Hash of known malware detected
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Goal
Detect malicious files observed in threat intelligence feeds.
Strategy
Hashes are collected and compared to a database of known malicious files. In some cases fuzzy hashing is used to match files similar to known malware.
For more details see our blog post.
Triage & Response
- Verify the file
{{ @file.path }}
is unexpected and does not have a business purpose. - Pause or isolate the affected container.
- Review related signals and relevant logs to identify additional malicious activity.
- Follow your organization’s internal processes for investigating and remediating compromised systems.
Requires Agent version 7.49 or later