A forum for reverse engineering, OS internals and malware analysis 

 #23734  by dalfa
 Sun Aug 31, 2014 10:18 am
Since I found anything similar pre-built (with the exception of one script which requires powershell), I was about to start the development of a simple tool able to monitor changes on a set of files and take actions accordingly.
The question is: could a similar approach be useful in detecting and insulate a system affected by some sort of cryptoware/ransomware software?
I would build this software to accomplish this specific purpose, but since I'm a real newbie in the field of malware, I do not want to waste my time in something not useful - or already built!
Any comment is welcome, and of course the software will be OS licenced.