cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Highlighted

ENS block by hash

Jump to solution

is there a way to block by SHA256 if you do not have the MD5 hash? trying to block the IOCs for the Maze ransomware so i do not have the original data to generate an MD5 hash.

1 Solution

Accepted Solutions
Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 3 of 7

Re: ENS block by hash

Jump to solution

I don't think that is correct.  You should be able to create a list accordingly:

 

Rule {
Process {
Include OBJECT_NAME { -v "**" }
}

Target {
Match FILE {
Include SHA2_256 {
-v "DEE863FFA251717B8E56A96E2F9F0B41B09897D3C7CB2E8159FCB0AC0783611B"
-v "value2"
-v "value3"
-v "etc"
}
Include -access "EXECUTE CREATE READ"
}
}
}

 

Dave

View solution in original post

6 Replies
Highlighted
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 7

Re: ENS block by hash

Jump to solution

Hi @rbenson09 

Thanks for posting on the Community.

I'm afraid there isn't such an option with ENS - it is only MD5 based. However if you have the SHA256 value, you can use Virustotal (https://www.virustotal.com/) to look up the MD5.

Was my reply helpful?
If this information was helpful in any way, or answered your question, will you please select "Accept as Solution" in my reply, or give kudos as appropriate, so together we can help other members?
Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 3 of 7

Re: ENS block by hash

Jump to solution

I don't think that is correct.  You should be able to create a list accordingly:

 

Rule {
Process {
Include OBJECT_NAME { -v "**" }
}

Target {
Match FILE {
Include SHA2_256 {
-v "DEE863FFA251717B8E56A96E2F9F0B41B09897D3C7CB2E8159FCB0AC0783611B"
-v "value2"
-v "value3"
-v "etc"
}
Include -access "EXECUTE CREATE READ"
}
}
}

 

Dave

View solution in original post

Highlighted

Re: ENS block by hash

Jump to solution

where would you use this?

Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 5 of 7

Re: ENS block by hash

Jump to solution

Go into the Exploit Prevention Policy and you can add an Expert Rule.   

Dave

 

Highlighted
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 6 of 7

Re: ENS block by hash

Jump to solution

@Daveb3d using an Expert Rule is indeed a good option if you are comfortable scripting these rules yourself. Thanks for adding your suggestion 🙂

I should have specified that my answer was referring to the Access Protection feature.

Was my reply helpful?
If this information was helpful in any way, or answered your question, will you please select "Accept as Solution" in my reply, or give kudos as appropriate, so together we can help other members?
Highlighted
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 7 of 7

Re: ENS block by hash

Jump to solution

You could use ATP and TIE to block any program by signature (reputation). The management is simple and powerful.

Today ENS without ATP is really risky, ATP help you to block Zeroday and ransomware.

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community