20 lines
501 B
YAML
20 lines
501 B
YAML
id: locky-ransomware-hash
|
|
info:
|
|
name: Locky Ransomware Hash - Detect
|
|
author: pussycat0x
|
|
severity: info
|
|
description: |
|
|
Detects Locky Ransomware (matches also on Win32/Kuluoz)
|
|
reference:
|
|
- https://goo.gl/qScSrE
|
|
- https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Locky.yar
|
|
tags: ransomware,malware
|
|
|
|
file:
|
|
- extensions:
|
|
- all
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "sha256(raw) == '5e945c1d27c9ad77a2b63ae10af46aee7d29a6a43605a9bfbf35cebbcff184d8'" |