add rule for detecting opening of service by ransomwares#1146
add rule for detecting opening of service by ransomwares#1146cipherBT wants to merge 1 commit intomandiant:masterfrom
Conversation
|
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
|
Hi @mike-hunhoff Thanks for your time! |
|
@cipherBT please post a screenshot of the unit tests passing locally before we give this a review. |
Resolves issue #1048. Hi, my name is Fatiu and I'm taking a look at some good first issues for GSoC 2026. This PR adds a rule to detect when a binary attempts to open/control services consistently targeted by ransomware compiled from the Netskope IOC list mentioned in the issue.
Currently, the examples section is blank as I don't have a direct sample hash hitting it. I'd appreciate any feedback. Thank you