Rule Library
Sigma Rules
2 rules found for "Vasiliy Burov"
3,707Total
3,116Detection
451Emerging
137Hunting
Emerging Threatcriticalstable
LockerGoga Ransomware Activity
Detects LockerGoga ransomware activity via specific command line.
WindowsProcess Creation
TA0040 · ImpactT1486 · Data Encrypted for Impactdetection.emerging-threats
Vasiliy Burov+1Sun Oct 182019
Emerging Threathighstable
Potential Ryuk Ransomware Activity
Detects Ryuk ransomware activity
WindowsProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1547.001 · Registry Run Keys / Startup Folderdetection.emerging-threats
Florian Roth (Nextron Systems)+2Mon Dec 162019