RULE(RULE ID:105378)

Rule General Information
Release Date: 2020-12-14
Rule Name: Ransomware Activity: Win32/Teslacrypt Ransomware .onion domain (7tno4hib47vlep5o)
Severity:
CVE ID:
Rule Protection Details
Description: Ransomware virus uses various encryption algorithms to encrypt the file. The infected person can't decrypt the file without decrypted private key.
Impact: This virus uses various encryption algorithms to encrypt the file. The infected person can't decrypt the file without decrypted private key.
Affected OS: Network Device, Solaris, FreeBSD, Windows, Mac OS, Other Unix, Linux
Reference:
Solutions
Search and kill the malware by using antivirus tools and repair the system vulnerabilities.