feat: added BinaryAlert and restructure the repo

main
Muhammad Daffa 2023-08-08 00:32:42 +07:00
parent 597ea580a7
commit fbc13aeb4c
126 changed files with 3481 additions and 3074 deletions

View File

@ -0,0 +1,23 @@
id: basicrat-malware
info:
name: BasicRAT Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/multi/malware_multi_vesche_basicrat.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "HKCU Run registry key applied"
- "HKCU Run registry key failed"
- "Error, platform unsupported."
- "Persistence successful,"
- "Persistence unsuccessful,"
condition: and

View File

@ -0,0 +1,21 @@
id: cerber-malware
info:
name: Cerber Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_cerber_evasion.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "38oDr5.vbs"
- "8ivq.dll"
- "jmsctls_progress32"
condition: and

View File

@ -0,0 +1,28 @@
id: crunchrat-malware
info:
name: CrunchRAT Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/windows/malware_windows_t3ntman_crunchrat.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "<action>command<action>"
- "<action>upload<action>"
- "<action>download<action>"
- "cmd.exe"
- "application/x-www-form-urlencoded"
- "&action="
- "&secondary="
- "<secondary>"
- "<action>"
condition: and
case-insensitive: true

View File

@ -0,0 +1,23 @@
id: ransomware_windows_hydracrypt
info:
name: Hydracrypt Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_hydracrypt.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "oTraining"
- "Stop Training"
- "Play \"sound.wav\""
- "&Start Recording"
- "7About record"
condition: and

View File

@ -0,0 +1,38 @@
id: macos-bella-malware
info:
name: Bella Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/macos/malware_macos_bella.yara
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- "Verified! [2FV Enabled] Account ->"
- "There is no root shell to perform this command. See [rooter] manual entry."
- "Attempt to escalate Bella to root through a variety of attack vectors."
- "BELLA IS NOW RUNNING. CONNECT TO BELLA FROM THE CONTROL CENTER."
condition: or
- type: word
part: raw
words:
- "user_pass_phish"
- "bella_info"
- "get_root"
condition: and
- type: word
part: raw
words:
- "Please specify a bella server."
- "What port should Bella connect on [Default is 4545]:"
condition: and

View File

@ -0,0 +1,24 @@
id: petya-malware-variant-1
info:
name: Petya Malware (Variant 1) - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_petya_variant_1.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "Ooops, your important files are encrypted."
- "Send your Bitcoin wallet ID and personal installation key to e-mail"
- "wowsmith123456@posteo.net. Your personal installation key:"
- "Send $300 worth of Bitcoin to following address:"
- "have been encrypted. Perhaps you are busy looking for a way to recover your"
- "need to do is submit the payment and purchase the decryption key."
condition: or

View File

@ -0,0 +1,20 @@
id: petya-malware-variant-3
info:
name: Petya Malware (Variant 3) - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_petya_variant_3.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "wevtutil cl Setup & wevtutil cl System"
- "fsutil usn deletejournal /D %c:"
condition: or

View File

@ -0,0 +1,18 @@
id: petya-malware-variant-bitcoin
info:
name: Petya Malware (Variant Bitcoin) - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_petya_variant_bitcoin.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "MIIBCgKCAQEAxP/VqKc0yLe9JhVqFMQGwUITO6WpXWnKSNQAYT0O65Cr8PjIQInTeHkXEjfO2n2JmURWV/uHB0ZrlQ/wcYJBwLhQ9EqJ3iDqmN19Oo7NtyEUmbYmopcq+YLIBZzQ2ZTK0A2DtX4GRKxEEFLCy7vP12EYOPXknVy/+mf0JFWixz29QiTf5oLu15wVLONCuEibGaNNpgq+CXsPwfITDbDDmdrRIiUEUw6o3pt5pNOskfOJbMan2TZu6zfhzuts7KafP5UA8/0Hmf5K3/F9Mf9SE68EZjK+cIiFlKeWndP0XfRCYXI9AJYCeaOu7CXF6U0AVNnNjvLeOn42LHFUK4o6JwIDAQAB"

View File

@ -0,0 +1,29 @@
id: pony-stealer-malware
info:
name: Windows Pony Stealer Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/windows/malware_windows_pony_stealer.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "signons.sqlite"
- "signons.txt"
- "signons2.txt"
- "signons3.txt"
- "WininetCacheCredentials"
- "moz_logins"
- "encryptedPassword"
- "FlashFXP"
- "BulletProof"
- "CuteFTP"
condition: and
case-insensitive: true

View File

@ -0,0 +1,21 @@
id: powerware-malware
info:
name: PowerWare Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_powerware_locky.yara
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "ScriptRunner.dll"
- "ScriptRunner.pdb"
- "fixed.ps1"
condition: and

View File

@ -0,0 +1,32 @@
id: wannacry-malware
info:
name: WannaCry Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_wannacry.yara
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- "msg/m_chinese"
- ".wnry"
- "attrib +h"
condition: and
- type: word
part: raw
words:
- "WNcry@2ol7"
- "iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com"
- "115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn"
- "12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw"
- "13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94"
condition: or

View File

@ -0,0 +1,34 @@
id: zrypt-malware
info:
name: Zcrypt Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_zcrypt.yara
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- "How to Buy Bitcoins"
- "ALL YOUR PERSONAL FILES ARE ENCRYPTED"
- "Click Here to Show Bitcoin Address"
- "MyEncrypter2.pdb"
condition: or
- type: word
part: raw
words:
- ".p7b"
- ".p7c"
- ".pdd"
- ".pef"
- ".pem"
- "How to decrypt files.html"
condition: and

42
LICENSE
View File

@ -1,21 +1,21 @@
MIT License MIT License
Copyright (c) 2023 Muhammad Daffa Copyright (c) 2023 Muhammad Daffa
Permission is hereby granted, free of charge, to any person obtaining a copy Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions: furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software. copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE. SOFTWARE.

