feat: added BinaryAlert and restructure the repo

main
Muhammad Daffa 2023-08-08 00:32:42 +07:00
parent 597ea580a7
commit fbc13aeb4c
126 changed files with 3481 additions and 3074 deletions

View File

@ -0,0 +1,23 @@
id: basicrat-malware
info:
name: BasicRAT Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/multi/malware_multi_vesche_basicrat.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "HKCU Run registry key applied"
- "HKCU Run registry key failed"
- "Error, platform unsupported."
- "Persistence successful,"
- "Persistence unsuccessful,"
condition: and

View File

@ -0,0 +1,21 @@
id: cerber-malware
info:
name: Cerber Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_cerber_evasion.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "38oDr5.vbs"
- "8ivq.dll"
- "jmsctls_progress32"
condition: and

View File

@ -0,0 +1,28 @@
id: crunchrat-malware
info:
name: CrunchRAT Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/windows/malware_windows_t3ntman_crunchrat.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "<action>command<action>"
- "<action>upload<action>"
- "<action>download<action>"
- "cmd.exe"
- "application/x-www-form-urlencoded"
- "&action="
- "&secondary="
- "<secondary>"
- "<action>"
condition: and
case-insensitive: true

View File

@ -0,0 +1,23 @@
id: ransomware_windows_hydracrypt
info:
name: Hydracrypt Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_hydracrypt.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "oTraining"
- "Stop Training"
- "Play \"sound.wav\""
- "&Start Recording"
- "7About record"
condition: and

View File

@ -0,0 +1,38 @@
id: macos-bella-malware
info:
name: Bella Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/macos/malware_macos_bella.yara
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- "Verified! [2FV Enabled] Account ->"
- "There is no root shell to perform this command. See [rooter] manual entry."
- "Attempt to escalate Bella to root through a variety of attack vectors."
- "BELLA IS NOW RUNNING. CONNECT TO BELLA FROM THE CONTROL CENTER."
condition: or
- type: word
part: raw
words:
- "user_pass_phish"
- "bella_info"
- "get_root"
condition: and
- type: word
part: raw
words:
- "Please specify a bella server."
- "What port should Bella connect on [Default is 4545]:"
condition: and

View File

@ -0,0 +1,24 @@
id: petya-malware-variant-1
info:
name: Petya Malware (Variant 1) - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_petya_variant_1.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "Ooops, your important files are encrypted."
- "Send your Bitcoin wallet ID and personal installation key to e-mail"
- "wowsmith123456@posteo.net. Your personal installation key:"
- "Send $300 worth of Bitcoin to following address:"
- "have been encrypted. Perhaps you are busy looking for a way to recover your"
- "need to do is submit the payment and purchase the decryption key."
condition: or

View File

@ -0,0 +1,20 @@
id: petya-malware-variant-3
info:
name: Petya Malware (Variant 3) - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_petya_variant_3.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "wevtutil cl Setup & wevtutil cl System"
- "fsutil usn deletejournal /D %c:"
condition: or

View File

@ -0,0 +1,18 @@
id: petya-malware-variant-bitcoin
info:
name: Petya Malware (Variant Bitcoin) - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_petya_variant_bitcoin.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "MIIBCgKCAQEAxP/VqKc0yLe9JhVqFMQGwUITO6WpXWnKSNQAYT0O65Cr8PjIQInTeHkXEjfO2n2JmURWV/uHB0ZrlQ/wcYJBwLhQ9EqJ3iDqmN19Oo7NtyEUmbYmopcq+YLIBZzQ2ZTK0A2DtX4GRKxEEFLCy7vP12EYOPXknVy/+mf0JFWixz29QiTf5oLu15wVLONCuEibGaNNpgq+CXsPwfITDbDDmdrRIiUEUw6o3pt5pNOskfOJbMan2TZu6zfhzuts7KafP5UA8/0Hmf5K3/F9Mf9SE68EZjK+cIiFlKeWndP0XfRCYXI9AJYCeaOu7CXF6U0AVNnNjvLeOn42LHFUK4o6JwIDAQAB"

View File

@ -0,0 +1,29 @@
id: pony-stealer-malware
info:
name: Windows Pony Stealer Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/windows/malware_windows_pony_stealer.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "signons.sqlite"
- "signons.txt"
- "signons2.txt"
- "signons3.txt"
- "WininetCacheCredentials"
- "moz_logins"
- "encryptedPassword"
- "FlashFXP"
- "BulletProof"
- "CuteFTP"
condition: and
case-insensitive: true

View File

@ -0,0 +1,21 @@
id: powerware-malware
info:
name: PowerWare Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_powerware_locky.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "ScriptRunner.dll"
- "ScriptRunner.pdb"
- "fixed.ps1"
condition: and

View File

@ -0,0 +1,32 @@
id: wannacry-malware
info:
name: WannaCry Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_wannacry.yara
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- "msg/m_chinese"
- ".wnry"
- "attrib +h"
condition: and
- type: word
part: raw
words:
- "WNcry@2ol7"
- "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com"
- "115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn"
- "12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw"
- "13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94"
condition: or

View File

@ -0,0 +1,34 @@
id: zrypt-malware
info:
name: Zcrypt Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_zcrypt.yara
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- "How to Buy Bitcoins"
- "ALL YOUR PERSONAL FILES ARE ENCRYPTED"
- "Click Here to Show Bitcoin Address"
- "MyEncrypter2.pdb"
condition: or
- type: word
part: raw
words:
- ".p7b"
- ".p7c"
- ".pdd"
- ".pef"
- ".pem"
- "How to decrypt files.html"
condition: and

