MALWARE-OTHER --
MALWARE-OTHER Win.Dropper.Raccoon malicious file download attempt
This rule detects the attempted download of a Win.Dropper.Raccoon variant by looking for specific data contained in the malicious file.
This rule detects the attempted download of a Win.Dropper.Raccoon variant.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None
Tactic: Initial Access
Technique: Spearphishing Attachment
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org