265
README.md
View File

@ -1,251 +1,14 @@
# Nuclei Malware # Nuclei Malware
Template to detect some malware using nuclei Template to detect some malware using nuclei. Creating these nuclei templates based on previously made YARA rules and then converting them into nuclei template format
## Status Malware ### List of Repositories
I took the reference from [yara rules repository](https://github.com/Yara-Rules/rules/blob/master/malware/) and in this section is about the status of each rule whether it can be made into a nuclei template or not * [https://github.com/Yara-Rules/rules](https://github.com/daffainfo/nuclei-malware/tree/master/Yara-Rules)
* [https://github.com/airbnb/binaryalert/tree/master/rules/public](https://github.com/daffainfo/nuclei-malware/tree/master/BinaryAlert)
| Malware Yara Rules | Status |
| --- | --- | ### To-Do
| MALW_ATMPot | 🟥 Impossible | - [ ] Create a GitHub Actions workflow to detect the total number of templates in this repository
| MALW_ATM_HelloWorld | 🟥 Impossible | - [ ] Gives the status of whether the template is already in the nuclei-templates repo or not (In `STATUS.md`)
| MALW_AZORULT | 🟥 Impossible | - [ ] Create more nuclei templates using these repository
| MALW_AgentTesla | 🟨 Still possible but requires a lot of effort | - [x] https://github.com/airbnb/binaryalert/tree/master/rules/public
| MALW_AgentTesla_SMTP | 🟨 Still possible but requires a lot of effort | - [ ] https://github.com/reversinglabs/reversinglabs-yara-rules
| MALW_AlMashreq | 🟨 Still possible but requires a lot of effort | - [ ] etc.
| MALW_Alina | 🟩 Possible |
| MALW_Andromeda | 🟩 Possible |
| MALW_Arkei | 🟩 Possible |
| MALW_Athena | 🟨 Still possible but requires a lot of effort |
| MALW_Atmos | 🟥 Impossible |
| MALW_BackdoorSSH | 🟥 Impossible |
| MALW_Backoff | 🟩 Possible |
| MALW_Bangat | 🟥 Impossible |
| MALW_Batel | 🟥 Impossible |
| MALW_BlackRev | 🟨 Still possible but requires a lot of effort |
| MALW_BlackWorm | 🟩 Possible |
| MALW_Boouset | 🟥 Impossible |
| MALW_Bublik | 🟩 Possible |
| MALW_Buzus_Softpulse | 🟥 Impossible |
| MALW_CAP_HookExKeylogger | 🟨 Still possible but requires a lot of effort |
| MALW_Chicken | 🟨 Still possible but requires a lot of effort |
| MALW_Citadel | 🟥 Impossible |
| MALW_Cloaking | 🟥 Impossible |
| MALW_Cookies | 🟨 Still possible but requires a lot of effort |
| MALW_Corkow | 🟥 Impossible |
| MALW_Cxpid | 🟩 Possible |
| MALW_Cythosia | 🟩 Possible |
| MALW_DDoSTf | 🟩 Possible |
| MALW_Derkziel | 🟩 Possible |
| MALW_Dexter | 🟩 Possible |
| MALW_DiamondFox | 🟩 Possible |
| MALW_DirtJumper | 🟨 Still possible but requires a lot of effort |
| MALW_Eicar | 🟩 Possible |
| MALW_Elex | 🟥 Impossible |
| MALW_Elknot | 🟥 Impossible |
| MALW_Emotet | 🟥 Impossible |
| MALW_Empire | 🟥 Impossible |
| MALW_Enfal | 🟥 Impossible |
| MALW_Exploit_UAC_Elevators | 🟥 Impossible |
| MALW_Ezcob | 🟩 Possible |
| MALW_F0xy | 🟥 Impossible |
| MALW_FALLCHILL | 🟥 Impossible |
| MALW_FUDCrypt | 🟩 Possible |
| MALW_FakeM | 🟥 Impossible |
| MALW_Fareit | 🟥 Impossible |
| MALW_Favorite | 🟥 Impossible |
| MALW_Furtim | 🟥 Impossible |
| MALW_Gafgyt | 🟩 Possible |
| MALW_Genome | 🟩 Possible |
| MALW_Glasses | 🟩 Possible |
| MALW_Gozi | 🟩 Possible |
| MALW_Grozlex | 🟩 Possible |
| MALW_Hajime | 🟥 Impossible |
| MALW_Hsdfihdf_banking | 🟨 Still possible but requires a lot of effort |
| MALW_Httpsd_ELF | 🟥 Impossible |
| MALW_IMuler | 🟥 Impossible |
| MALW_IcedID | 🟥 Impossible |
| MALW_Iexpl0ree | 🟥 Impossible |
| MALW_Install11 | 🟩 Possible |
| MALW_Intel_Virtualization | 🟩 Possible |
| MALW_IotReaper | 🟩 Possible |
| MALW_Jolob_Backdoor | 🟩 Possible |
| MALW_KINS | 🟨 Still possible but requires a lot of effort |
| MALW_Kelihos | 🟩 Possible |
| MALW_KeyBase | 🟥 Impossible |
| MALW_Korlia | 🟥 Impossible |
| MALW_Korplug | 🟥 Impossible |
| MALW_Kovter | 🟩 Possible |
| MALW_Kraken | 🟥 Impossible |
| MALW_Kwampirs | 🟩 Possible |
| MALW_LURK0 | 🟥 Impossible |
| MALW_Lateral_Movement | 🟩 Possible |
| MALW_Lenovo_Superfish | 🟥 Impossible |
| MALW_LinuxBew | 🟩 Possible |
| MALW_LinuxHelios | 🟩 Possible |
| MALW_LinuxMoose | 🟥 Impossible |
| MALW_LostDoor | 🟩 Possible |
| MALW_LuaBot | 🟩 Possible |
| MALW_LuckyCat | 🟥 Impossible |
| MALW_MSILStealer | 🟩 Possible |
| MALW_MacControl | 🟥 Impossible |
| MALW_MacGyver | 🟩 Possible |
| MALW_Madness | 🟩 Possible |
| MALW_Magento_backend | 🟨 Still possible but requires a lot of effort |
| MALW_Magento_frontend | 🟨 Still possible but requires a lot of effort |
| MALW_Magento_suspicious | 🟥 Impossible |
| MALW_Mailers | 🟥 Impossible |
| MALW_MedusaHTTP_2019 | 🟨 Still possible but requires a lot of effort |
| MALW_Miancha | 🟥 Impossible |
| MALW_MiniAsp3_mem | 🟨 Still possible but requires a lot of effort |
| MALW_Mirai | 🟥 Impossible |
| MALW_Mirai_Okiru_ELF | 🟥 Impossible |
| MALW_Mirai_Satori_ELF | 🟥 Impossible |
| MALW_Miscelanea | 🟥 Impossible |
| MALW_Miscelanea_Linux | 🟨 Still possible but requires a lot of effort |
| MALW_Monero_Miner_installer | 🟩 Possible |
| MALW_NSFree | 🟩 Possible |
| MALW_Naikon | 🟨 Still possible but requires a lot of effort |
| MALW_Naspyupdate | 🟨 Still possible but requires a lot of effort |
| MALW_NetTraveler | 🟨 Still possible but requires a lot of effort |
| MALW_NionSpy | 🟥 Impossible |
