nuclei-malware/Yara-Rules/xhide-malware.yaml

20 lines
415 B
YAML
Raw Permalink Normal View History

id: xhide-malware
info:
name: xHide Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_XHide.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- 'XHide - Process Faker'
- 'Fakename: %s PidNum: %d'
2023-02-15 14:39:31 +00:00
condition: and