Rule Category

MALWARE-OTHER --

Alert Message

MALWARE-OTHER Win.Ransomware.WastedLocker binary download attempt

Rule Explanation

The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.

What To Look For

This rule alerts when an attempt is made to download WastedLocker Ransomware sample.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

None

Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None

MITRE ATT&CK Framework

Tactic: Execution

Technique: Exploitation for Client Execution

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org