Open chrisforce1 opened 5 months ago
At first glance, these seem to be local tests (i.e. writing files to disk with particular extensions) versus network ones.
Please let's see if there are any network patterns we can pick up and use to build a ransomware
module.
Please let's take a look at this and see what we can do to generate ransomware patterns.