Respond to a ransomware incident following PICERL methodology. Use when ransomware is detected or suspected. Orchestrates identification, containment, eradication, and recovery phases. Requires CASE_ID and initial indicators.
84
81%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Structured workflow for responding to suspected ransomware incidents using the PICERL model.
CASE_ID - SOAR case ID for the incidentALERT_GROUP_IDENTIFIERS - Alert group identifiers from SOARINITIAL_INDICATORS - Initial detection info:
After completing each phase, you MUST report these outputs:
| Output | Description |
|---|---|
AFFECTED_SYSTEMS | Systems confirmed infected with ransomware |
RANSOMWARE_VARIANT | Ransomware family/variant identified |
ENCRYPTION_STATUS | Current encryption state of affected systems |
RANSOMWARE_IOCS | File hashes, ransom note patterns, malicious files |
| Output | Description |
|---|---|
ISOLATED_SYSTEMS | Systems successfully isolated from network |
BLOCKED_IOCS | IOCs blocked at firewall/proxy |
C2_INDICATORS | C2 domains/IPs discovered during containment |
| Output | Description |
|---|---|
CLEANED_SYSTEMS | Systems with malware/persistence removed |
REMOVED_PERSISTENCE | Persistence mechanisms identified and removed |
| Output | Description |
|---|---|
RESTORED_SYSTEMS | Systems restored to operational state |
VALIDATION_STATUS | Post-recovery validation results |
Prerequisites - verify before proceeding:
Step 2.1: Get Context
secops-soar.get_case_full_details(case_id=CASE_ID)Use /check-duplicates to verify this isn't already under investigation.
Step 2.2: Identify Ransomware Strain
If file hash available:
gti-mcp.get_file_report(hash=FILE_HASH)If name/family known:
gti-mcp.search_threats(query="LockBit ransomware", collection_type="malware-family")Document: IDENTIFIED_STRAIN
Step 2.3: Investigate Initial Access & Lateral Movement
Search SIEM for activity BEFORE encryption:
secops-mcp.search_security_events(
text="Suspicious logins, RDP, exploit attempts for affected endpoints",
hours_back=168
)Look for:
Identify: INITIAL_ACCESS_VECTOR, POTENTIAL_ADDITIONAL_SYSTEMS
Step 2.4: Initial Scope Assessment
Compile:
AFFECTED_ENDPOINTS - Confirmed infected systemsMALICIOUS_IOCs - Network IOCs (C2 domains/IPs)Step 2.5: Check Related Cases
Use /find-relevant-case with affected entities.
Step 2.6: Document
Use /document-in-case with identification findings.
CRITICAL: Speed is essential. Contain first, investigate deeper later.
Step 3.1: Isolate Affected Endpoints
For each endpoint in AFFECTED_ENDPOINTS and POTENTIAL_ADDITIONAL_SYSTEMS:
Use /confirm-action:
"Isolate endpoint [HOSTNAME] from network?"
If confirmed, trigger endpoint isolation (via EDR or network).
Step 3.2: Block Network IOCs
For each IOC in MALICIOUS_IOCs:
Use /confirm-action:
"Block IOC [VALUE] at firewall/proxy?"
If confirmed, implement blocks.
Step 3.3: Contain User Accounts
If compromised user identified:
→ Trigger /respond-compromised-account
Step 3.4: Verify Containment
Monitor SIEM for continued activity:
secops-mcp.search_security_events(
text="Activity from contained systems or IOCs",
hours_back=1
)Use /document-in-case with containment status.
Step 4.1: Identify Persistence
Review GTI reports for known persistence TTPs of IDENTIFIED_STRAIN.
Common mechanisms:
Step 4.2: Remove Malware & Persistence
(Requires EDR/endpoint tools)
Step 4.3: Scan Systems
Perform thorough AV/EDR scans on affected systems.
Use /document-in-case with eradication actions.
Step 5.1: Check Decryptor Availability
Based on IDENTIFIED_STRAIN, check:
Step 5.2: Determine Recovery Strategy
Options:
Step 5.3: Execute Recovery
(Involves IT Ops/System Admins)
Step 5.4: Monitor & Lift Containment
Use /document-in-case with recovery status.
Use /generate-report with comprehensive incident report.
Conduct post-incident review:
| Phase | Key Actions | Skills Used |
|---|---|---|
| Identification | Strain ID, scope | /check-duplicates, /find-relevant-case |
| Containment | Isolate, block | /confirm-action, /document-in-case |
| Eradication | Remove persistence | EDR tools |
| Recovery | Restore systems | IT Ops coordination |
| Lessons Learned | Report, review | /generate-report |
4d132c7
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.