Additional Malware Test Files
Table of Contents
Expand all | Collapse all
-
- Mach-O Support for WildFire Inline ML
- Advanced WildFire Public Sector Cloud
- Advanced WildFire Government Cloud
- WildFire Spain Cloud
- WildFire Saudi Arabia Cloud
- WildFire Israel Cloud
- WildFire South Korea Cloud
- WildFire Qatar Cloud
- WildFire France Cloud
- WildFire Taiwan Cloud
- WildFire Indonesia Cloud
- WildFire Poland Cloud
- WildFire Switzerland Cloud
- Advanced WildFire Support for Intelligent Run-time Memory Analysis
- Shell Script Analysis Support for Wildfire Inline ML
- Standalone WildFire API Subscription
- WildFire India Cloud
- MSI, IQY, and SLK File Analysis
- MS Office Analysis Support for Wildfire Inline ML
- WildFire Germany Cloud
- WildFire Australia Cloud
- Executable and Linked Format (ELF) Analysis Support for WildFire Inline ML
- Global URL Analysis
- WildFire Canada Cloud
- WildFire UK Cloud
- HTML Application and Link File Analysis
- Recursive Analysis
- Perl Script Analysis
- WildFire U.S. Government Cloud
- Real Time WildFire Verdicts and Signatures for PDF and APK Files
- Batch File Analysis
- Real Time WildFire Verdicts and Signatures for PE and ELF Files
- Real Time WildFire Verdicts and Signatures for Documents
- Script Sample Analysis
- ELF Malware Test File
- Email Link Analysis Enhancements
- Sample Removal Request
- Updated WildFire Cloud Data Retention Period
- DEX File Analysis
- Network Traffic Profiling
- Additional Malware Test Files
- Dynamic Unpacking
- Windows 10 Analysis Environment
- Archive (RAR/7z) and ELF File Analysis
- WildFire Analysis of Blocked Files
- WildFire Phishing Verdict
Additional Malware Test Files
Palo Alto Networks now provides two additional
sample malware files to test your WildFire deployment. These new
malware samples include an APK and MacOSX file and can be downloaded
using a direct download link using your browser or through the WildFire
API. Download one of the new sample files and verify that it gets
forwarded to WildFire for analysis.
- Download one of the new malware test files. Select
from either direct or API download.
- Direct Download:
- If you have SSL decryption enabled on the firewall, use one of the following URLs:
- If you do not have SSL decryption enabled on the firewall, use one of the following URLs instead:
- API Download: Make a GET or Post request to the /test resource with the file type you want to retrieve and as well as the -JO option to use the Content-Disposition filename as provided by the server as shown in the following cURL command:
- APK—curl -JO 'https://wildfire.paloaltonetworks.com/publicapi/test/apk'MacOSX—curl -JO 'https://wildfire.paloaltonetworks.com/publicapi/test/macos'The response saves the malware test file to your local system. Each time you download the test file, it has a different SHA-256 hash value.
- On the firewall web interface, select MonitorWildFire Submissions to confirm that the file was forwarded for analysis.
Please wait at least 5 minutes for analysis results to be displayed for the file on the WildFire Submissions page. The verdict for the test file will always display as malware.- (Optional) Verify that the files have been properly forwarded.