| MALW_Notepad | 🟩 Possible |
| MALW_OSX_Leverage | 🟩 Possible |
| MALW_Odinaff | 🟥 Impossible |
| MALW_Olyx | 🟩 Possible |
| MALW_PE_sections | 🟥 Impossible |
| MALW_PittyTiger | 🟨 Still possible but requires a lot of effort |
| MALW_PolishBankRat | 🟥 Impossible |
| MALW_Ponmocup | 🟥 Impossible |
| MALW_Pony | 🟩 Possible |
| MALW_Predator | 🟥 Impossible |
| MALW_PubSab | 🟩 Possible |
| MALW_PurpleWave | 🟥 Impossible |
| MALW_PyPI | 🟩 Possible |
| MALW_Pyinstaller | 🟥 Impossible |
| MALW_Pyinstaller_OSX | 🟩 Possible |
| MALW_Quarian | 🟥 Impossible |
| MALW_Rebirth_Vulcan_ELF | 🟥 Impossible |
| MALW_Regsubdat | 🟥 Impossible |
| MALW_Rockloader | 🟥 Impossible |
| MALW_Rooter | 🟥 Impossible |
| MALW_Rovnix | 🟥 Impossible |
| MALW_Safenet | 🟩 Possible |
| MALW_Sakurel | 🟩 Possible |
| MALW_Sayad | 🟩 Possible |
| MALW_Scarhikn | 🟥 Impossible |
| MALW_Sendsafe | 🟨 Still possible but requires a lot of effort |
| MALW_Shamoon | 🟥 Impossible |
| MALW_Shifu | 🟥 Impossible |
| MALW_Skeleton | 🟥 Impossible |
| MALW_Spora | 🟩 Possible |
| MALW_Sqlite | 🟩 Possible |
| MALW_Stealer | 🟩 Possible |
| MALW_Surtr | 🟥 Impossible |
| MALW_T5000 | 🟩 Possible |
| MALW_TRITON_HATMAN | 🟥 Impossible |
| MALW_TRITON_ICS_FRAMEWORK | 🟥 Impossible |
| MALW_Tedroo | 🟩 Possible |
| MALW_Tinba | 🟥 Impossible |
| MALW_TinyShell_Backdoor_gen | 🟥 Impossible |
| MALW_Torte_ELF | 🟥 Impossible |
| MALW_TreasureHunt | 🟩 Possible |
| MALW_TrickBot | 🟩 Possible |
| MALW_Trumpbot | 🟩 Possible |
| MALW_Upatre | 🟥 Impossible |
| MALW_Urausy | 🟩 Possible |
| MALW_Vidgrab | 🟥 Impossible |
| MALW_Virut_FileInfector_UNK_VERSION | 🟥 Impossible |
| MALW_Volgmer | 🟥 Impossible |
| MALW_Wabot | 🟩 Possible |
| MALW_Warp | 🟩 Possible |
| MALW_Wimmie | 🟥 Impossible |
| MALW_XHide | 🟩 Possible |
| MALW_XMRIG_Miner | 🟩 Possible |
| MALW_XOR_DDos | 🟩 Possible |
| MALW_Yayih | 🟩 Possible |
| MALW_Yordanyan_ActiveAgent | 🟨 Still possible but requires a lot of effort |
| MALW_Zegost | 🟩 Possible |
| MALW_Zeus | 🟥 Impossible |
| MALW_adwind_RAT | 🟥 Impossible |
| MALW_hancitor | 🟨 Still possible but requires a lot of effort |
| MALW_kirbi_mimikatz | 🟥 Impossible |
| MALW_kpot | 🟨 Still possible but requires a lot of effort |
| MALW_marap | 🟨 Still possible but requires a lot of effort |
| MALW_shifu_shiz | 🟨 Still possible but requires a lot of effort |
| MALW_sitrof_fortis_scar | 🟨 Still possible but requires a lot of effort |
| MALW_viotto_keylogger | 🟥 Impossible |
| MALW_xDedic_marketplace | 🟥 Impossible |
| RANSOM_.CRYPTXXX.yar | 🟩 Possible |
| RANSOM_777.yar | 🟩 Possible |
| RANSOM_Alpha.yar | 🟩 Possible |
| RANSOM_BadRabbit.yar | 🟥 Impossible |
| RANSOM_Cerber.yar | 🟥 Impossible |
| RANSOM_Comodosec.yar | 🟨 Still possible but requires a lot of effort |
| RANSOM_Crypren.yar | 🟥 Impossible |
| RANSOM_CryptoNar.yar | 🟥 Impossible |
| RANSOM_Cryptolocker.yar | 🟨 Still possible but requires a lot of effort |
| RANSOM_DMALocker.yar | 🟩 Possible |
| RANSOM_DoublePulsar_Petya.yar | 🟩 Possible |
| RANSOM_Erebus.yar | 🟩 Possible |
| RANSOM_GPGQwerty.yar | 🟩 Possible |
| RANSOM_GoldenEye.yar | 🟥 Impossible |
| RANSOM_Locky.yar | 🟩 Possible |
| RANSOM_MS17-010_Wannacrypt.yar | 🟥 Impossible |
| RANSOM_Maze.yar | 🟥 Impossible |
| RANSOM_PetrWrap.yar | 🟥 Impossible |
| RANSOM_Petya.yar | 🟥 Impossible |
| RANSOM_Petya_MS17_010.yar | 🟥 Impossible |
| RANSOM_Pico.yar | 🟥 Impossible |
| RANSOM_Revix.yar | 🟥 Impossible |
| RANSOM_SamSam.yar | 🟥 Impossible |
| RANSOM_Satana.yar | 🟩 Possible |
| RANSOM_Shiva.yar | 🟥 Impossible |
| RANSOM_Sigma.yar | 🟩 Possible |
| RANSOM_Snake.yar | 🟩 Possible |
| RANSOM_Stampado.yar | 🟥 Impossible |
| RANSOM_TeslaCrypt.yar | 🟩 Possible |
| RANSOM_Tox.yar | 🟩 Possible |
| RANSOM_acroware.yar | 🟥 Impossible |
| RANSOM_jeff_dev.yar | 🟥 Impossible |
| RANSOM_locdoor.yar | 🟥 Impossible |
| RANSOM_screenlocker_5h311_1nj3c706.yar | 🟥 Impossible |
| RANSOM_shrug2.yar | 🟥 Impossible |
| RANSOM_termite.yar | 🟥 Impossible |
| RAT_Adwind.yar | 🟥 Impossible |
| RAT_Adzok.yar | 🟩 Possible |
| RAT_Asyncrat.yar | 🟥 Impossible |
| RAT_BlackShades.yar | 🟥 Impossible |
| RAT_Bolonyokte.yar | 🟥 Impossible |
| RAT_Bozok.yar | 🟩 Possible |
| RAT_Cerberus.yar | 🟩 Possible |
| RAT_Crimson.yar | 🟩 Possible |
| RAT_CrossRAT.yar | 🟥 Impossible |
| RAT_CyberGate.yar | 🟩 Possible |
| RAT_DarkComet.yar | 🟥 Impossible |
| RAT_FlyingKitten.yar | 🟥 Impossible |
| RAT_Gh0st.yar | 🟥 Impossible |
| RAT_Gholee.yar | 🟩 Possible |
| RAT_Glass.yar | 🟩 Possible |
| RAT_Havex.yar | 🟥 Impossible |
| RAT_Hizor.yar | 🟥 Impossible |
| RAT_Indetectables.yar | 🟥 Impossible |
| RAT_Inocnation.yar | 🟥 Impossible |
| RAT_Meterpreter_Reverse_Tcp.yar | 🟥 Impossible |
| RAT_Nanocore.yar | 🟥 Impossible |
| RAT_NetwiredRC.yar | 🟥 Impossible |
| RAT_Njrat.yar | 🟥 Impossible |
| RAT_Orcus.yar | 🟥 Impossible |
| RAT_PlugX.yar | 🟥 Impossible |
| RAT_PoetRATDoc.yar | 🟩 Possible |
| RAT_PoetRATPython.yar | 🟥 Impossible |
| RAT_PoisonIvy.yar | 🟥 Impossible |
| RAT_Ratdecoders.yar | 🟩 Possible |
| RAT_Sakula.yar | 🟥 Impossible |
| RAT_ShadowTech.yar | 🟩 Possible |
| RAT_Shim.yar | 🟩 Possible |
| RAT_Terminator.yar | 🟩 Possible |
| RAT_Xtreme.yar | 🟥 Impossible |
| RAT_ZoxPNG.yar | 🟩 Possible |
| RAT_jRAT.yar | 🟩 Possible |
| RAT_xRAT.yar | 🟩 Possible |
| RAT_xRAT20.yar | 🟥 Impossible |

279
STATUS.md Normal file
View File

@ -0,0 +1,279 @@
# List
* [https://github.com/Yara-Rules/rules](https://github.com/daffainfo/nuclei-malware/tree/master/Yara-Rules)
| Yara Rules | Status |
| --- | --- |
| MALW_ATMPot | 🟥 Impossible |
| MALW_ATM_HelloWorld | 🟥 Impossible |
| MALW_AZORULT | 🟥 Impossible |
| MALW_AgentTesla | 🟨 Still possible but requires a lot of effort |
| MALW_AgentTesla_SMTP | 🟨 Still possible but requires a lot of effort |
| MALW_AlMashreq | 🟨 Still possible but requires a lot of effort |
| MALW_Alina | 🟩 Possible |
| MALW_Andromeda | 🟩 Possible |
| MALW_Arkei | 🟩 Possible |
| MALW_Athena | 🟨 Still possible but requires a lot of effort |
| MALW_Atmos | 🟥 Impossible |
| MALW_BackdoorSSH | 🟥 Impossible |
| MALW_Backoff | 🟩 Possible |
| MALW_Bangat | 🟥 Impossible |
| MALW_Batel | 🟥 Impossible |
| MALW_BlackRev | 🟨 Still possible but requires a lot of effort |
| MALW_BlackWorm | 🟩 Possible |
| MALW_Boouset | 🟥 Impossible |
| MALW_Bublik | 🟩 Possible |
| MALW_Buzus_Softpulse | 🟥 Impossible |
| MALW_CAP_HookExKeylogger | 🟨 Still possible but requires a lot of effort |
| MALW_Chicken | 🟨 Still possible but requires a lot of effort |
| MALW_Citadel | 🟥 Impossible |
| MALW_Cloaking | 🟥 Impossible |
| MALW_Cookies | 🟨 Still possible but requires a lot of effort |
| MALW_Corkow | 🟥 Impossible |
| MALW_Cxpid | 🟩 Possible |
| MALW_Cythosia | 🟩 Possible |
| MALW_DDoSTf | 🟩 Possible |
| MALW_Derkziel | 🟩 Possible |
| MALW_Dexter | 🟩 Possible |
| MALW_DiamondFox | 🟩 Possible |
| MALW_DirtJumper | 🟨 Still possible but requires a lot of effort |
| MALW_Eicar | 🟩 Possible |
| MALW_Elex | 🟥 Impossible |
| MALW_Elknot | 🟥 Impossible |
| MALW_Emotet | 🟥 Impossible |
| MALW_Empire | 🟥 Impossible |
| MALW_Enfal | 🟥 Impossible |
| MALW_Exploit_UAC_Elevators | 🟥 Impossible |
| MALW_Ezcob | 🟩 Possible |
| MALW_F0xy | 🟥 Impossible |
| MALW_FALLCHILL | 🟥 Impossible |
| MALW_FUDCrypt | 🟩 Possible |
| MALW_FakeM | 🟥 Impossible |
| MALW_Fareit | 🟥 Impossible |
| MALW_Favorite | 🟥 Impossible |
| MALW_Furtim | 🟥 Impossible |
| MALW_Gafgyt | 🟩 Possible |
| MALW_Genome | 🟩 Possible |
| MALW_Glasses | 🟩 Possible |
| MALW_Gozi | 🟩 Possible |
| MALW_Grozlex | 🟩 Possible |
| MALW_Hajime | 🟥 Impossible |
| MALW_Hsdfihdf_banking | 🟨 Still possible but requires a lot of effort |
| MALW_Httpsd_ELF | 🟥 Impossible |
| MALW_IMuler | 🟥 Impossible |
| MALW_IcedID | 🟥 Impossible |
| MALW_Iexpl0ree | 🟥 Impossible |
| MALW_Install11 | 🟩 Possible |
| MALW_Intel_Virtualization | 🟩 Possible |
| MALW_IotReaper | 🟩 Possible |
| MALW_Jolob_Backdoor | 🟩 Possible |
| MALW_KINS | 🟨 Still possible but requires a lot of effort |
| MALW_Kelihos | 🟩 Possible |
| MALW_KeyBase | 🟥 Impossible |
| MALW_Korlia | 🟥 Impossible |
| MALW_Korplug | 🟥 Impossible |
| MALW_Kovter | 🟩 Possible |
| MALW_Kraken | 🟥 Impossible |
| MALW_Kwampirs | 🟩 Possible |
| MALW_LURK0 | 🟥 Impossible |
| MALW_Lateral_Movement | 🟩 Possible |
| MALW_Lenovo_Superfish | 🟥 Impossible |
| MALW_LinuxBew | 🟩 Possible |
| MALW_LinuxHelios | 🟩 Possible |
| MALW_LinuxMoose | 🟥 Impossible |
| MALW_LostDoor | 🟩 Possible |
| MALW_LuaBot | 🟩 Possible |
| MALW_LuckyCat | 🟥 Impossible |
| MALW_MSILStealer | 🟩 Possible |
| MALW_MacControl | 🟥 Impossible |
| MALW_MacGyver | 🟩 Possible |
| MALW_Madness | 🟩 Possible |
| MALW_Magento_backend | 🟨 Still possible but requires a lot of effort |
| MALW_Magento_frontend | 🟨 Still possible but requires a lot of effort |
| MALW_Magento_suspicious | 🟥 Impossible |
| MALW_Mailers | 🟥 Impossible |
| MALW_MedusaHTTP_2019 | 🟨 Still possible but requires a lot of effort |
| MALW_Miancha | 🟥 Impossible |
| MALW_MiniAsp3_mem | 🟨 Still possible but requires a lot of effort |
| MALW_Mirai | 🟥 Impossible |
| MALW_Mirai_Okiru_ELF | 🟥 Impossible |
| MALW_Mirai_Satori_ELF | 🟥 Impossible |
| MALW_Miscelanea | 🟥 Impossible |
| MALW_Miscelanea_Linux | 🟨 Still possible but requires a lot of effort |
| MALW_Monero_Miner_installer | 🟩 Possible |
| MALW_NSFree | 🟩 Possible |
| MALW_Naikon | 🟨 Still possible but requires a lot of effort |
| MALW_Naspyupdate | 🟨 Still possible but requires a lot of effort |
| MALW_NetTraveler | 🟨 Still possible but requires a lot of effort |
| MALW_NionSpy | 🟥 Impossible |
| MALW_Notepad | 🟩 Possible |
| MALW_OSX_Leverage | 🟩 Possible |
| MALW_Odinaff | 🟥 Impossible |
| MALW_Olyx | 🟩 Possible |
| MALW_PE_sections | 🟥 Impossible |
| MALW_PittyTiger | 🟨 Still possible but requires a lot of effort |
| MALW_PolishBankRat | 🟥 Impossible |
| MALW_Ponmocup | 🟥 Impossible |
| MALW_Pony | 🟩 Possible |
| MALW_Predator | 🟥 Impossible |
| MALW_PubSab | 🟩 Possible |
| MALW_PurpleWave | 🟥 Impossible |
| MALW_PyPI | 🟩 Possible |
| MALW_Pyinstaller | 🟥 Impossible |
| MALW_Pyinstaller_OSX | 🟩 Possible |
| MALW_Quarian | 🟥 Impossible |
| MALW_Rebirth_Vulcan_ELF | 🟥 Impossible |
| MALW_Regsubdat | 🟥 Impossible |
| MALW_Rockloader | 🟥 Impossible |
| MALW_Rooter | 🟥 Impossible |
| MALW_Rovnix | 🟥 Impossible |
| MALW_Safenet | 🟩 Possible |
| MALW_Sakurel | 🟩 Possible |
| MALW_Sayad | 🟩 Possible |
| MALW_Scarhikn | 🟥 Impossible |
| MALW_Sendsafe | 🟨 Still possible but requires a lot of effort |
| MALW_Shamoon | 🟥 Impossible |
| MALW_Shifu | 🟥 Impossible |
| MALW_Skeleton | 🟥 Impossible |
| MALW_Spora | 🟩 Possible |
| MALW_Sqlite | 🟩 Possible |
| MALW_Stealer | 🟩 Possible |
| MALW_Surtr | 🟥 Impossible |
| MALW_T5000 | 🟩 Possible |
| MALW_TRITON_HATMAN | 🟥 Impossible |
| MALW_TRITON_ICS_FRAMEWORK | 🟥 Impossible |
| MALW_Tedroo | 🟩 Possible |
| MALW_Tinba | 🟥 Impossible |
| MALW_TinyShell_Backdoor_gen | 🟥 Impossible |
| MALW_Torte_ELF | 🟥 Impossible |
| MALW_TreasureHunt | 🟩 Possible |
| MALW_TrickBot | 🟩 Possible |
| MALW_Trumpbot | 🟩 Possible |
| MALW_Upatre | 🟥 Impossible |
| MALW_Urausy | 🟩 Possible |
| MALW_Vidgrab | 🟥 Impossible |
| MALW_Virut_FileInfector_UNK_VERSION | 🟥 Impossible |
| MALW_Volgmer | 🟥 Impossible |
| MALW_Wabot | 🟩 Possible |
| MALW_Warp | 🟩 Possible |
| MALW_Wimmie | 🟥 Impossible |
| MALW_XHide | 🟩 Possible |
| MALW_XMRIG_Miner | 🟩 Possible |
| MALW_XOR_DDos | 🟩 Possible |
| MALW_Yayih | 🟩 Possible |
| MALW_Yordanyan_ActiveAgent | 🟨 Still possible but requires a lot of effort |
| MALW_Zegost | 🟩 Possible |
| MALW_Zeus | 🟥 Impossible |
| MALW_adwind_RAT | 🟥 Impossible |
| MALW_hancitor | 🟨 Still possible but requires a lot of effort |
| MALW_kirbi_mimikatz | 🟥 Impossible |
| MALW_kpot | 🟨 Still possible but requires a lot of effort |
| MALW_marap | 🟨 Still possible but requires a lot of effort |
| MALW_shifu_shiz | 🟨 Still possible but requires a lot of effort |
| MALW_sitrof_fortis_scar | 🟨 Still possible but requires a lot of effort |
| MALW_viotto_keylogger | 🟥 Impossible |
| MALW_xDedic_marketplace | 🟥 Impossible |
| RANSOM_.CRYPTXXX.yar | 🟩 Possible |
| RANSOM_777.yar | 🟩 Possible |
| RANSOM_Alpha.yar | 🟩 Possible |
| RANSOM_BadRabbit.yar | 🟥 Impossible |
| RANSOM_Cerber.yar | 🟥 Impossible |
| RANSOM_Comodosec.yar | 🟨 Still possible but requires a lot of effort |
| RANSOM_Crypren.yar | 🟥 Impossible |
| RANSOM_CryptoNar.yar | 🟥 Impossible |
| RANSOM_Cryptolocker.yar | 🟨 Still possible but requires a lot of effort |
| RANSOM_DMALocker.yar | 🟩 Possible |
| RANSOM_DoublePulsar_Petya.yar | 🟩 Possible |
| RANSOM_Erebus.yar | 🟩 Possible |
| RANSOM_GPGQwerty.yar | 🟩 Possible |
| RANSOM_GoldenEye.yar | 🟥 Impossible |
| RANSOM_Locky.yar | 🟩 Possible |
| RANSOM_MS17-010_Wannacrypt.yar | 🟥 Impossible |
| RANSOM_Maze.yar | 🟥 Impossible |
| RANSOM_PetrWrap.yar | 🟥 Impossible |
| RANSOM_Petya.yar | 🟥 Impossible |
| RANSOM_Petya_MS17_010.yar | 🟥 Impossible |
| RANSOM_Pico.yar | 🟥 Impossible |
| RANSOM_Revix.yar | 🟥 Impossible |
| RANSOM_SamSam.yar | 🟥 Impossible |
| RANSOM_Satana.yar | 🟩 Possible |
| RANSOM_Shiva.yar | 🟥 Impossible |
| RANSOM_Sigma.yar | 🟩 Possible |
| RANSOM_Snake.yar | 🟩 Possible |
| RANSOM_Stampado.yar | 🟥 Impossible |
| RANSOM_TeslaCrypt.yar | 🟩 Possible |
| RANSOM_Tox.yar | 🟩 Possible |
| RANSOM_acroware.yar | 🟥 Impossible |
| RANSOM_jeff_dev.yar | 🟥 Impossible |
| RANSOM_locdoor.yar | 🟥 Impossible |
| RANSOM_screenlocker_5h311_1nj3c706.yar | 🟥 Impossible |
| RANSOM_shrug2.yar | 🟥 Impossible |
| RANSOM_termite.yar | 🟥 Impossible |
| RAT_Adwind.yar | 🟥 Impossible |
| RAT_Adzok.yar | 🟩 Possible |
| RAT_Asyncrat.yar | 🟥 Impossible |
| RAT_BlackShades.yar | 🟥 Impossible |
| RAT_Bolonyokte.yar | 🟥 Impossible |
| RAT_Bozok.yar | 🟩 Possible |
| RAT_Cerberus.yar | 🟩 Possible |
| RAT_Crimson.yar | 🟩 Possible |
| RAT_CrossRAT.yar | 🟥 Impossible |
| RAT_CyberGate.yar | 🟩 Possible |
| RAT_DarkComet.yar | 🟥 Impossible |
| RAT_FlyingKitten.yar | 🟥 Impossible |
| RAT_Gh0st.yar | 🟥 Impossible |
| RAT_Gholee.yar | 🟩 Possible |
| RAT_Glass.yar | 🟩 Possible |
| RAT_Havex.yar | 🟥 Impossible |
| RAT_Hizor.yar | 🟥 Impossible |
| RAT_Indetectables.yar | 🟥 Impossible |
| RAT_Inocnation.yar | 🟥 Impossible |
| RAT_Meterpreter_Reverse_Tcp.yar | 🟥 Impossible |
| RAT_Nanocore.yar | 🟥 Impossible |
| RAT_NetwiredRC.yar | 🟥 Impossible |
| RAT_Njrat.yar | 🟥 Impossible |
| RAT_Orcus.yar | 🟥 Impossible |
| RAT_PlugX.yar | 🟥 Impossible |
| RAT_PoetRATDoc.yar | 🟩 Possible |
| RAT_PoetRATPython.yar | 🟥 Impossible |
| RAT_PoisonIvy.yar | 🟥 Impossible |
| RAT_Ratdecoders.yar | 🟩 Possible |
| RAT_Sakula.yar | 🟥 Impossible |
| RAT_ShadowTech.yar | 🟩 Possible |
| RAT_Shim.yar | 🟩 Possible |
| RAT_Terminator.yar | 🟩 Possible |
| RAT_Xtreme.yar | 🟥 Impossible |
| RAT_ZoxPNG.yar | 🟩 Possible |
| RAT_jRAT.yar | 🟩 Possible |
| RAT_xRAT.yar | 🟩 Possible |
| RAT_xRAT20.yar | 🟥 Impossible |
* [https://github.com/airbnb/binaryalert/tree/master/rules/public](https://github.com/daffainfo/nuclei-malware/tree/master/BinaryAlert)
| Yara Rules | Status |
| --- | --- |
| malware_macos_apt_sofacy_xagent.yara | 🟥 Impossible |
| malware_macos_bella.yara | 🟩 Possible |
| malware_macos_macspy.yara | 🟥 Impossible |
| malware_macos_marten4n6_evilosx.yara | 🟨 Still possible but requires a lot of effort |
| malware_macos_neoneggplant_eggshell.yara | 🟨 Still possible but requires a lot of effort |
| malware_macos_proton_rat_generic.yara | 🟥 Impossible |
| malware_multi_pupy_rat.yara | 🟨 Still possible but requires a lot of effort |
| malware_multi_vesche_basicrat.yara | 🟩 Possible |
| malware_windows_apt_red_leaves_generic.yara | 🟨 Still possible but requires a lot of effort |
| malware_windows_pony_stealer.yara | 🟩 Possible |
| malware_windows_remcos_rat.yara | 🟨 Still possible but requires a lot of effort |
| malware_windows_t3ntman_crunchrat.yara | 🟩 Possible |
| malware_windows_xrat_quasarrat.yara | 🟨 Still possible but requires a lot of effort |
| ransomware_windows_HDDCryptorA.yara | 🟨 Still possible but requires a lot of effort |
| ransomware_windows_cerber_evasion.yara | 🟩 Possible |
| ransomware_windows_cryptolocker.yara | 🟨 Still possible but requires a lot of effort |
| ransomware_windows_hydracrypt.yara | 🟩 Possible |
| ransomware_windows_lazarus_wannacry.yara | 🟥 Impossible |
| ransomware_windows_petya_variant_1.yara | 🟩 Possible |
| ransomware_windows_petya_variant_2.yara | 🟨 Still possible but requires a lot of effort |
| ransomware_windows_petya_variant_3.yara | 🟩 Possible |
| ransomware_windows_petya_variant_bitcoin.yara | 🟩 Possible |
| ransomware_windows_powerware_locky.yara | 🟩 Possible |
| ransomware_windows_wannacry.yara | 🟩 Possible |
| ransomware_windows_zcrypt.yara | 🟩 Possible |