259
README.md
View File

@ -1,251 +1,14 @@
# Nuclei Malware # Nuclei Malware
Template to detect some malware using nuclei Template to detect some malware using nuclei. Creating these nuclei templates based on previously made YARA rules and then converting them into nuclei template format
## Status Malware ### List of Repositories
I took the reference from [yara rules repository](https://github.com/Yara-Rules/rules/blob/master/malware/) and in this section is about the status of each rule whether it can be made into a nuclei template or not * [https://github.com/Yara-Rules/rules](https://github.com/daffainfo/nuclei-malware/tree/master/Yara-Rules)
* [https://github.com/airbnb/binaryalert/tree/master/rules/public](https://github.com/daffainfo/nuclei-malware/tree/master/BinaryAlert)
| Malware Yara Rules | Status | ### To-Do
| --- | --- | - [ ] Create a GitHub Actions workflow to detect the total number of templates in this repository
| MALW_ATMPot | 🟥 Impossible | - [ ] Gives the status of whether the template is already in the nuclei-templates repo or not (In `STATUS.md`)
| MALW_ATM_HelloWorld | 🟥 Impossible | - [ ] Create more nuclei templates using these repository
| MALW_AZORULT | 🟥 Impossible | - [x] https://github.com/airbnb/binaryalert/tree/master/rules/public
| MALW_AgentTesla | 🟨 Still possible but requires a lot of effort | - [ ] https://github.com/reversinglabs/reversinglabs-yara-rules
| MALW_AgentTesla_SMTP | 🟨 Still possible but requires a lot of effort | - [ ] etc.
| MALW_AlMashreq | 🟨 Still possible but requires a lot of effort |
| MALW_Alina | 🟩 Possible |
| MALW_Andromeda | 🟩 Possible |
| MALW_Arkei | 🟩 Possible |
| MALW_Athena | 🟨 Still possible but requires a lot of effort |
| MALW_Atmos | 🟥 Impossible |
| MALW_BackdoorSSH | 🟥 Impossible |
| MALW_Backoff | 🟩 Possible |
| MALW_Bangat | 🟥 Impossible |
| MALW_Batel | 🟥 Impossible |
| MALW_BlackRev | 🟨 Still possible but requires a lot of effort |
| MALW_BlackWorm | 🟩 Possible |
| MALW_Boouset | 🟥 Impossible |
| MALW_Bublik | 🟩 Possible |
| MALW_Buzus_Softpulse | 🟥 Impossible |
| MALW_CAP_HookExKeylogger | 🟨 Still possible but requires a lot of effort |
| MALW_Chicken | 🟨 Still possible but requires a lot of effort |
| MALW_Citadel | 🟥 Impossible |
| MALW_Cloaking | 🟥 Impossible |
| MALW_Cookies | 🟨 Still possible but requires a lot of effort |
| MALW_Corkow | 🟥 Impossible |
| MALW_Cxpid | 🟩 Possible |
| MALW_Cythosia | 🟩 Possible |
| MALW_DDoSTf | 🟩 Possible |
| MALW_Derkziel | 🟩 Possible |
| MALW_Dexter | 🟩 Possible |
| MALW_DiamondFox | 🟩 Possible |
| MALW_DirtJumper | 🟨 Still possible but requires a lot of effort |
| MALW_Eicar | 🟩 Possible |
| MALW_Elex | 🟥 Impossible |
| MALW_Elknot | 🟥 Impossible |
| MALW_Emotet | 🟥 Impossible |
| MALW_Empire | 🟥 Impossible |
| MALW_Enfal | 🟥 Impossible |
| MALW_Exploit_UAC_Elevators | 🟥 Impossible |
| MALW_Ezcob | 🟩 Possible |
| MALW_F0xy | 🟥 Impossible |
| MALW_FALLCHILL | 🟥 Impossible |
| MALW_FUDCrypt | 🟩 Possible |
| MALW_FakeM | 🟥 Impossible |
| MALW_Fareit | 🟥 Impossible |
| MALW_Favorite | 🟥 Impossible |
| MALW_Furtim | 🟥 Impossible |
| MALW_Gafgyt | 🟩 Possible |
| MALW_Genome | 🟩 Possible |
| MALW_Glasses | 🟩 Possible |
| MALW_Gozi | 🟩 Possible |
| MALW_Grozlex | 🟩 Possible |
| MALW_Hajime | 🟥 Impossible |
| MALW_Hsdfihdf_banking | 🟨 Still possible but requires a lot of effort |
| MALW_Httpsd_ELF | 🟥 Impossible |
| MALW_IMuler | 🟥 Impossible |
| MALW_IcedID | 🟥 Impossible |
| MALW_Iexpl0ree | 🟥 Impossible |
| MALW_Install11 | 🟩 Possible |
| MALW_Intel_Virtualization | 🟩 Possible |
| MALW_IotReaper | 🟩 Possible |
| MALW_Jolob_Backdoor | 🟩 Possible |
| MALW_KINS | 🟨 Still possible but requires a lot of effort |
| MALW_Kelihos | 🟩 Possible |
| MALW_KeyBase | 🟥 Impossible |
| MALW_Korlia | 🟥 Impossible |
| MALW_Korplug | 🟥 Impossible |
| MALW_Kovter | 🟩 Possible |
| MALW_Kraken | 🟥 Impossible |
| MALW_Kwampirs | 🟩 Possible |
| MALW_LURK0 | 🟥 Impossible |
| MALW_Lateral_Movement | 🟩 Possible |
| MALW_Lenovo_Superfish | 🟥 Impossible |
| MALW_LinuxBew | 🟩 Possible |
| MALW_LinuxHelios | 🟩 Possible |
| MALW_LinuxMoose | 🟥 Impossible |
| MALW_LostDoor | 🟩 Possible |
| MALW_LuaBot | 🟩 Possible |
| MALW_LuckyCat | 🟥 Impossible |
| MALW_MSILStealer | 🟩 Possible |
| MALW_MacControl | 🟥 Impossible |
| MALW_MacGyver | 🟩 Possible |
| MALW_Madness | 🟩 Possible |
| MALW_Magento_backend | 🟨 Still possible but requires a lot of effort |
| MALW_Magento_frontend | 🟨 Still possible but requires a lot of effort |
| MALW_Magento_suspicious | 🟥 Impossible |
| MALW_Mailers | 🟥 Impossible |
| MALW_MedusaHTTP_2019 | 🟨 Still possible but requires a lot of effort |
| MALW_Miancha | 🟥 Impossible |
| MALW_MiniAsp3_mem | 🟨 Still possible but requires a lot of effort |
| MALW_Mirai | 🟥 Impossible |
| MALW_Mirai_Okiru_ELF | 🟥 Impossible |
| MALW_Mirai_Satori_ELF | 🟥 Impossible |
| MALW_Miscelanea | 🟥 Impossible |
| MALW_Miscelanea_Linux | 🟨 Still possible but requires a lot of effort |
| MALW_Monero_Miner_installer | 🟩 Possible |
| MALW_NSFree | 🟩 Possible |
| MALW_Naikon | 🟨 Still possible but requires a lot of effort |
| MALW_Naspyupdate | 🟨 Still possible but requires a lot of effort |
| MALW_NetTraveler | 🟨 Still possible but requires a lot of effort |
| MALW_NionSpy | 🟥 Impossible |
| MALW_Notepad | 🟩 Possible |
| MALW_OSX_Leverage | 🟩 Possible |
| MALW_Odinaff | 🟥 Impossible |
| MALW_Olyx | 🟩 Possible |
| MALW_PE_sections | 🟥 Impossible |
| MALW_PittyTiger | 🟨 Still possible but requires a lot of effort |
| MALW_PolishBankRat | 🟥 Impossible |
| MALW_Ponmocup | 🟥 Impossible |
| MALW_Pony | 🟩 Possible |
| MALW_Predator | 🟥 Impossible |
| MALW_PubSab | 🟩 Possible |
| MALW_PurpleWave | 🟥 Impossible |
| MALW_PyPI | 🟩 Possible |
| MALW_Pyinstaller | 🟥 Impossible |
| MALW_Pyinstaller_OSX | 🟩 Possible |
| MALW_Quarian | 🟥 Impossible |
| MALW_Rebirth_Vulcan_ELF | 🟥 Impossible |
| MALW_Regsubdat | 🟥 Impossible |
| MALW_Rockloader | 🟥 Impossible |
| MALW_Rooter | 🟥 Impossible |
| MALW_Rovnix | 🟥 Impossible |
| MALW_Safenet | 🟩 Possible |
| MALW_Sakurel | 🟩 Possible |
| MALW_Sayad | 🟩 Possible |
| MALW_Scarhikn | 🟥 Impossible |
| MALW_Sendsafe | 🟨 Still possible but requires a lot of effort |
| MALW_Shamoon | 🟥 Impossible |
| MALW_Shifu | 🟥 Impossible |
| MALW_Skeleton | 🟥 Impossible |
| MALW_Spora | 🟩 Possible |
| MALW_Sqlite | 🟩 Possible |
| MALW_Stealer | 🟩 Possible |
| MALW_Surtr | 🟥 Impossible |
| MALW_T5000 | 🟩 Possible |
| MALW_TRITON_HATMAN | 🟥 Impossible |
| MALW_TRITON_ICS_FRAMEWORK | 🟥 Impossible |
| MALW_Tedroo | 🟩 Possible |
| MALW_Tinba | 🟥 Impossible |
| MALW_TinyShell_Backdoor_gen | 🟥 Impossible |
| MALW_Torte_ELF | 🟥 Impossible |
| MALW_TreasureHunt | 🟩 Possible |
| MALW_TrickBot | 🟩 Possible |
| MALW_Trumpbot | 🟩 Possible |
| MALW_Upatre | 🟥 Impossible |
| MALW_Urausy | 🟩 Possible |
| MALW_Vidgrab | 🟥 Impossible |
| MALW_Virut_FileInfector_UNK_VERSION | 🟥 Impossible |
| MALW_Volgmer | 🟥 Impossible |
| MALW_Wabot | 🟩 Possible |
| MALW_Warp | 🟩 Possible |
| MALW_Wimmie | 🟥 Impossible |
| MALW_XHide | 🟩 Possible |
| MALW_XMRIG_Miner | 🟩 Possible |
| MALW_XOR_DDos | 🟩 Possible |
| MALW_Yayih | 🟩 Possible |
| MALW_Yordanyan_ActiveAgent | 🟨 Still possible but requires a lot of effort |
| MALW_Zegost | 🟩 Possible |
| MALW_Zeus | 🟥 Impossible |
| MALW_adwind_RAT | 🟥 Impossible |
| MALW_hancitor | 🟨 Still possible but requires a lot of effort |
| MALW_kirbi_mimikatz | 🟥 Impossible |
| MALW_kpot | 🟨 Still possible but requires a lot of effort |
| MALW_marap | 🟨 Still possible but requires a lot of effort |
| MALW_shifu_shiz | 🟨 Still possible but requires a lot of effort |
| MALW_sitrof_fortis_scar | 🟨 Still possible but requires a lot of effort |
| MALW_viotto_keylogger | 🟥 Impossible |
| MALW_xDedic_marketplace | 🟥 Impossible |
| RANSOM_.CRYPTXXX.yar | 🟩 Possible |
| RANSOM_777.yar | 🟩 Possible |
| RANSOM_Alpha.yar | 🟩 Possible |
| RANSOM_BadRabbit.yar | 🟥 Impossible |
| RANSOM_Cerber.yar | 🟥 Impossible |
| RANSOM_Comodosec.yar | 🟨 Still possible but requires a lot of effort |
| RANSOM_Crypren.yar | 🟥 Impossible |
| RANSOM_CryptoNar.yar | 🟥 Impossible |
| RANSOM_Cryptolocker.yar | 🟨 Still possible but requires a lot of effort |
| RANSOM_DMALocker.yar | 🟩 Possible |
| RANSOM_DoublePulsar_Petya.yar | 🟩 Possible |
| RANSOM_Erebus.yar | 🟩 Possible |
| RANSOM_GPGQwerty.yar | 🟩 Possible |
| RANSOM_GoldenEye.yar | 🟥 Impossible |
| RANSOM_Locky.yar | 🟩 Possible |
| RANSOM_MS17-010_Wannacrypt.yar | 🟥 Impossible |
| RANSOM_Maze.yar | 🟥 Impossible |
| RANSOM_PetrWrap.yar | 🟥 Impossible |
| RANSOM_Petya.yar | 🟥 Impossible |
| RANSOM_Petya_MS17_010.yar | 🟥 Impossible |
| RANSOM_Pico.yar | 🟥 Impossible |
| RANSOM_Revix.yar | 🟥 Impossible |
| RANSOM_SamSam.yar | 🟥 Impossible |
| RANSOM_Satana.yar | 🟩 Possible |
| RANSOM_Shiva.yar | 🟥 Impossible |
| RANSOM_Sigma.yar | 🟩 Possible |
| RANSOM_Snake.yar | 🟩 Possible |
| RANSOM_Stampado.yar | 🟥 Impossible |
| RANSOM_TeslaCrypt.yar | 🟩 Possible |
| RANSOM_Tox.yar | 🟩 Possible |
| RANSOM_acroware.yar | 🟥 Impossible |
| RANSOM_jeff_dev.yar | 🟥 Impossible |
| RANSOM_locdoor.yar | 🟥 Impossible |
| RANSOM_screenlocker_5h311_1nj3c706.yar | 🟥 Impossible |
| RANSOM_shrug2.yar | 🟥 Impossible |
| RANSOM_termite.yar | 🟥 Impossible |
| RAT_Adwind.yar | 🟥 Impossible |
| RAT_Adzok.yar | 🟩 Possible |
| RAT_Asyncrat.yar | 🟥 Impossible |
| RAT_BlackShades.yar | 🟥 Impossible |
| RAT_Bolonyokte.yar | 🟥 Impossible |
| RAT_Bozok.yar | 🟩 Possible |
| RAT_Cerberus.yar | 🟩 Possible |
| RAT_Crimson.yar | 🟩 Possible |
| RAT_CrossRAT.yar | 🟥 Impossible |
| RAT_CyberGate.yar | 🟩 Possible |
| RAT_DarkComet.yar | 🟥 Impossible |
| RAT_FlyingKitten.yar | 🟥 Impossible |
| RAT_Gh0st.yar | 🟥 Impossible |
| RAT_Gholee.yar | 🟩 Possible |
| RAT_Glass.yar | 🟩 Possible |
| RAT_Havex.yar | 🟥 Impossible |
| RAT_Hizor.yar | 🟥 Impossible |
| RAT_Indetectables.yar | 🟥 Impossible |
| RAT_Inocnation.yar | 🟥 Impossible |
| RAT_Meterpreter_Reverse_Tcp.yar | 🟥 Impossible |
| RAT_Nanocore.yar | 🟥 Impossible |
| RAT_NetwiredRC.yar | 🟥 Impossible |
| RAT_Njrat.yar | 🟥 Impossible |
| RAT_Orcus.yar | 🟥 Impossible |
| RAT_PlugX.yar | 🟥 Impossible |
| RAT_PoetRATDoc.yar | 🟩 Possible |
| RAT_PoetRATPython.yar | 🟥 Impossible |
| RAT_PoisonIvy.yar | 🟥 Impossible |
| RAT_Ratdecoders.yar | 🟩 Possible |
| RAT_Sakula.yar | 🟥 Impossible |
| RAT_ShadowTech.yar | 🟩 Possible |
| RAT_Shim.yar | 🟩 Possible |
| RAT_Terminator.yar | 🟩 Possible |
| RAT_Xtreme.yar | 🟥 Impossible |
| RAT_ZoxPNG.yar | 🟩 Possible |
| RAT_jRAT.yar | 🟩 Possible |
| RAT_xRAT.yar | 🟩 Possible |
| RAT_xRAT20.yar | 🟥 Impossible |

