Files
nuclei-templates/file/malware/imminent-malware.yaml
2024-12-01 13:57:55 +00:00

37 lines
1.0 KiB
YAML

id: imminent-malware
info:
name: Imminent Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- "DecodeProductKey"
- "StartHTTPFlood"
- "CodeKey"
- "MESSAGEBOX"
- "GetFilezillaPasswords"
- "DataIn"
- "UDPzSockets"
condition: and
- type: word
part: raw
words:
- "<URL>k__BackingField"
- "<RunHidden>k__BackingField"
- "DownloadAndExecute"
- "england.png"
- "-CHECK & PING -n 2 127.0.0.1 & EXIT"
- "Showed Messagebox"
condition: and
# digest: 490a00463044022020072aaec3d07e53b9fe093784defa055e4b1d9721dee154765443bc236d4801022019c2c1d800933acf68c047c71932b1e56c952889b6be4927babc6dbb8d94ebae:922c64590222798bb761d5b6d8e72950