is there a way to block by SHA256 if you do not have the MD5 hash? trying to block the IOCs for the Maze ransomware so i do not have the original data to generate an MD5 hash.
Solved! Go to Solution.
I don't think that is correct. You should be able to create a list accordingly:
Rule {
Process {
Include OBJECT_NAME { -v "**" }
}
Target {
Match FILE {
Include SHA2_256 {
-v "DEE863FFA251717B8E56A96E2F9F0B41B09897D3C7CB2E8159FCB0AC0783611B"
-v "value2"
-v "value3"
-v "etc"
}
Include -access "EXECUTE CREATE READ"
}
}
}
Dave
Hi @rbenson09
Thanks for posting on the Community.
I'm afraid there isn't such an option with ENS - it is only MD5 based. However if you have the SHA256 value, you can use Virustotal (https://www.virustotal.com/) to look up the MD5.
I don't think that is correct. You should be able to create a list accordingly:
Rule {
Process {
Include OBJECT_NAME { -v "**" }
}
Target {
Match FILE {
Include SHA2_256 {
-v "DEE863FFA251717B8E56A96E2F9F0B41B09897D3C7CB2E8159FCB0AC0783611B"
-v "value2"
-v "value3"
-v "etc"
}
Include -access "EXECUTE CREATE READ"
}
}
}
Dave
where would you use this?
Go into the Exploit Prevention Policy and you can add an Expert Rule.
Dave
@Daveb3d using an Expert Rule is indeed a good option if you are comfortable scripting these rules yourself. Thanks for adding your suggestion 🙂
I should have specified that my answer was referring to the Access Protection feature.
You could use ATP and TIE to block any program by signature (reputation). The management is simple and powerful.
Today ENS without ATP is really risky, ATP help you to block Zeroday and ransomware.
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA