Use the KQL query DeviceProcessEvents | where ProcessName == "ssh.exe" and FileName == "msys-2.0.dll" to identify instances of the ssh.exe process launching the msys-2.0.dll library. Use the PowerShell script Get-Process | where {$.ProcessName -eq "ssh.exe" -and $.Modules.ModuleName -eq "msys-2.0.dll"} to identify any instances of the ssh.exe process that have the msys-2.0.dll library loaded. Monitor for unusual process creation events. Monitor for changes to legitimate DLLs. Use a security information and event management (SIEM) tool to correlate events across your network. Keep your security software up to date. By following these steps, you can help protect your systems from the Mockingjay process injection technique.
-
Notifications
You must be signed in to change notification settings - Fork 0
Solhack/Detecttions
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published