279
STATUS.md Normal file
View File

@ -0,0 +1,279 @@
# List
* [https://github.com/Yara-Rules/rules](https://github.com/daffainfo/nuclei-malware/tree/master/Yara-Rules)
| Yara Rules | Status |
| --- | --- |
| MALW_ATMPot | 🟥 Impossible |
| MALW_ATM_HelloWorld | 🟥 Impossible |
| MALW_AZORULT | 🟥 Impossible |
| MALW_AgentTesla | 🟨 Still possible but requires a lot of effort |
| MALW_AgentTesla_SMTP | 🟨 Still possible but requires a lot of effort |
| MALW_AlMashreq | 🟨 Still possible but requires a lot of effort |
| MALW_Alina | 🟩 Possible |
| MALW_Andromeda | 🟩 Possible |
| MALW_Arkei | 🟩 Possible |
| MALW_Athena | 🟨 Still possible but requires a lot of effort |
| MALW_Atmos | 🟥 Impossible |
| MALW_BackdoorSSH | 🟥 Impossible |
| MALW_Backoff | 🟩 Possible |
| MALW_Bangat | 🟥 Impossible |
| MALW_Batel | 🟥 Impossible |
| MALW_BlackRev | 🟨 Still possible but requires a lot of effort |
| MALW_BlackWorm | 🟩 Possible |
| MALW_Boouset | 🟥 Impossible |
| MALW_Bublik | 🟩 Possible |
| MALW_Buzus_Softpulse | 🟥 Impossible |
| MALW_CAP_HookExKeylogger | 🟨 Still possible but requires a lot of effort |
| MALW_Chicken | 🟨 Still possible but requires a lot of effort |
| MALW_Citadel | 🟥 Impossible |
| MALW_Cloaking | 🟥 Impossible |
| MALW_Cookies | 🟨 Still possible but requires a lot of effort |
| MALW_Corkow | 🟥 Impossible |
| MALW_Cxpid | 🟩 Possible |
| MALW_Cythosia | 🟩 Possible |
| MALW_DDoSTf | 🟩 Possible |
| MALW_Derkziel | 🟩 Possible |
| MALW_Dexter | 🟩 Possible |
| MALW_DiamondFox | 🟩 Possible |
| MALW_DirtJumper | 🟨 Still possible but requires a lot of effort |
| MALW_Eicar | 🟩 Possible |
| MALW_Elex | 🟥 Impossible |
| MALW_Elknot | 🟥 Impossible |
| MALW_Emotet | 🟥 Impossible |
| MALW_Empire | 🟥 Impossible |
| MALW_Enfal | 🟥 Impossible |
| MALW_Exploit_UAC_Elevators | 🟥 Impossible |
| MALW_Ezcob | 🟩 Possible |
| MALW_F0xy | 🟥 Impossible |
| MALW_FALLCHILL | 🟥 Impossible |
| MALW_FUDCrypt | 🟩 Possible |
| MALW_FakeM | 🟥 Impossible |
| MALW_Fareit | 🟥 Impossible |
| MALW_Favorite | 🟥 Impossible |
| MALW_Furtim | 🟥 Impossible |
| MALW_Gafgyt | 🟩 Possible |
| MALW_Genome | 🟩 Possible |
| MALW_Glasses | 🟩 Possible |
| MALW_Gozi | 🟩 Possible |
| MALW_Grozlex | 🟩 Possible |
| MALW_Hajime | 🟥 Impossible |
| MALW_Hsdfihdf_banking | 🟨 Still possible but requires a lot of effort |
| MALW_Httpsd_ELF | 🟥 Impossible |
| MALW_IMuler | 🟥 Impossible |
| MALW_IcedID | 🟥 Impossible |
| MALW_Iexpl0ree | 🟥 Impossible |
| MALW_Install11 | 🟩 Possible |
| MALW_Intel_Virtualization | 🟩 Possible |
| MALW_IotReaper | 🟩 Possible |
| MALW_Jolob_Backdoor | 🟩 Possible |
| MALW_KINS | 🟨 Still possible but requires a lot of effort |
| MALW_Kelihos | 🟩 Possible |
| MALW_KeyBase | 🟥 Impossible |
| MALW_Korlia | 🟥 Impossible |
| MALW_Korplug | 🟥 Impossible |
| MALW_Kovter | 🟩 Possible |
| MALW_Kraken | 🟥 Impossible |
| MALW_Kwampirs | 🟩 Possible |
| MALW_LURK0 | 🟥 Impossible |
| MALW_Lateral_Movement | 🟩 Possible |
| MALW_Lenovo_Superfish | 🟥 Impossible |
| MALW_LinuxBew | 🟩 Possible |
| MALW_LinuxHelios | 🟩 Possible |
| MALW_LinuxMoose | 🟥 Impossible |
| MALW_LostDoor | 🟩 Possible |
| MALW_LuaBot | 🟩 Possible |
| MALW_LuckyCat | 🟥 Impossible |
| MALW_MSILStealer | 🟩 Possible |
| MALW_MacControl | 🟥 Impossible |
| MALW_MacGyver | 🟩 Possible |
| MALW_Madness | 🟩 Possible |
| MALW_Magento_backend | 🟨 Still possible but requires a lot of effort |
| MALW_Magento_frontend | 🟨 Still possible but requires a lot of effort |
| MALW_Magento_suspicious | 🟥 Impossible |
| MALW_Mailers | 🟥 Impossible |
| MALW_MedusaHTTP_2019 | 🟨 Still possible but requires a lot of effort |
| MALW_Miancha | 🟥 Impossible |
| MALW_MiniAsp3_mem | 🟨 Still possible but requires a lot of effort |
| MALW_Mirai | 🟥 Impossible |
| MALW_Mirai_Okiru_ELF | 🟥 Impossible |
| MALW_Mirai_Satori_ELF | 🟥 Impossible |
| MALW_Miscelanea | 🟥 Impossible |
| MALW_Miscelanea_Linux | 🟨 Still possible but requires a lot of effort |
| MALW_Monero_Miner_installer | 🟩 Possible |
| MALW_NSFree | 🟩 Possible |
| MALW_Naikon | 🟨 Still possible but requires a lot of effort |
| MALW_Naspyupdate | 🟨 Still possible but requires a lot of effort |
| MALW_NetTraveler | 🟨 Still possible but requires a lot of effort |
| MALW_NionSpy | 🟥 Impossible |
| MALW_Notepad | 🟩 Possible |
| MALW_OSX_Leverage | 🟩 Possible |
| MALW_Odinaff | 🟥 Impossible |
| MALW_Olyx | 🟩 Possible |
| MALW_PE_sections | 🟥 Impossible |
| MALW_PittyTiger | 🟨 Still possible but requires a lot of effort |
| MALW_PolishBankRat | 🟥 Impossible |
| MALW_Ponmocup | 🟥 Impossible |
| MALW_Pony | 🟩 Possible |
| MALW_Predator | 🟥 Impossible |
| MALW_PubSab | 🟩 Possible |
| MALW_PurpleWave | 🟥 Impossible |
| MALW_PyPI | 🟩 Possible |
| MALW_Pyinstaller | 🟥 Impossible |
| MALW_Pyinstaller_OSX | 🟩 Possible |
| MALW_Quarian | 🟥 Impossible |
| MALW_Rebirth_Vulcan_ELF | 🟥 Impossible |
| MALW_Regsubdat | 🟥 Impossible |
| MALW_Rockloader | 🟥 Impossible |
| MALW_Rooter | 🟥 Impossible |
| MALW_Rovnix | 🟥 Impossible |
| MALW_Safenet | 🟩 Possible |
| MALW_Sakurel | 🟩 Possible |
| MALW_Sayad | 🟩 Possible |
| MALW_Scarhikn | 🟥 Impossible |
| MALW_Sendsafe | 🟨 Still possible but requires a lot of effort |
| MALW_Shamoon | 🟥 Impossible |
| MALW_Shifu | 🟥 Impossible |
| MALW_Skeleton | 🟥 Impossible |
| MALW_Spora | 🟩 Possible |
| MALW_Sqlite | 🟩 Possible |
| MALW_Stealer | 🟩 Possible |
| MALW_Surtr | 🟥 Impossible |
| MALW_T5000 | 🟩 Possible |
| MALW_TRITON_HATMAN | 🟥 Impossible |
| MALW_TRITON_ICS_FRAMEWORK | 🟥 Impossible |
| MALW_Tedroo | 🟩 Possible |
| MALW_Tinba | 🟥 Impossible |
| MALW_TinyShell_Backdoor_gen | 🟥 Impossible |
| MALW_Torte_ELF | 🟥 Impossible |
| MALW_TreasureHunt | 🟩 Possible |
| MALW_TrickBot | 🟩 Possible |
| MALW_Trumpbot | 🟩 Possible |
| MALW_Upatre | 🟥 Impossible |
| MALW_Urausy | 🟩 Possible |
| MALW_Vidgrab | 🟥 Impossible |
| MALW_Virut_FileInfector_UNK_VERSION | 🟥 Impossible |
| MALW_Volgmer | 🟥 Impossible |
| MALW_Wabot | 🟩 Possible |
| MALW_Warp | 🟩 Possible |
| MALW_Wimmie | 🟥 Impossible |
| MALW_XHide | 🟩 Possible |
| MALW_XMRIG_Miner | 🟩 Possible |
| MALW_XOR_DDos | 🟩 Possible |
| MALW_Yayih | 🟩 Possible |
| MALW_Yordanyan_ActiveAgent | 🟨 Still possible but requires a lot of effort |
| MALW_Zegost | 🟩 Possible |
| MALW_Zeus | 🟥 Impossible |
| MALW_adwind_RAT | 🟥 Impossible |
| MALW_hancitor | 🟨 Still possible but requires a lot of effort |
| MALW_kirbi_mimikatz | 🟥 Impossible |
| MALW_kpot | 🟨 Still possible but requires a lot of effort |
| MALW_marap | 🟨 Still possible but requires a lot of effort |
| MALW_shifu_shiz | 🟨 Still possible but requires a lot of effort |
| MALW_sitrof_fortis_scar | 🟨 Still possible but requires a lot of effort |
| MALW_viotto_keylogger | 🟥 Impossible |
| MALW_xDedic_marketplace | 🟥 Impossible |
| RANSOM_.CRYPTXXX.yar | 🟩 Possible |
| RANSOM_777.yar | 🟩 Possible |
| RANSOM_Alpha.yar | 🟩 Possible |
| RANSOM_BadRabbit.yar | 🟥 Impossible |
| RANSOM_Cerber.yar | 🟥 Impossible |
| RANSOM_Comodosec.yar | 🟨 Still possible but requires a lot of effort |
| RANSOM_Crypren.yar | 🟥 Impossible |
| RANSOM_CryptoNar.yar | 🟥 Impossible |
| RANSOM_Cryptolocker.yar | 🟨 Still possible but requires a lot of effort |
| RANSOM_DMALocker.yar | 🟩 Possible |
| RANSOM_DoublePulsar_Petya.yar | 🟩 Possible |
| RANSOM_Erebus.yar | 🟩 Possible |
| RANSOM_GPGQwerty.yar | 🟩 Possible |
| RANSOM_GoldenEye.yar | 🟥 Impossible |
| RANSOM_Locky.yar | 🟩 Possible |
| RANSOM_MS17-010_Wannacrypt.yar | 🟥 Impossible |
| RANSOM_Maze.yar | 🟥 Impossible |
| RANSOM_PetrWrap.yar | 🟥 Impossible |
| RANSOM_Petya.yar | 🟥 Impossible |
| RANSOM_Petya_MS17_010.yar | 🟥 Impossible |
| RANSOM_Pico.yar | 🟥 Impossible |
| RANSOM_Revix.yar | 🟥 Impossible |
| RANSOM_SamSam.yar | 🟥 Impossible |
| RANSOM_Satana.yar | 🟩 Possible |
| RANSOM_Shiva.yar | 🟥 Impossible |
| RANSOM_Sigma.yar | 🟩 Possible |
| RANSOM_Snake.yar | 🟩 Possible |
| RANSOM_Stampado.yar | 🟥 Impossible |
| RANSOM_TeslaCrypt.yar | 🟩 Possible |
| RANSOM_Tox.yar | 🟩 Possible |
| RANSOM_acroware.yar | 🟥 Impossible |
| RANSOM_jeff_dev.yar | 🟥 Impossible |
| RANSOM_locdoor.yar | 🟥 Impossible |
| RANSOM_screenlocker_5h311_1nj3c706.yar | 🟥 Impossible |
| RANSOM_shrug2.yar | 🟥 Impossible |
| RANSOM_termite.yar | 🟥 Impossible |
| RAT_Adwind.yar | 🟥 Impossible |
| RAT_Adzok.yar | 🟩 Possible |
| RAT_Asyncrat.yar | 🟥 Impossible |
| RAT_BlackShades.yar | 🟥 Impossible |
| RAT_Bolonyokte.yar | 🟥 Impossible |
| RAT_Bozok.yar | 🟩 Possible |
| RAT_Cerberus.yar | 🟩 Possible |
| RAT_Crimson.yar | 🟩 Possible |
| RAT_CrossRAT.yar | 🟥 Impossible |
| RAT_CyberGate.yar | 🟩 Possible |
| RAT_DarkComet.yar | 🟥 Impossible |
| RAT_FlyingKitten.yar | 🟥 Impossible |
| RAT_Gh0st.yar | 🟥 Impossible |
| RAT_Gholee.yar | 🟩 Possible |
| RAT_Glass.yar | 🟩 Possible |
| RAT_Havex.yar | 🟥 Impossible |
| RAT_Hizor.yar | 🟥 Impossible |
| RAT_Indetectables.yar | 🟥 Impossible |
| RAT_Inocnation.yar | 🟥 Impossible |
| RAT_Meterpreter_Reverse_Tcp.yar | 🟥 Impossible |
| RAT_Nanocore.yar | 🟥 Impossible |
| RAT_NetwiredRC.yar | 🟥 Impossible |
| RAT_Njrat.yar | 🟥 Impossible |
| RAT_Orcus.yar | 🟥 Impossible |
| RAT_PlugX.yar | 🟥 Impossible |
| RAT_PoetRATDoc.yar | 🟩 Possible |
| RAT_PoetRATPython.yar | 🟥 Impossible |
| RAT_PoisonIvy.yar | 🟥 Impossible |
| RAT_Ratdecoders.yar | 🟩 Possible |
| RAT_Sakula.yar | 🟥 Impossible |
| RAT_ShadowTech.yar | 🟩 Possible |
| RAT_Shim.yar | 🟩 Possible |
| RAT_Terminator.yar | 🟩 Possible |
| RAT_Xtreme.yar | 🟥 Impossible |
| RAT_ZoxPNG.yar | 🟩 Possible |
| RAT_jRAT.yar | 🟩 Possible |
| RAT_xRAT.yar | 🟩 Possible |
| RAT_xRAT20.yar | 🟥 Impossible |
* [https://github.com/airbnb/binaryalert/tree/master/rules/public](https://github.com/daffainfo/nuclei-malware/tree/master/BinaryAlert)
| Yara Rules | Status |
| --- | --- |
| malware_macos_apt_sofacy_xagent.yara | 🟥 Impossible |
| malware_macos_bella.yara | 🟩 Possible |
| malware_macos_macspy.yara | 🟥 Impossible |
| malware_macos_marten4n6_evilosx.yara | 🟨 Still possible but requires a lot of effort |
| malware_macos_neoneggplant_eggshell.yara | 🟨 Still possible but requires a lot of effort |
| malware_macos_proton_rat_generic.yara | 🟥 Impossible |
| malware_multi_pupy_rat.yara | 🟨 Still possible but requires a lot of effort |
| malware_multi_vesche_basicrat.yara | 🟩 Possible |
| malware_windows_apt_red_leaves_generic.yara | 🟨 Still possible but requires a lot of effort |
| malware_windows_pony_stealer.yara | 🟩 Possible |
| malware_windows_remcos_rat.yara | 🟨 Still possible but requires a lot of effort |
| malware_windows_t3ntman_crunchrat.yara | 🟩 Possible |
| malware_windows_xrat_quasarrat.yara | 🟨 Still possible but requires a lot of effort |
| ransomware_windows_HDDCryptorA.yara | 🟨 Still possible but requires a lot of effort |
| ransomware_windows_cerber_evasion.yara | 🟩 Possible |
| ransomware_windows_cryptolocker.yara | 🟨 Still possible but requires a lot of effort |
| ransomware_windows_hydracrypt.yara | 🟩 Possible |
| ransomware_windows_lazarus_wannacry.yara | 🟥 Impossible |
| ransomware_windows_petya_variant_1.yara | 🟩 Possible |
| ransomware_windows_petya_variant_2.yara | 🟨 Still possible but requires a lot of effort |
| ransomware_windows_petya_variant_3.yara | 🟩 Possible |
| ransomware_windows_petya_variant_bitcoin.yara | 🟩 Possible |
| ransomware_windows_powerware_locky.yara | 🟩 Possible |
| ransomware_windows_wannacry.yara | 🟩 Possible |
| ransomware_windows_zcrypt.yara | 🟩 Possible |

View File

@ -1,9 +1,9 @@
id: malware_aar id: aar-malware
info: info:
name: AAR Malware Detector name: AAR Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "Hashtable" - "Hashtable"
- "get_IsDisposed" - "get_IsDisposed"

View File

@ -1,9 +1,9 @@
id: malware_adzok id: adzok-malware
info: info:
name: Adzok Malware Detector name: Adzok Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Adzok.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Adzok.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "key.classPK" - "key.classPK"
- "svd$1.classPK" - "svd$1.classPK"
@ -25,6 +26,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "config.xmlPK" - "config.xmlPK"
- "svd$1.classPK" - "svd$1.classPK"
@ -36,6 +38,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "config.xmlPK" - "config.xmlPK"
- "key.classPK" - "key.classPK"
@ -47,6 +50,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "config.xmlPK" - "config.xmlPK"
- "key.classPK" - "key.classPK"
@ -58,6 +62,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "config.xmlPK" - "config.xmlPK"
- "key.classPK" - "key.classPK"
@ -69,6 +74,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "config.xmlPK" - "config.xmlPK"
- "key.classPK" - "key.classPK"
@ -80,6 +86,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "config.xmlPK" - "config.xmlPK"
- "key.classPK" - "key.classPK"
@ -91,6 +98,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "config.xmlPK" - "config.xmlPK"
- "key.classPK" - "key.classPK"

View File

@ -1,9 +1,9 @@
id: malware_alfa id: alfa-malware
info: info:
name: Alfa Malware Detector name: Alfa Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Alpha.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Alpha.yar
tags: malware,file tags: malware,file
@ -11,7 +11,6 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: binary - type: binary
binary: binary:

View File

@ -1,9 +1,9 @@
id: malware_alienspy id: alienspy-malware
info: info:
name: AlienSpy Malware Detector name: AlienSpy Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "META-INF/MANIFEST.MF" - "META-INF/MANIFEST.MF"
- "ePK" - "ePK"

View File

@ -1,9 +1,9 @@
id: malware_alina id: alina-malware
info: info:
name: Alina Malware Detector name: Alina Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Alina.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Alina.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'Alina v1.0' - 'Alina v1.0'
- 'POST' - 'POST'

View File

@ -1,9 +1,9 @@
id: malware_alpha id: alpha-malware
info: info:
name: Alpha Malware Detector name: Alpha Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Alpha.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Alpha.yar
tags: malware,file tags: malware,file

View File

@ -1,9 +1,9 @@
id: malware_andromeda id: andromeda-malware
info: info:
name: Andromeda Malware Detector name: Andromeda Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Andromeda.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Andromeda.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'hsk\\ehs\\dihviceh\\serhlsethntrohntcohurrehem\\chsyst' - 'hsk\\ehs\\dihviceh\\serhlsethntrohntcohurrehem\\chsyst'

View File

@ -1,9 +1,9 @@
id: malware_ap0calypse id: ap0calypse-malware
info: info:
name: Ap0calypse Malware Detector name: Ap0calypse Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "Ap0calypse" - "Ap0calypse"
- "Sifre" - "Sifre"

View File

@ -1,9 +1,9 @@
id: malware_arcom id: arcom-malware
info: info:
name: Arcom Malware Detector name: Arcom Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "CVu3388fnek3W(3ij3fkp0930di" - "CVu3388fnek3W(3ij3fkp0930di"
- "ZINGAWI2" - "ZINGAWI2"

View File

@ -1,9 +1,9 @@
id: malware_arkei id: arkei-malware
info: info:
name: Arkei Malware Detector name: Arkei Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Arkei.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Arkei.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'Arkei' - 'Arkei'
- '/server/gate' - '/server/gate'

View File

@ -1,9 +1,9 @@
id: malware_backoff id: backoff-malware
info: info:
name: Backoff Malware Detector name: Backoff Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Backoff.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Backoff.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- '&op=%d&id=%s&ui=%s&wv=%d&gr=%s&bv=%s' - '&op=%d&id=%s&ui=%s&wv=%d&gr=%s&bv=%s'
- '%s @ %s' - '%s @ %s'

View File

@ -1,9 +1,9 @@
id: malware_bandook id: bandook-malware
info: info:
name: Bandook Malware Detector name: Bandook Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "aaaaaa1|" - "aaaaaa1|"
- "aaaaaa2|" - "aaaaaa2|"

View File

@ -1,9 +1,9 @@
id: malware_blacknix id: blacknix-malware
info: info:
name: BlackNix Malware Detector name: BlackNix Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "SETTINGS" - "SETTINGS"
- "Mark Adler" - "Mark Adler"

View File

@ -1,9 +1,9 @@
id: malware_blackworm id: blackworm-malware
info: info:
name: Blackworm Malware Detector name: Blackworm Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_BlackWorm.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_BlackWorm.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'm_ComputerObjectProvider' - 'm_ComputerObjectProvider'
- 'MyWebServices' - 'MyWebServices'

View File

@ -1,9 +1,9 @@
id: malware_bluebanana id: bluebanana-malware
info: info:
name: BlueBanana Malware Detector name: BlueBanana Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "META-INF" - "META-INF"
- "config.txt" - "config.txt"

View File

@ -1,9 +1,9 @@
id: malware_bozok id: bozok-malware
info: info:
name: Bozok Malware Detector name: Bozok Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Bozok.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Bozok.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "getVer" - "getVer"
- "StartVNC" - "StartVNC"

View File

@ -1,9 +1,9 @@
id: malware_bublik id: bublik-malware
info: info:
name: Bublik Malware Detector name: Bublik Malware Detector
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Bublik.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Bublik.yar
tags: malware,file tags: malware,file
@ -11,7 +11,6 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: binary - type: binary
binary: binary:

View File

@ -1,9 +1,9 @@
id: malware_cap_hookexkeylogger id: cap-hookexkeylogger-malware
info: info:
name: CAP HookExKeylogger Malware Detector name: CAP HookExKeylogger Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_CAP_HookExKeylogger.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_CAP_HookExKeylogger.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "SetWindowsHookEx" - "SetWindowsHookEx"
- "WH_KEYBOARD_LL" - "WH_KEYBOARD_LL"
@ -21,6 +22,7 @@ file:
case-insensitive: true case-insensitive: true
- type: word - type: word
part: raw
words: words:
- "SetWindowsHookEx" - "SetWindowsHookEx"
- "WH_KEYBOARD" - "WH_KEYBOARD"
@ -28,6 +30,7 @@ file:
case-insensitive: true case-insensitive: true
- type: word - type: word
part: raw
words: words:
- "WH_KEYBOARD" - "WH_KEYBOARD"
- "WH_KEYBOARD_LL" - "WH_KEYBOARD_LL"

View File

@ -1,9 +1,9 @@
id: malware_cerberus id: cerberus-malware
info: info:
name: Cerberus Malware Detector name: Cerberus Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Cerberus.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Cerberus.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "Ypmw1Syv023QZD" - "Ypmw1Syv023QZD"
- "wZ2pla" - "wZ2pla"
@ -21,6 +22,7 @@ file:
condition: or condition: or
- type: word - type: word
part: raw
words: words:
- "cerberus" - "cerberus"
case-insensitive: true case-insensitive: true

View File

@ -1,9 +1,9 @@
id: malware_clientmesh id: clientmesh-malware
info: info:
name: ClientMesh Malware Detector name: ClientMesh Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "machinedetails" - "machinedetails"
- "MySettings" - "MySettings"

View File

@ -1,9 +1,9 @@
id: malware_crimson id: crimson-malware
info: info:
name: Crimson Malware Detector name: Crimson Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Crimson.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Crimson.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "com/crimson/PK" - "com/crimson/PK"
- "com/crimson/bootstrapJar/PK" - "com/crimson/bootstrapJar/PK"

View File

@ -1,9 +1,9 @@
id: malware_cryptxxx_dropper id: cryptxxx-dropper-malware
info: info:
name: CryptXXX Dropper Malware Detector name: CryptXXX Dropper Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar
tags: malware,file tags: malware,file
@ -11,9 +11,8 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: binary #Dropper - type: binary
binary: binary:
- "50653157584346765962486F35" - "50653157584346765962486F35"
- "43003A005C0042004900450052005C0051006D006B004E0052004C00460000" - "43003A005C0042004900450052005C0051006D006B004E0052004C00460000"

View File

@ -1,9 +1,9 @@
id: malware_cryptxxx id: cryptxxx-malware
info: info:
name: CryptXXX Malware Detector name: CryptXXX Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar
tags: malware,file tags: malware,file
@ -11,7 +11,6 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: binary - type: binary
binary: binary:

