Rule Category


Alert Message

MALWARE-OTHER Win.Ransomware.MortalKombat variant binary download attempt

Rule Explanation

This rule looks for specific identifying strings within the Mortal Kombat (Xorist) ransomware binary.

What To Look For

This rule alerts when a download of Mortal Kombat, or Xorist, ransomware is detected.

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

Rule Groups

No rule groups



Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.


MITRE ATT&CK Framework

Tactic: Initial Access

Technique: Trusted Relationship

For reference, see the MITRE ATT&CK vulnerability types here: