mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
30 lines
1.1 KiB
YAML
30 lines
1.1 KiB
YAML
id: orcus-rat-c2
|
|
|
|
info:
|
|
name: OrcusRAT - Detect
|
|
author: pussycat0x
|
|
severity: info
|
|
description: |
|
|
Orcus RAT is a type of malicious software program that enables remote access and control of computers and networks. It is a type of Remote Access Trojan (RAT) that has been used by attackers to gain access to and control computers and networks.
|
|
reference:
|
|
- https://github.com/thehappydinoa/awesome-censys-queries#orcusrat--
|
|
metadata:
|
|
verified: "true"
|
|
max-request: 1
|
|
censys-query: 'services.tls.certificates.leaf_data.subject.common_name: {"Orcus Server", "OrcusServerCertificate"}'
|
|
tags: c2,ssl,tls,ir,osint,malware,orcusrat,discovery
|
|
ssl:
|
|
- address: "{{Host}}:{{Port}}"
|
|
matchers:
|
|
- type: word
|
|
part: issuer_cn
|
|
words:
|
|
- "Orcus Server"
|
|
- "OrcusServerCertificate"
|
|
condition: or
|
|
|
|
extractors:
|
|
- type: json
|
|
json:
|
|
- ".issuer_cn"
|
|
# digest: 4b0a00483046022100dbd3b3bc1a0fb4908fb35b2965676acef5a90fbc66e236b6c049fd2d13c4c119022100c2a8c189bcf48f0aee65369a3a7cc4b533dcf4c38d236cfc56710b8e2d9455d4:922c64590222798bb761d5b6d8e72950 |