Rule Info
Name
SUSP_RANSOM_LNX_VmWare_ESX_Indicators_Oct22_1
Author
Florian Roth
Description
Detects characteristics found in ransomware samples that are deployed on ESXi servers
Score
70
Date
2022-10-24
Minimum Yara
1.7
Rule Hash
55a72664bc24a72a0b2c384296911ed9
Tags
['RANSOM', 'SUSP', 'LINUX', 'FILE', 'CRIME']
Required Modules
[]
Antivirus Verdicts
Rating
Number of Samples
Malicious (>= 10 engines)
16
Suspicious (< 10 engines)
0
Clean (0 engines)
1
Rule Matches
Timestamp
Positives
Total
Hash
VT