SigmaHQ/rules/windows/process_creation/win_mal_lockergoga.yml

18 lines
404 B
YAML
Raw Normal View History

2019-03-22 09:59:31 +00:00
title: LockerGoga Ransomware
description: Detects LockaerGoga ransomware
references:
- https://abuse.io/lockergoga.txt
author: Florian Roth
date: 2019/03/22
tags:
- attack.execution
- attack.t1064
level: high
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine: '* cl Microsoft-Windows-WMI-Activity/Trace'
condition: selection