Hash of known malware detected

Classification:

attack

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect malicious files observed in threat intelligence feeds.

Strategy

Hashes are collected and compared to a database of known malicious files. In some cases fuzzy hashing is used to match files similar to known malware.

For more details see our blog post.

Triage & Response

  1. Verify the file {{ @file.path }} is unexpected and does not have a business purpose.
  2. Pause or isolate the affected container.
  3. Review related signals and relevant logs to identify additional malicious activity.
  4. Follow your organization’s internal processes for investigating and remediating compromised systems.

Requires Agent version 7.49 or later

PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc