Files
nuclei-templates/file/malware/crimson-malware.yaml
2024-12-01 13:57:55 +00:00

22 lines
782 B
YAML

id: crimson-malware
info:
name: Crimson Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Crimson.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "com/crimson/PK"
- "com/crimson/bootstrapJar/PK"
- "com/crimson/permaJarMulti/PermaJarReporter$1.classPK"
- "com/crimson/universal/containers/KeyloggerLog.classPK"
- "com/crimson/universal/UploadTransfer.classPK"
condition: and
# digest: 490a00463044022056903de32bef0173f4f58b0d8c4f8c848182a3372a56abac7733fc956c874db702203a4a020ccec2d445ed6ebef83dfa257d32a0319436b9ae0d1548d79d68555bea:922c64590222798bb761d5b6d8e72950