View File

@ -1,25 +1,25 @@
id: malware_aar id: aar-malware
info: info:
name: AAR Malware Detector name: AAR Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "Hashtable" - "Hashtable"
- "get_IsDisposed" - "get_IsDisposed"
- "TripleDES" - "TripleDES"
- "testmemory.FRMMain.resources" - "testmemory.FRMMain.resources"
- "$this.Icon" - "$this.Icon"
- "{11111-22222-20001-00001}" - "{11111-22222-20001-00001}"
- "@@@@@" - "@@@@@"
condition: and condition: and

View File

@ -1,102 +1,110 @@
id: malware_adzok id: adzok-malware
info: info:
name: Adzok Malware Detector name: Adzok Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Adzok.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Adzok.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "key.classPK" words:
- "svd$1.classPK" - "key.classPK"
- "svd$2.classPK" - "svd$1.classPK"
- "Mensaje.classPK" - "svd$2.classPK"
- "inic$ShutdownHook.class" - "Mensaje.classPK"
- "Uninstall.jarPK" - "inic$ShutdownHook.class"
- "resources/icono.pngPK" - "Uninstall.jarPK"
condition: and - "resources/icono.pngPK"
condition: and
- type: word
words: - type: word
- "config.xmlPK" part: raw
- "svd$1.classPK" words:
- "svd$2.classPK" - "config.xmlPK"
- "Mensaje.classPK" - "svd$1.classPK"
- "inic$ShutdownHook.class" - "svd$2.classPK"
- "Uninstall.jarPK" - "Mensaje.classPK"
- "resources/icono.pngPK" - "inic$ShutdownHook.class"
condition: and - "Uninstall.jarPK"
- "resources/icono.pngPK"
- type: word condition: and
words:
- "config.xmlPK" - type: word
- "key.classPK" part: raw
- "svd$1.classPK" words:
- "Mensaje.classPK" - "config.xmlPK"
- "inic$ShutdownHook.class" - "key.classPK"
- "Uninstall.jarPK" - "svd$1.classPK"
- "resources/icono.pngPK" - "Mensaje.classPK"
condition: and - "inic$ShutdownHook.class"
- "Uninstall.jarPK"
- type: word - "resources/icono.pngPK"
words: condition: and
- "config.xmlPK"
- "key.classPK" - type: word
- "svd$2.classPK" part: raw
- "Mensaje.classPK" words:
- "inic$ShutdownHook.class" - "config.xmlPK"
- "Uninstall.jarPK" - "key.classPK"
- "resources/icono.pngPK" - "svd$2.classPK"
condition: and - "Mensaje.classPK"
- "inic$ShutdownHook.class"
- type: word - "Uninstall.jarPK"
words: - "resources/icono.pngPK"
- "config.xmlPK" condition: and
- "key.classPK"
- "svd$1.classPK" - type: word
- "svd$2.classPK" part: raw
- "inic$ShutdownHook.class" words:
- "Uninstall.jarPK" - "config.xmlPK"
- "resources/icono.pngPK" - "key.classPK"
condition: and - "svd$1.classPK"
- "svd$2.classPK"
- type: word - "inic$ShutdownHook.class"
words: - "Uninstall.jarPK"
- "config.xmlPK" - "resources/icono.pngPK"
- "key.classPK" condition: and
- "svd$1.classPK"
- "svd$2.classPK" - type: word
- "Mensaje.classPK" part: raw
- "Uninstall.jarPK" words:
- "resources/icono.pngPK" - "config.xmlPK"
condition: and - "key.classPK"
- "svd$1.classPK"
- type: word - "svd$2.classPK"
words: - "Mensaje.classPK"
- "config.xmlPK" - "Uninstall.jarPK"
- "key.classPK" - "resources/icono.pngPK"
- "svd$1.classPK" condition: and
- "svd$2.classPK"
- "Mensaje.classPK" - type: word
- "inic$ShutdownHook.class" part: raw
- "Uninstall.jarPK" words:
condition: and - "config.xmlPK"
- "key.classPK"
- type: word - "svd$1.classPK"
words: - "svd$2.classPK"
- "config.xmlPK" - "Mensaje.classPK"
- "key.classPK" - "inic$ShutdownHook.class"
- "svd$1.classPK" - "Uninstall.jarPK"
- "svd$2.classPK" condition: and
- "Mensaje.classPK"
- "inic$ShutdownHook.class" - type: word
- "resources/icono.pngPK" part: raw
words:
- "config.xmlPK"
- "key.classPK"
- "svd$1.classPK"
- "svd$2.classPK"
- "Mensaje.classPK"
- "inic$ShutdownHook.class"
- "resources/icono.pngPK"
condition: and condition: and

View File

@ -1,20 +1,19 @@
id: malware_alfa id: alfa-malware
info: info:
name: Alfa Malware Detector name: Alfa Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Alpha.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Alpha.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: binary
- type: binary binary:
binary: - "8B0C9781E1FFFF000081F919040000740F81F9"
- "8B0C9781E1FFFF000081F919040000740F81F9" - "220400007407423BD07CE2EB02"
- "220400007407423BD07CE2EB02" condition: and
condition: and

View File

@ -1,25 +1,25 @@
id: malware_alienspy id: alienspy-malware
info: info:
name: AlienSpy Malware Detector name: AlienSpy Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "META-INF/MANIFEST.MF" - "META-INF/MANIFEST.MF"
- "ePK" - "ePK"
- "kPK" - "kPK"
- "config.ini" - "config.ini"
- "password.ini" - "password.ini"
- "stub/stub.dll" - "stub/stub.dll"
- "c.dat" - "c.dat"
condition: and condition: and

View File

@ -1,21 +1,21 @@
id: malware_alina id: alina-malware
info: info:
name: Alina Malware Detector name: Alina Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Alina.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Alina.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'Alina v1.0' - 'Alina v1.0'
- 'POST' - 'POST'
- '1[0-2])[0-9]' - '1[0-2])[0-9]'
condition: and condition: and

View File

@ -1,17 +1,17 @@
id: malware_alpha id: alpha-malware
info: info:
name: Alpha Malware Detector name: Alpha Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Alpha.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Alpha.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "520065006100640020004D0065002000280048006F00770020004400650063" - "520065006100640020004D0065002000280048006F00770020004400650063"

View File

@ -1,22 +1,23 @@
id: malware_andromeda id: andromeda-malware
info: info:
name: Andromeda Malware Detector name: Andromeda Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Andromeda.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Andromeda.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: part: raw
- 'hsk\\ehs\\dihviceh\\serhlsethntrohntcohurrehem\\chsyst' words:
- 'hsk\\ehs\\dihviceh\\serhlsethntrohntcohurrehem\\chsyst'
- type: binary
binary: - type: binary
binary:
- "1C1C1D03494746" - "1C1C1D03494746"

View File

@ -1,24 +1,24 @@
id: malware_ap0calypse id: ap0calypse-malware
info: info:
name: Ap0calypse Malware Detector name: Ap0calypse Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "Ap0calypse" - "Ap0calypse"
- "Sifre" - "Sifre"
- "MsgGoster" - "MsgGoster"
- "Baslik" - "Baslik"
- "Dosyalars" - "Dosyalars"
- "Injecsiyon" - "Injecsiyon"
condition: and condition: and

View File

@ -1,27 +1,28 @@
id: malware_arcom id: arcom-malware
info: info:
name: Arcom Malware Detector name: Arcom Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: part: raw
- "CVu3388fnek3W(3ij3fkp0930di" words:
- "ZINGAWI2" - "CVu3388fnek3W(3ij3fkp0930di"
- "clWebLightGoldenrodYellow" - "ZINGAWI2"
- "Ancestor for '%s' not found" - "clWebLightGoldenrodYellow"
- "Control-C hit" - "Ancestor for '%s' not found"
condition: and - "Control-C hit"
condition: and
- type: binary
binary: - type: binary
binary:
- "A3242521" - "A3242521"

View File

@ -1,23 +1,23 @@
id: malware_arkei id: arkei-malware
info: info:
name: Arkei Malware Detector name: Arkei Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Arkei.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Arkei.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'Arkei' - 'Arkei'
- '/server/gate' - '/server/gate'
- '/server/grubConfig' - '/server/grubConfig'
- '\\files\\' - '\\files\\'
- 'SQLite' - 'SQLite'
condition: and condition: and

View File

@ -1,21 +1,21 @@
id: malware_backoff id: backoff-malware
info: info:
name: Backoff Malware Detector name: Backoff Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Backoff.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Backoff.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- '&op=%d&id=%s&ui=%s&wv=%d&gr=%s&bv=%s' - '&op=%d&id=%s&ui=%s&wv=%d&gr=%s&bv=%s'
- '%s @ %s' - '%s @ %s'
- 'Upload KeyLogs' - 'Upload KeyLogs'
condition: and condition: and

View File

@ -1,28 +1,28 @@
id: malware_bandook id: bandook-malware
info: info:
name: Bandook Malware Detector name: Bandook Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "aaaaaa1|" - "aaaaaa1|"
- "aaaaaa2|" - "aaaaaa2|"
- "aaaaaa3|" - "aaaaaa3|"
- "aaaaaa4|" - "aaaaaa4|"
- "aaaaaa5|" - "aaaaaa5|"
- "%s%d.exe" - "%s%d.exe"
- "astalavista" - "astalavista"
- "givemecache" - "givemecache"
- "%s\\system32\\drivers\\blogs\\*" - "%s\\system32\\drivers\\blogs\\*"
- "bndk13me" - "bndk13me"
condition: and condition: and

View File

@ -1,23 +1,23 @@
id: malware_blacknix id: blacknix-malware
info: info:
name: BlackNix Malware Detector name: BlackNix Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "SETTINGS" - "SETTINGS"
- "Mark Adler" - "Mark Adler"
- "Random-Number-Here" - "Random-Number-Here"
- "RemoteShell" - "RemoteShell"
- "SystemInfo" - "SystemInfo"
condition: and condition: and