View File

@ -1,9 +1,9 @@
id: malware_cxpid id: cxpid-malware
info: info:
name: Cxpid Malware Detector name: Cxpid Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Cxpid.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Cxpid.yar
tags: malware,file tags: malware,file
@ -13,7 +13,8 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word #cxpidStrings - type: word
part: raw
words: words:
- '/cxpid/submit.php?SessionID=' - '/cxpid/submit.php?SessionID='
- '/cxgid/' - '/cxgid/'
@ -21,6 +22,6 @@ file:
- 'E21BC52BEA39E435C40CD8' - 'E21BC52BEA39E435C40CD8'
- ' -,L-,O+,Q-,R-,Y-,S-' - ' -,L-,O+,Q-,R-,Y-,S-'
- type: binary #cxpidCode - type: binary
binary: binary:
- "558BECB9380400006A006A004975F9" - "558BECB9380400006A006A004975F9"

View File

@ -1,9 +1,9 @@
id: malware_cythosia id: cythosia-malware
info: info:
name: Cythosia Malware Detector name: Cythosia Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Cythosia.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Cythosia.yar
tags: malware,file tags: malware,file
@ -11,8 +11,8 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'HarvesterSocksBot.Properties.Resources' - 'HarvesterSocksBot.Properties.Resources'

View File

@ -1,9 +1,9 @@
id: malware_darkrat id: darkrat-malware
info: info:
name: DarkRAT Malware Detector name: DarkRAT Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "@1906dark1996coder@" - "@1906dark1996coder@"
- "SHEmptyRecycleBinA" - "SHEmptyRecycleBinA"

View File

@ -1,9 +1,9 @@
id: malware_ddostf id: ddostf-malware
info: info:
name: DDoSTf Malware Detector name: DDoSTf Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- http://blog.malwaremustdie.org/2016/01/mmd-0048-2016-ddostf-new-elf-windows.html - http://blog.malwaremustdie.org/2016/01/mmd-0048-2016-ddostf-new-elf-windows.html
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_DDoSTf.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_DDoSTf.yar
@ -16,6 +16,7 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'ddos.tf' - 'ddos.tf'
- 'Accept-Language: zh' - 'Accept-Language: zh'
@ -24,6 +25,6 @@ file:
- type: binary - type: binary
binary: binary:
- 'E8AEBEE7BDAE5443505F4B454550494E54564CE99499E8AFAFEFBC9A00' #TCP_KEEPINTVL - 'E8AEBEE7BDAE5443505F4B454550494E54564CE99499E8AFAFEFBC9A00'
- 'E8AEBEE7BDAE5443505F4B454550434E54E99499E8AFAFEFBC9A00' #TCP_KEEPCNT - 'E8AEBEE7BDAE5443505F4B454550434E54E99499E8AFAFEFBC9A00'
condition: and condition: and

View File

@ -1,9 +1,9 @@
id: malware_derkziel id: derkziel-malware
info: info:
name: Derkziel Malware Detector name: Derkziel Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://bhf.su/threads/137898/ - https://bhf.su/threads/137898/
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Derkziel.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Derkziel.yar
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- '{!}DRZ{!}' - '{!}DRZ{!}'
- 'User-Agent: Uploador' - 'User-Agent: Uploador'

View File

@ -1,9 +1,9 @@
id: malware_dexter id: dexter-malware
info: info:
name: Dexter Malware Detector name: Dexter Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Dexter.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Dexter.yar
- http://goo.gl/oBvy8b - http://goo.gl/oBvy8b
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'Java Security Plugin' - 'Java Security Plugin'
- '%s\\%s\\%s.exe' - '%s\\%s\\%s.exe'

View File

@ -1,9 +1,9 @@
id: malware_diamondfox id: diamondfox-malware
info: info:
name: DiamondFox Malware Detector name: DiamondFox Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_DiamondFox.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_DiamondFox.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'UPDATE_B' - 'UPDATE_B'
- 'UNISTALL_B' - 'UNISTALL_B'

View File

@ -1,9 +1,9 @@
id: malware_dmalocker id: dmalocker-malware
info: info:
name: DMA Locker Malware Detector name: DMA Locker Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_DMALocker.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_DMALocker.yar
tags: malware,file tags: malware,file
@ -18,4 +18,5 @@ file:
- "21444d414c4f434b" - "21444d414c4f434b"
- "21444d414c4f434b332e30" - "21444d414c4f434b332e30"
- "3F520000FFFFFFFF06000000524C4141" - "3F520000FFFFFFFF06000000524C4141"
- "21444d414c4f434b342e30" #v4 - "21444d414c4f434b342e30"
condition: or

View File

@ -1,9 +1,9 @@
id: malware_doublepulsar id: doublepulsar-malware
info: info:
name: DoublePulsar Malware Detector name: DoublePulsar Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_DoublePulsar_Petya.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_DoublePulsar_Petya.yar
tags: malware,file tags: malware,file
@ -14,5 +14,6 @@ file:
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "FD0C8C5CB8C424C5CCCCCC0EE8CC246BCCCCCC0F24CDCCCCCC275C9775BACDCCCCC3FE" #xor - "FD0C8C5CB8C424C5CCCCCC0EE8CC246BCCCCCC0F24CDCCCCCC275C9775BACDCCCCC3FE"
- "45208D938D928D918D90929391970F9F9E9D99844529844D20CCCDCCCC9B844503844514844549CC3333332477CCCCCC844549C43333332484CDCCCC844549DC333333844749CC333333844741" #dll - "45208D938D928D918D90929391970F9F9E9D99844529844D20CCCDCCCC9B844503844514844549CC3333332477CCCCCC844549C43333332484CDCCCC844549DC333333844749CC333333844741"
condition: or

View File

@ -1,9 +1,9 @@
id: malware_eicar id: eicar-malware
info: info:
name: Eicar Malware Detector name: Eicar Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Eicar.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Eicar.yar
tags: malware,file tags: malware,file
@ -13,5 +13,6 @@ file:
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*" - "X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"

View File

@ -1,9 +1,9 @@
id: malware_erebus id: erebus-malware
info: info:
name: Erebus Malware Detector name: Erebus Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Erebus.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Erebus.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "/{5f58d6f0-bb9c-46e2-a4da-8ebc746f24a5}//log.log" - "/{5f58d6f0-bb9c-46e2-a4da-8ebc746f24a5}//log.log"
- "EREBUS IS BEST." - "EREBUS IS BEST."

View File

@ -1,9 +1,9 @@
id: malware_ezcob id: ezcob-malware
info: info:
name: Ezcob Malware Detector name: Ezcob Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Ezcob.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Ezcob.yar
tags: malware,file tags: malware,file
@ -13,9 +13,11 @@ file:
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- '\x12F\x12F\x129\x12E\x12A\x12E\x12B\x12A\x12-\x127\x127\x128\x123\x12' - '\x12F\x12F\x129\x12E\x12A\x12E\x12B\x12A\x12-\x127\x127\x128\x123\x12'
- '\x121\x12D\x128\x123\x12B\x122\x12E\x128\x12-\x12B\x122\x123\x12D\x12' - '\x121\x12D\x128\x123\x12B\x122\x12E\x128\x12-\x12B\x122\x123\x12D\x12'
- 'Ezcob' - 'Ezcob'
- 'l\x12i\x12u\x122\x120\x121\x123\x120\x124\x121\x126' - 'l\x12i\x12u\x122\x120\x121\x123\x120\x124\x121\x126'
- '20110113144935' - '20110113144935'
condition: or

View File

@ -1,9 +1,9 @@
id: malware_fudcrypt id: fudcrypt-malware
info: info:
name: FUDCrypt Malware Detector name: FUDCrypt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/gigajew/FudCrypt/ - https://github.com/gigajew/FudCrypt/
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_FUDCrypt.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_FUDCrypt.yar
@ -15,6 +15,7 @@ file:
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'OcYjzPUtJkNbLOABqYvNbvhZf' - 'OcYjzPUtJkNbLOABqYvNbvhZf'
- 'gwiXxyIDDtoYzgMSRGMckRbJi' - 'gwiXxyIDDtoYzgMSRGMckRbJi'

View File

@ -1,9 +1,9 @@
id: malware_gafgyt_bash id: gafgyt-bash-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'PONG!' - 'PONG!'
- 'GETLOCALIP' - 'GETLOCALIP'

View File

@ -1,9 +1,9 @@
id: malware_gafgyt_generic id: gafgyt-generic-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "/bin/busybox;echo -e 'gayfgt'" - "/bin/busybox;echo -e 'gayfgt'"
- '/proc/net/route' - '/proc/net/route'

View File

@ -1,9 +1,9 @@
id: malware_gafgyt_hihi id: gafgyt-hihi-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'PING' - 'PING'
- 'PONG' - 'PONG'

View File

@ -1,9 +1,9 @@
id: malware_gafgyt_hoho id: gafgyt-hoho-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'PING' - 'PING'
- 'PRIVMSG' - 'PRIVMSG'

View File

@ -1,9 +1,9 @@
id: malware_gafgyt_jackmy id: gafgyt-jackmy-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'PING' - 'PING'
- 'PONG' - 'PONG'

View File

@ -1,9 +1,9 @@
id: malware_gafgyt_oh id: gafgyt-oh-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Oh Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'busyboxterrorist' - 'busyboxterrorist'
- 'BOGOMIPS' - 'BOGOMIPS'

View File

@ -1,9 +1,9 @@
id: malware_genome id: genome-malware
info: info:
name: Genome Malware Detector name: Genome Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Genome.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Genome.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'Attempting to create more than one keyboard::Monitor instance' - 'Attempting to create more than one keyboard::Monitor instance'
- '{Right windows}' - '{Right windows}'

