mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-10 20:53:27 +08:00
42 lines
1.0 KiB
YAML
42 lines
1.0 KiB
YAML
id: shimrat-malware
|
|
|
|
info:
|
|
name: ShimRat Malware - Detect
|
|
author: daffainfo
|
|
severity: info
|
|
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar
|
|
tags: malware,file
|
|
file:
|
|
- extensions:
|
|
- all
|
|
|
|
matchers-condition: or
|
|
matchers:
|
|
- type: word
|
|
part: raw
|
|
words:
|
|
- ".dll"
|
|
- ".dat"
|
|
- "QWERTYUIOPLKJHG"
|
|
- "MNBVCXZLKJHGFDS"
|
|
condition: and
|
|
|
|
- type: word
|
|
part: raw
|
|
words:
|
|
- "Data$$00"
|
|
- "Data$$01%c%sData"
|
|
condition: and
|
|
|
|
- type: word
|
|
part: raw
|
|
words:
|
|
- "ping localhost -n 9 /c %s > nul"
|
|
- "Demo"
|
|
- "Win32App"
|
|
- "COMSPEC"
|
|
- "ShimMain"
|
|
- "NotifyShims"
|
|
- "GetHookAPIs"
|
|
condition: and
|
|
# digest: 4a0a0047304502200734d0070adc77b90bf9b94466d6c4b30e2ff7378e2872fa28de767b5fc2a6ce022100c09931d0cc7f242cdfac1cfef15ed9428c0fbd18a209d9566a467a69882b8178:922c64590222798bb761d5b6d8e72950 |