2020-07-17 07:23 AM
EDIT
The problem is now fixed, here are the steps you need to take in order for malware analysis to work:
Bonus problems we've encountered:
If local Threat Grid appliance is installed, import the certificate from its console website (IP) to the Malware server.
Original post below
Hello everyone,
I'm having issues configuring a Malware Analytics server for Continuous Monitoring.
I have a Packet Concentrator that I want it to be monitored for files being transferred.
Files then should be automatically scanned by Malware Analytics.
On the first step to configure Continuous Scan, we provided the IP of the Packet Concentrator, its port 50005 and its service account.
I successfully used the same account to connect the Packet Decoder to the Concentrator, the Concentrator to the Malware Broker.
When we test the Integration connection following error appears:
Fail to establish a connection to the core device.
Checking the logs, Invalid username or password error appears.
We changed the password (Service -> Security tab) on both Malware Analytics and Packet Concentrator services, both were restarted.
Using SSL seems to stop the error log but still no connection is established.
We tried with new account created on the Packet Concentrator, still the same error.
Otherwise the manual upload and static analysis works just fine.
Can you give us some insight on what might be the problem?
Attached are screenshots of Malware Analytics & Broker configurations and logged errors.
2020-07-24 06:09 AM
Hello all,
I just wanted to provide an update since we found two steps not particularly addressed in the documentations.
First thing we tried was to add Malware Analysis Broker instead of the Packet Concentrator or the main Broker to the Continuous monitoring config.
The wrong username / password error persisted.
Then we tested the connection with SSL checkbox and SSL Broker port (56003) configured.
New error occurred in the logs:
0 sessions found. Please verify deployed RSA Live content including parsers and application rules.
Addressing that part, we deployed all Live parsers and rules for Malware Analysis (that was a missed step).
The test went successfully once, but I'm not able to reproduce it since we have some packet digesting issues.
Since we have yet to see a file extracted from packet session, I will keep updating this post.
Static analysis, Community scoring and ThreatGrid all work fine while manually uploading files.
Respond Auditing works too, generating alarms for the set thresholds.
I remain open for feedback.
2020-07-24 10:54 AM
Make sure you have deployed the "spectrum.lua" parser also and the "spectrum_consume.nwr" application rule, those are what tag the traffic to be consumed by malware analysis.