View File

@ -1,9 +1,9 @@
id: malware_glass id: glass-malware
info: info:
name: Glass Malware Detector name: Glass Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Glass.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Glass.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "PostQuitMessage" - "PostQuitMessage"
- "pwlfnn10,gzg" - "pwlfnn10,gzg"

View File

@ -1,9 +1,9 @@
id: malware_glasses id: glasses-malware
info: info:
name: Glasses Malware Detector name: Glasses Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://citizenlab.ca/2013/02/apt1s-glasses-watching-a-human-rights-organization/ - https://citizenlab.ca/2013/02/apt1s-glasses-watching-a-human-rights-organization/
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Glasses.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Glasses.yar
@ -15,14 +15,15 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word #GlassesStrings - type: word
part: raw
words: words:
- 'thequickbrownfxjmpsvalzydg' - 'thequickbrownfxjmpsvalzydg'
- 'Mozilla/4.0 (compatible; Windows NT 5.1; MSIE 7.0; Trident/4.0; %s.%s)' - 'Mozilla/4.0 (compatible; Windows NT 5.1; MSIE 7.0; Trident/4.0; %s.%s)'
- '" target="NewRef"></a>' - '" target="NewRef"></a>'
condition: and condition: and
- type: binary #GlassesCode - type: binary
binary: binary:
- "B8ABAAAAAAF7E1D1EA8D04522BC8" - "B8ABAAAAAAF7E1D1EA8D04522BC8"
- "B856555555F7E98B4C241C8BC2C1E81F03D0493BCA" - "B856555555F7E98B4C241C8BC2C1E81F03D0493BCA"

View File

@ -1,9 +1,9 @@
id: malware_gozi id: gozi-malware
info: info:
name: Gozi Malware Detector name: Gozi Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html - https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gozi.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gozi.yar

View File

@ -1,9 +1,9 @@
id: malware_gpgqwerty id: gpgqwerty-malware
info: info:
name: GPGQwerty Malware Detector name: GPGQwerty Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_GPGQwerty.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_GPGQwerty.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "gpg.exe recipient qwerty -o" - "gpg.exe recipient qwerty -o"
- "%s%s.%d.qwerty" - "%s%s.%d.qwerty"

View File

@ -1,9 +1,9 @@
id: malware_greame id: greame-malware
info: info:
name: Greame Malware Detector name: Greame Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "EditSvr" - "EditSvr"
- "TLoader" - "TLoader"

View File

@ -1,9 +1,9 @@
id: malware_grozlex id: grozlex-malware
info: info:
name: Grozlex Malware Detector name: Grozlex Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html - https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Grozlex.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Grozlex.yar

View File

@ -1,9 +1,9 @@
id: malware_hawkeye id: hawkeye-malware
info: info:
name: HawkEye Malware Detector name: HawkEye Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "HawkEyeKeylogger" - "HawkEyeKeylogger"
- "099u787978786" - "099u787978786"

View File

@ -1,9 +1,9 @@
id: malware_imminent id: imminent-malware
info: info:
name: Imminent Malware Detector name: Imminent Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "DecodeProductKey" - "DecodeProductKey"
- "StartHTTPFlood" - "StartHTTPFlood"
@ -25,6 +26,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "<URL>k__BackingField" - "<URL>k__BackingField"
- "<RunHidden>k__BackingField" - "<RunHidden>k__BackingField"

View File

@ -1,9 +1,9 @@
id: malware_infinity id: infinity-malware
info: info:
name: Infinity Malware Detector name: Infinity Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "CRYPTPROTECT_PROMPTSTRUCT" - "CRYPTPROTECT_PROMPTSTRUCT"
- "discomouse" - "discomouse"

View File

@ -1,9 +1,9 @@
id: malware_insta11 id: insta11-malware
info: info:
name: Insta11 Malware Detector name: Insta11 Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Install11.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Install11.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'XTALKER7' - 'XTALKER7'
- 'Insta11 Microsoft' - 'Insta11 Microsoft'

View File

@ -1,9 +1,9 @@
id: malware_intel_virtualization id: intel-virtualization-malware
info: info:
name: Intel Virtualization Malware Detector name: Intel Virtualization Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Intel_Virtualization.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Intel_Virtualization.yar
tags: malware,file tags: malware,file
@ -22,7 +22,7 @@ file:
- '6863637574696C732E444C4C' - '6863637574696C732E444C4C'
condition: and condition: and
- type: binary # Dynamic dll (malicious) - type: binary
binary: binary:
- '483A5C466173745C506C756728686B636D64295C' - '483A5C466173745C506C756728686B636D64295C'
- '646C6C5C52656C656173655C48696A61636B446C6C2E706462' - '646C6C5C52656C656173655C48696A61636B446C6C2E706462'

View File

@ -1,9 +1,9 @@
id: malware_iotreaper id: iotreaper-malware
info: info:
name: IotReaper Malware Detector name: IotReaper Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_IotReaper.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_IotReaper.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- 'XTALKER7' - 'XTALKER7'
- 'Insta11 Microsoft' - 'Insta11 Microsoft'

View File

@ -1,9 +1,9 @@
id: malware_linux_aesddos id: linux-aesddos-malware
info: info:
name: Linux AESDDOS Malware Detector name: Linux AESDDOS Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483
@ -16,18 +16,21 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "3AES" - "3AES"
- "Hacker" - "Hacker"
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "3AES" - "3AES"
- "VERSONEX" - "VERSONEX"
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "VERSONEX" - "VERSONEX"
- "Hacker" - "Hacker"

View File

@ -1,9 +1,9 @@
id: malware_linux_billgates id: linux-billgates-malware
info: info:
name: Linux BillGates Malware Detector name: Linux BillGates Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3429 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3429
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "12CUpdateGates" - "12CUpdateGates"
- "11CUpdateBill" - "11CUpdateBill"

View File

@ -1,9 +1,9 @@
id: malware_linux_elknot id: linux-elknot-malware
info: info:
name: Linux Elknot Malware Detector name: Linux Elknot Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3099 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3099
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "ZN8CUtility7DeCryptEPciPKci" - "ZN8CUtility7DeCryptEPciPKci"
- "ZN13CThreadAttack5StartEP11CCmdMessage" - "ZN13CThreadAttack5StartEP11CCmdMessage"

View File

@ -1,9 +1,9 @@
id: malware_linux_mrblack id: linux-mrblack-malware
info: info:
name: Linux MrBlack Malware Detector name: Linux MrBlack Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "Mr.Black" - "Mr.Black"
- "VERS0NEX:%s|%d|%d|%s" - "VERS0NEX:%s|%d|%d|%s"

View File

@ -1,9 +1,9 @@
id: malware_linux_tsunami id: linux-tsunami-malware
info: info:
name: Linux Tsunami Malware Detector name: Linux Tsunami Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483
@ -15,6 +15,7 @@ file:
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "PRIVMSG %s :[STD]Hitting %s" - "PRIVMSG %s :[STD]Hitting %s"
- "NOTICE %s :TSUNAMI <target> <secs>" - "NOTICE %s :TSUNAMI <target> <secs>"

View File

@ -1,9 +1,9 @@
id: malware_locky id: locky-malware
info: info:
name: Locky Malware Detector name: Locky Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Locky.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Locky.yar
tags: malware,file tags: malware,file

View File

@ -1,9 +1,9 @@
id: malware_lostdoor id: lostdoor-malware
info: info:
name: LostDoor Malware Detector name: LostDoor Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "*mlt* = %" - "*mlt* = %"
- "*ip* = %" - "*ip* = %"

View File

@ -1,9 +1,9 @@
id: malware_luminositylink id: luminositylink-malware
info: info:
name: LuminosityLink Malware Detector name: LuminosityLink Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "SMARTLOGS" - "SMARTLOGS"
- "RUNPE" - "RUNPE"

View File

@ -1,9 +1,9 @@
id: malware_luxnet id: luxnet-malware
info: info:
name: LuxNet Malware Detector name: LuxNet Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "GetHashCode" - "GetHashCode"
- "Activator" - "Activator"

View File

@ -1,9 +1,9 @@
id: malware_macgyver_installer id: macgyver-installer-malware
info: info:
name: MacGyver.cap Installer Malware Detector name: MacGyver.cap Installer Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/fboldewin/MacGyver-s-return---An-EMV-Chip-cloning-case/blob/master/MacGyver's%20return%20-%20An%20EMV%20Chip%20cloning%20case.pdf - https://github.com/fboldewin/MacGyver-s-return---An-EMV-Chip-cloning-case/blob/master/MacGyver's%20return%20-%20An%20EMV%20Chip%20cloning%20case.pdf
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MacGyver.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MacGyver.yar
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "delete -AID 315041592e5359532e4444463031" - "delete -AID 315041592e5359532e4444463031"
- "install -file MacGyver.cap -nvDataLimit 1000 -instParam 00 -priv 4" - "install -file MacGyver.cap -nvDataLimit 1000 -instParam 00 -priv 4"

View File

@ -1,9 +1,9 @@
id: malware_macgyver id: macgyver-malware
info: info:
name: MacGyver.cap Malware Detector name: MacGyver.cap Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/fboldewin/MacGyver-s-return---An-EMV-Chip-cloning-case/blob/master/MacGyver's%20return%20-%20An%20EMV%20Chip%20cloning%20case.pdf - https://github.com/fboldewin/MacGyver-s-return---An-EMV-Chip-cloning-case/blob/master/MacGyver's%20return%20-%20An%20EMV%20Chip%20cloning%20case.pdf
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MacGyver.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MacGyver.yar
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "src/MacGyver/javacard/Header.cap" - "src/MacGyver/javacard/Header.cap"
- "src/MacGyver/javacard/Directory.cap" - "src/MacGyver/javacard/Directory.cap"

