Rule Category

MALWARE-OTHER --

Alert Message

MALWARE-OTHER Win.Ransomware.WastedLocker binary download attempt

Rule Explanation

The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.

What To Look For

This rule alerts when an attempt is made to download WastedLocker Ransomware sample.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Execution

Technique: Exploitation for Client Execution

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

N/A

Not Applicable

CVE Additional Information