Hi Heroes,
I saw in ENS expoit prevention signatures, there has some powershell related signatures and by default it's disabled. may I know for a best practice to protect against coinminner virus that invoke powershell to download malicious files, should we enable this signatures for powershell? or can you share your experience on this.
Thanks.
Do you know the specific command line it uses? Then we can put together a rule for it here.
Dave
Hi @Daveb3d Yes, I can see the command line by using Procmon tool, do you mean we can create an expert rule for it correct? as per the command line, looks like the virus is connecting to malicious site to download its executables and sorry currently i cant provide the command line.
Ok.. is it using something like downloadstring or downloaddata in it? If you can post the command line but remove the URI, that would be helpful.
Dave
Corporate Headquarters
6220 America Center Drive
San Jose, CA 95002 USA