Files
nuclei-templates/file/malware/luxnet-malware.yaml
2024-12-01 13:57:55 +00:00

23 lines
676 B
YAML

id: luxnet-malware
info:
name: LuxNet Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "GetHashCode"
- "Activator"
- "WebClient"
- "op_Equality"
- "dickcursor.cur"
- "{0}|{1}|{2}"
condition: and
# digest: 4a0a004730450220273641465dd6e7759f0232b5142f2108d262b0e51f39d3137914ef4181a23bfe022100d8ae7b724a95edc2e04f672d2f873897f0c6f29b79b4085d1a46d28b1b0a33ff:922c64590222798bb761d5b6d8e72950