Rule Category


Alert Message

MALWARE-OTHER Win.Ransomware.WastedLocker binary download attempt

Rule Explanation

The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.

What To Look For

This rule alerts when an attempt is made to download WastedLocker Ransomware sample.

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Execution

Technique: Exploitation for Client Execution

For reference, see the MITRE ATT&CK vulnerability types here:

Additional Links

Rule Vulnerability


Not Applicable

CVE Additional Information