MALWARE-OTHER --
MALWARE-OTHER Win.Ransomware.WastedLocker binary download attempt
The rule is looking for strings associated with WastedLocker Ransomeware. It alerts in the event that it detects related WastedLocker Ransomware payload.
This rule alerts when an attempt is made to download WastedLocker Ransomware sample.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None
Tactic: Execution
Technique: Exploitation for Client Execution
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org