Sean Williams
Sean Williams
After stopping the decryption process, attempt to determine the malware family and automatically decrypt the encrypted files. Maybe place the attempted decrypted files in a staging directory for the user...
The current mode of operation is to write to cryptostalker's stdout when malware is detected. It'd be nice to alert the user in a way that they'll actually notice!
cryptostalker currently detects new files and reads them from the filesystem in their entirety in order to determine randomness. We should stop doing this in favor of reading in smaller...
After stopping the process (or on Windows, before killing it), iterate over the process' memory maps and open files to detect known signatures of key material, e.g. "-----BEGIN RSA PRIVATE...
Need the username as well