FilelessCleanup


 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Others

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW


This is Trend Micro detection for malicious fileless threats. Fileless infections don't use files to be executed in the affected system. Fileless threats are executed in the system's memory, or reside in the system's registry for persistence. In a typical fileless infection, payloads can be injected into the memory of an existing application/software, or by running scripts within a whitelisted application.

  SOLUTION

Minimum Scan Engine:

9.850

NOTES:

This threat can be mitigated by deploying a behavior monitoring mechanism on the endpoint, which helps prevent and limit data leakage and malware infection by monitoring and blocking malicious behaviors and routines associated with malware, as well as unusual modifications to the operating system or software/applications. A good behavior monitoring system not only looks into an application's behaviors, but also anomalies in the process chain.

Trend Micro endpoint solutions include advance modules to detect fileless malware attacks. This helps organizations look out for malicious behavior that can block the malware before the behavior is executed or performed.


Did this description help? Tell us how we did.