- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hey guys,
I just saw a Tweet regarding a ransomware payload with a low Ant-Virus detection rate. I grabbed a copy of it and ran the sample through the sandblast analysis website. The result is coming back as clean.
App.any.run shows obvious malicious behavior: LockerGoga.exe (MD5: 16BCC3B7F32C41E7C7222BF37FE39FE6) - Interactive analysis - ANY.RUN
Hi Ryan,
Thanks for the heads up. Have you also raised it with TAC?
Regards
Mark
I'll have someone in our Threat Operations team have a look at it.
Looks like we're properly detecting this both with Threat Emulation and AV.
If you're still seeing it not detected, please engage with our TAC.
Hi,
I noticed that Threat Emulation website does not give the same result as appliance does (with default settings).
I had few cases where Sanblast Network said: malware, but result from website was opposite.
MMM
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY