Malware alerts detect potentially malicious code on a host system. These alerts can be triggered based on indicators of compromise (IOC) such as a known bad file name or they can be triggered by the behavior of executed code.
Identify the system on which the malware was reported.
Identify the account(s) logged into the host. If the malware was reported by an EDR, that tool might indicate what account was used when attempting to execute the malware.
There are many different types of malware IOCs. Some are more reliable than others in precisely indicating the existence of malware on a host. Review the alert to identify the malware IOCs used to produce this detection. IOCs can include:
Anti-Virus identified, blocked, and cleaned a potential malware infection
Many organizations will consider this a false positive, since the remediation is complete. Consult your IR plan.
Legitimate IT software is flagged as malicious
IT organizations sometimes add software that behaves in similar ways to malware and can be flagged by AV tools.
Anti-Virus incorrectly flagged custom script files that are non-malicious
Custom scripts files are often non-signed by a trusted source which can cause AV to be more likely to flag as malicious.
Tools, such as remote desktop applications, will be flagged as potential unwanted software
Attackers and system owners use tools that can have legitimate or malicious uses. These can be flagged even when used for a legitimate business purpose.
If there isn't an obvious reason why this activity is expected, it might be time to either escalate to a more senior analyst or start executing your incident response plan.
Common initial response actions can include:
By using this website, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.