View File

@ -1,9 +1,9 @@
id: malware_madness id: madness-malware
info: info:
name: Madness DDOS Malware Detector name: Madness DDOS Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/arbor/yara/blob/master/madness.yara - https://github.com/arbor/yara/blob/master/madness.yara
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Madness.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Madness.yar
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNS4xOyBlbi1VUzsgcnY6MS44LjAuNSkgR2Vja28vMjAwNjA3MzEgRmlyZWZveC8xLjUuMC41IEZsb2NrLzAuNy40LjE" - "TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNS4xOyBlbi1VUzsgcnY6MS44LjAuNSkgR2Vja28vMjAwNjA3MzEgRmlyZWZveC8xLjUuMC41IEZsb2NrLzAuNy40LjE"
- "TW96aWxsYS81LjAgKFgxMTsgVTsgTGludXggMi40LjItMiBpNTg2OyBlbi1VUzsgbTE4KSBHZWNrby8yMDAxMDEzMSBOZXRzY2FwZTYvNi4wMQ==" - "TW96aWxsYS81LjAgKFgxMTsgVTsgTGludXggMi40LjItMiBpNTg2OyBlbi1VUzsgbTE4KSBHZWNrby8yMDAxMDEzMSBOZXRzY2FwZTYvNi4wMQ=="

View File

@ -1,9 +1,9 @@
id: malware_miner id: miner-malware
info: info:
name: Miner Malware Detector name: Miner Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_XMRIG_Miner.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_XMRIG_Miner.yar
tags: malware,file tags: malware,file
@ -13,6 +13,7 @@ file:
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "stratum+tcp" - "stratum+tcp"
- "stratum+udp" - "stratum+udp"

View File

@ -1,9 +1,9 @@
id: malware_miniasp3 id: miniasp3-malware
info: info:
name: MiniASP3 Malware Detector name: MiniASP3 Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MiniAsp3_mem.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MiniAsp3_mem.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "MiniAsp3\\Release\\MiniAsp.pdb" - "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/about.htm" - "http://%s/about.htm"
@ -22,6 +23,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "MiniAsp3\\Release\\MiniAsp.pdb" - "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/about.htm" - "http://%s/about.htm"
@ -30,6 +32,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "MiniAsp3\\Release\\MiniAsp.pdb" - "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/about.htm" - "http://%s/about.htm"
@ -38,6 +41,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "MiniAsp3\\Release\\MiniAsp.pdb" - "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/about.htm" - "http://%s/about.htm"
@ -46,6 +50,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "MiniAsp3\\Release\\MiniAsp.pdb" - "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/about.htm" - "http://%s/about.htm"

View File

@ -1,9 +1,9 @@
id: malware_naikon id: naikon-malware
info: info:
name: Naikon Malware Detector name: Naikon Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Naikon.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Naikon.yar
tags: malware,file tags: malware,file
@ -21,6 +21,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "NOKIAN95/WEB" - "NOKIAN95/WEB"
- "/tag=info&id=15" - "/tag=info&id=15"

View File

@ -1,9 +1,9 @@
id: malware_naspyupdate id: naspyupdate-malware
info: info:
name: nAspyUpdate Malware Detector name: nAspyUpdate Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Naspyupdate.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Naspyupdate.yar
tags: malware,file tags: malware,file
@ -18,6 +18,7 @@ file:
- "8A5424148A0132C202C28801414E75F4" - "8A5424148A0132C202C28801414E75F4"
- type: word - type: word
part: raw
words: words:
- "\\httpclient.txt" - "\\httpclient.txt"
- "password <=14" - "password <=14"

View File

@ -1,9 +1,9 @@
id: malware_notepad id: notepad-malware
info: info:
name: Notepad v1.1 Malware Detector name: Notepad v1.1 Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Notepad.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Notepad.yar
tags: malware,file tags: malware,file
@ -13,6 +13,7 @@ file:
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "75BAA77C842BE168B0F66C42C7885997" - "75BAA77C842BE168B0F66C42C7885997"
- "B523F63566F407F3834BCC54AAA32524" - "B523F63566F407F3834BCC54AAA32524"

View File

@ -1,9 +1,9 @@
id: malware_olyx id: olyx-malware
info: info:
name: Olyx Malware Detector name: Olyx Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Olyx.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Olyx.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "/Applications/Automator.app/Contents/MacOS/DockLight" - "/Applications/Automator.app/Contents/MacOS/DockLight"
condition: or condition: or

View File

@ -1,9 +1,9 @@
id: malware_osx_leverage id: osx-leverage-malware
info: info:
name: OSX Leverage Malware Detector name: OSX Leverage Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_OSX_Leverage.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_OSX_Leverage.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "ioreg -l | grep \"IOPlatformSerialNumber\" | awk -F" - "ioreg -l | grep \"IOPlatformSerialNumber\" | awk -F"
- "+:Users:Shared:UserEvent.app:Contents:MacOS:" - "+:Users:Shared:UserEvent.app:Contents:MacOS:"

View File

@ -1,9 +1,9 @@
id: malware_paradox id: paradox-malware
info: info:
name: Paradox Malware Detector name: Paradox Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "ParadoxRAT" - "ParadoxRAT"
- "Form1" - "Form1"

View File

@ -1,9 +1,9 @@
id: malware_plasma id: plasma-malware
info: info:
name: Plasma Malware Detector name: Plasma Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "Miner: Failed to Inject." - "Miner: Failed to Inject."
- "Started GPU Mining on:" - "Started GPU Mining on:"

View File

@ -1,9 +1,9 @@
id: malware_poetrat id: poetrat-malware
info: info:
name: PoetRat Malware Detector name: PoetRat Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_PoetRATDoc.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_PoetRATDoc.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "launcher.py" - "launcher.py"
- "smile.zip" - "smile.zip"

View File

@ -1,9 +1,9 @@
id: malware_pony id: pony-malware
info: info:
name: Pony Malware Detector name: Pony Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Pony.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Pony.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}" - "{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}"
- "YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0" - "YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0"

View File

@ -1,9 +1,9 @@
id: malware_pubsab id: pubsab-malware
info: info:
name: PubSab Malware Detector name: PubSab Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_PubSab.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_PubSab.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "_deamon_init" - "_deamon_init"
- "com.apple.PubSabAgent" - "com.apple.PubSabAgent"

View File

@ -1,9 +1,9 @@
id: malware_punisher id: punisher-malware
info: info:
name: Punisher Malware Detector name: Punisher Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "abccba" - "abccba"
- "SpyTheSpy" - "SpyTheSpy"

View File

@ -1,9 +1,9 @@
id: malware_pypi id: pypi-malware
info: info:
name: Fake PyPI Malware Detector name: Fake PyPI Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ - http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_PyPI.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_PyPI.yar
@ -13,9 +13,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "# Welcome Here! :)" - "# Welcome Here! :)"
- "# just toy, no harm :)" - "# just toy, no harm :)"

View File

@ -1,9 +1,9 @@
id: malware_pythorat id: pythorat-malware
info: info:
name: PythoRAT Malware Detector name: PythoRAT Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -11,9 +11,9 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "TKeylogger" - "TKeylogger"
- "uFileTransfer" - "uFileTransfer"

View File

@ -1,9 +1,9 @@
id: malware_qrat id: qrat-malware
info: info:
name: QRat Malware Detector name: QRat Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- "quaverse/crypter" - "quaverse/crypter"
- "Qrypt.class" - "Qrypt.class"
@ -22,6 +23,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "e-data" - "e-data"
- "Qrypt.class" - "Qrypt.class"
@ -38,6 +40,7 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "e-data" - "e-data"
- "quaverse/crypter" - "quaverse/crypter"

View File

@ -1,9 +1,9 @@
id: malware_satana_dropper id: satana-dropper-malware
info: info:
name: Satana Dropper Malware Detector name: Satana Dropper Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Satana.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Satana.yar
tags: malware,file tags: malware,file
@ -11,9 +11,8 @@ file:
- extensions: - extensions:
- all - all
matchers-condition: and
matchers: matchers:
- type: binary #Dropper - type: binary
binary: binary:
- "25732D547279457863657074" - "25732D547279457863657074"
- "643A5C6C626574776D77795C75696A657571706C667775622E706462" - "643A5C6C626574776D77795C75696A657571706C667775622E706462"

View File

@ -1,9 +1,9 @@
id: malware_satana id: satana-malware
info: info:
name: Satana Malware Detector name: Satana Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar
tags: malware,file tags: malware,file

View File

@ -1,9 +1,9 @@
id: malware_shimrat id: shimrat-malware
info: info:
name: ShimRat Malware Detector name: ShimRat Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar
tags: malware,file tags: malware,file
@ -14,6 +14,7 @@ file:
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
part: raw
words: words:
- ".dll" - ".dll"
- ".dat" - ".dat"
@ -22,12 +23,14 @@ file:
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "Data$$00" - "Data$$00"
- "Data$$01%c%sData" - "Data$$01%c%sData"
condition: and condition: and
- type: word - type: word
part: raw
words: words:
- "ping localhost -n 9 /c %s > nul" - "ping localhost -n 9 /c %s > nul"
- "Demo" - "Demo"

Some files were not shown because too many files have changed in this diff Show More