Sandstorm testing

How can we test Sandstorm?  Will there be a link on Sophostest.com to an innocuous file that will trigger a scan?

Parents
  • Haven't been able to get it trigger. Just had a system download 50 samples via Malshare over HTTP and not one got blocked by AV, or submitted to Sandstorm.... I just checked the the websites/sample downloads are all logged in the web access logs and logs looks like this sandbox="-"
  • Yeah but did those 'samples' from Malshare get picked up by the Anti Virus scan conducted by the proxy? And, what are the size of those samples? Do you have your Web Filter policies set to NOT SCAN files that are above a certain size? A full web filter log excerpt would be good.

    ==

    When in doubt, Script it out.

  • Hi Shai,
    email sent. If you got anything i can test please let me know. This feature (if it works good) is interesting depending on how much you will charge for it.

    ---

    Sophos UTM 9.3 Certified Engineer

  • found more stuff that just passes through.

    Apperantly, when you skip a "category check" there will be no virus check?

    SAMPLE SITE - USE AT OWN RISK with a Linux or Mac!!
    h##p://www.tekdefense.com/downloads/malware-samples/

    ---

    Sophos UTM 9.3 Certified Engineer

  • Here you go, The only thing I changed was my source IP and I removed my API key for privacy: 2016:02:16-22:20:50 vpn httpproxy[8725]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="PRIVATEIP" dstip="208.110.93.122" user="" group="" ad_domain="" statuscode="200" cached="0" profile="REF_DefaultHTTPProfile (Default Web Filter Profile)" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="622592" request="0xe2d1ec00" url="api.malshare.com/sampleshare.php referer="" error="" authtime="0" dnstime="2324" cattime="554" avscantime="963596" fullreqtime="1608767" device="0" auth="0" ua="wget_malshare daily 1.0" exceptions="" category="130" reputation="malicious" categoryname="Malicious Sites" country="United States" content-type="application/octet-stream" sandbox="-"

    Also, here is the VirusTotal link for the file in question: www.virustotal.com/.../
  • So in the log snippet above, I see that the site is Malicious in reputation and that it falls into the URL category of Malicious Sites; which by default would be blocked based purely on this, even without Sandstorm. So testing with content from this site won't trigger SandStorm, as it doesn't even have a chance to trigger!

    What we need is a site that's not classified as above, nor carries an already established reputation with Sophos and that the content downloaded if of type that SandStorm would want to hook into and detonate.

    @Shai, this is going to fall back onto SophosLABS to provide a test site and/or file.

    As if we (the community) find a good resource to test with, within 5 minutes of that test Sophos Reputation services will have marked it as bad and not need to send it o SandStorm for tssting purposes.

    ==

    When in doubt, Script it out.

  • Then explain this one please. Only changes to the log were dstip, and the url for privacy.

    2016:02:16-22:12:34 vpn httpproxy[8725]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="10.1.0.133" dstip="MYCloudServersIP" user="" group="" ad_domain="" statuscode="200" cached="0" profile="REF_DefaultHTTPProfile (Default Web Filter Profile)" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="6188032" request="0xe2bb8c00" url="MyCloudServerDomain/Sample1.exe" referer="" error="" authtime="0" dnstime="4194" cattime="737" avscantime="3002258" fullreqtime="10528753" device="0" auth="0" ua="Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:44.0) Gecko/20100101 Firefox/44.0" exceptions="" category="9998" reputation="unverified" categoryname="Uncategorized" country="United States" content-type="application/octet-stream" sandbox="-"
  • You got me! This is where could comment best, we'd most likely require a sample of the file. I suspect due to the fact the AV scan yielded no local suspicious elements, and was clean then was not referred to SandStorm... but I'm not 100% sure this is the the workflow.

    ==

    When in doubt, Script it out.

  • There are several steps to sandboxing:
    Step 1: Sophos Anti-Virus says the file is a candidate for sandboxing
    Step 2: Licensing and configuration are checked to see if sandboxing is enabled
    Step 3: The file is checked against the cloud server to find out if it is a known file
    Step 4: Unknown files are sent for sandboxing

    If you are getting sandbox=- that means the files were not identified as candidates for sandboxing (failed step 1)
    If you are getting sandbox=1 that means they are sandboxable but sandboxing is not configured (failed step 2)
    Any other number means they got to Step 3 or 4.

    Assuming for a moment that you are getting sandbox=- please make sure
    1) The file is actually being virus scanned by the Sophos AV Scanner
    2) The Sophos AV Scanner is up to date including all virus definitions
    3) The file is under 10MB, is not also detected as a virus...

  • I believe that the u2d channels do not currently have the web definitions for sandboxing.
    I believe that this should be resolved in next 24 hours.

    Some people are finding that Sandstorm in web is working. It may be that those people have manually installed the definitions for Mail (see pinned thread). YMMV.

    So the functionality is there - it is just that the scheduling of the the required data update did not match the beta start.
  • Michael Dunn: and you are telling us NOW? 1 week later after spending hours to try and test sandstorm? ...

    ---

    Sophos UTM 9.3 Certified Engineer

  • What does it take for the AV engine to decide a file is a candidate for sandboxing? Personally I would hope that all EXE's downloaded from unrated sites would be submitted.....
Reply Children