Rule Category

MALWARE-OTHER --

Alert Message

MALWARE-OTHER Win.Dropper.Raccoon malicious file download attempt

Rule Explanation

This rule detects the attempted download of a Win.Dropper.Raccoon variant by looking for specific data contained in the malicious file.

What To Look For

This rule detects the attempted download of a Win.Dropper.Raccoon variant.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic: Initial Access

Technique: Spearphishing Attachment

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

N/A

Not Applicable

CVE Additional Information