Use the -JO option to retain the Content-Disposition filename, as shown in the following cURL command example:curl -JO 'https://wildfire.paloaltonetworks.com/publicapi/test/elf'The response saves the malware test file to your local system. Each time you download the test file, it has a different SHA-256 hash value.
- On the firewall web interface, select MonitorWildFire Submissions to confirm that the file was forwarded for analysis.Please wait at least 5 minutes for analysis results to be displayed for the file on the WildFire Submissions page. The verdict for the test file will always display as malware.