SigmaHQ/rules/windows/process_creation/win_mal_lockergoga.yml

19 lines
470 B
YAML
Raw Normal View History

2019-03-22 09:59:31 +00:00
title: LockerGoga Ransomware
2019-03-22 10:03:48 +00:00
description: Detects a command that clears the WMI trace log which indicates LockaerGoga ransomware activity
2019-03-22 09:59:31 +00:00
references:
- https://abuse.io/lockergoga.txt
author: Florian Roth
date: 2019/03/22
tags:
- attack.execution
- attack.t1064
level: high
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine: '* cl Microsoft-Windows-WMI-Activity/Trace'
condition: selection
2019-03-22 10:03:48 +00:00