We recently saw several instances of malware\ransomware downloaded via an email URL using sandboxing avoidance techniques. The most obvious was sleep.exe being executed multiple times and was seen in the trace file.
Would it be possible to create a rule (yara?) that would mark a URL\file as malicious if sleep.exe was executed?
thanks for any advice
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.