View File

@ -1,29 +1,29 @@
id: malware_blackworm id: blackworm-malware
info: info:
name: Blackworm Malware Detector name: Blackworm Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_BlackWorm.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_BlackWorm.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'm_ComputerObjectProvider' - 'm_ComputerObjectProvider'
- 'MyWebServices' - 'MyWebServices'
- 'get_ExecutablePath' - 'get_ExecutablePath'
- 'get_WebServices' - 'get_WebServices'
- 'My.WebServices' - 'My.WebServices'
- 'My.User' - 'My.User'
- 'm_UserObjectProvider' - 'm_UserObjectProvider'
- 'DelegateCallback' - 'DelegateCallback'
- 'TargetMethod' - 'TargetMethod'
- '000004b0' - '000004b0'
- 'Microsoft Corporation' - 'Microsoft Corporation'
condition: and condition: and

View File

@ -1,24 +1,24 @@
id: malware_bluebanana id: bluebanana-malware
info: info:
name: BlueBanana Malware Detector name: BlueBanana Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "META-INF" - "META-INF"
- "config.txt" - "config.txt"
- "a/a/a/a/f.class" - "a/a/a/a/f.class"
- "a/a/a/a/l.class" - "a/a/a/a/l.class"
- "a/a/a/b/q.class" - "a/a/a/b/q.class"
- "a/a/a/b/v.class" - "a/a/a/b/v.class"
condition: and condition: and

View File

@ -1,24 +1,24 @@
id: malware_bozok id: bozok-malware
info: info:
name: Bozok Malware Detector name: Bozok Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Bozok.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Bozok.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "getVer" - "getVer"
- "StartVNC" - "StartVNC"
- "SendCamList" - "SendCamList"
- "untPlugin" - "untPlugin"
- "gethostbyname" - "gethostbyname"
condition: and condition: and
case-insensitive: true case-insensitive: true

View File

@ -1,20 +1,19 @@
id: malware_bublik id: bublik-malware
info: info:
name: Bublik Malware Detector name: Bublik Malware Detector
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Bublik.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Bublik.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: binary
- type: binary binary:
binary: - '636F6E736F6C6173'
- '636F6E736F6C6173' - '636C556E00696E666F2E696E69'
- '636C556E00696E666F2E696E69'
condition: and condition: and

View File

@ -1,35 +1,38 @@
id: malware_cap_hookexkeylogger id: cap-hookexkeylogger-malware
info: info:
name: CAP HookExKeylogger Malware Detector name: CAP HookExKeylogger Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_CAP_HookExKeylogger.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_CAP_HookExKeylogger.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "SetWindowsHookEx" words:
- "WH_KEYBOARD_LL" - "SetWindowsHookEx"
condition: and - "WH_KEYBOARD_LL"
case-insensitive: true condition: and
case-insensitive: true
- type: word
words: - type: word
- "SetWindowsHookEx" part: raw
- "WH_KEYBOARD" words:
condition: and - "SetWindowsHookEx"
case-insensitive: true - "WH_KEYBOARD"
condition: and
- type: word case-insensitive: true
words:
- "WH_KEYBOARD" - type: word
- "WH_KEYBOARD_LL" part: raw
condition: and words:
- "WH_KEYBOARD"
- "WH_KEYBOARD_LL"
condition: and
case-insensitive: true case-insensitive: true

View File

@ -1,26 +1,28 @@
id: malware_cerberus id: cerberus-malware
info: info:
name: Cerberus Malware Detector name: Cerberus Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Cerberus.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Cerberus.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "Ypmw1Syv023QZD" words:
- "wZ2pla" - "Ypmw1Syv023QZD"
- "wBmpf3Pb7RJe" - "wZ2pla"
condition: or - "wBmpf3Pb7RJe"
condition: or
- type: word
words: - type: word
- "cerberus" part: raw
case-insensitive: true words:
- "cerberus"
case-insensitive: true

View File

@ -1,28 +1,29 @@
id: malware_clientmesh id: clientmesh-malware
info: info:
name: ClientMesh Malware Detector name: ClientMesh Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: part: raw
- "machinedetails" words:
- "MySettings" - "machinedetails"
- "sendftppasswords" - "MySettings"
- "sendbrowserpasswords" - "sendftppasswords"
- "arma2keyMass" - "sendbrowserpasswords"
- "keylogger" - "arma2keyMass"
condition: and - "keylogger"
condition: and
- type: binary
binary: - type: binary
binary:
- "0000000000000000007E" - "0000000000000000007E"

View File

@ -1,23 +1,23 @@
id: malware_crimson id: crimson-malware
info: info:
name: Crimson Malware Detector name: Crimson Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Crimson.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Crimson.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "com/crimson/PK" - "com/crimson/PK"
- "com/crimson/bootstrapJar/PK" - "com/crimson/bootstrapJar/PK"
- "com/crimson/permaJarMulti/PermaJarReporter$1.classPK" - "com/crimson/permaJarMulti/PermaJarReporter$1.classPK"
- "com/crimson/universal/containers/KeyloggerLog.classPK" - "com/crimson/universal/containers/KeyloggerLog.classPK"
- "com/crimson/universal/UploadTransfer.classPK" - "com/crimson/universal/UploadTransfer.classPK"
condition: and condition: and

View File

@ -1,20 +1,19 @@
id: malware_cryptxxx_dropper id: cryptxxx-dropper-malware
info: info:
name: CryptXXX Dropper Malware Detector name: CryptXXX Dropper Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: binary
- type: binary #Dropper binary:
binary: - "50653157584346765962486F35"
- "50653157584346765962486F35" - "43003A005C0042004900450052005C0051006D006B004E0052004C00460000"
- "43003A005C0042004900450052005C0051006D006B004E0052004C00460000"
condition: and condition: and

View File

@ -1,43 +1,42 @@
id: malware_cryptxxx id: cryptxxx-malware
info: info:
name: CryptXXX Malware Detector name: CryptXXX Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: binary
- type: binary binary:
binary: - "525947404A41595D52000000FFFFFFFF"
- "525947404A41595D52000000FFFFFFFF" - "0600000052594740405A0000FFFFFFFF"
- "0600000052594740405A0000FFFFFFFF" - "0A000000525C4B4D574D424B5C520000"
- "0A000000525C4B4D574D424B5C520000" - "FFFFFFFF0A000000525D575D5A4B4370"
- "FFFFFFFF0A000000525D575D5A4B4370" - "3F520000FFFFFFFF06000000524C4141"
- "3F520000FFFFFFFF06000000524C4141" - "5A520000FFFFFFFF0A000000525C4B4D"
- "5A520000FFFFFFFF0A000000525C4B4D" - "41584B5C57520000FFFFFFFF0E000000"
- "41584B5C57520000FFFFFFFF0E000000" - "522A5C4B4D574D424B204C4740520000"
- "522A5C4B4D574D424B204C4740520000" - "FFFFFFFF0A000000525E4B5C48424149"
- "FFFFFFFF0A000000525E4B5C48424149" - "5D520000FFFFFFFF05000000524B4847"
- "5D520000FFFFFFFF05000000524B4847" - "52000000FFFFFFFF0C000000524D4140"
- "52000000FFFFFFFF0C000000524D4140" - "48474920435D475200000000FFFFFFFF"
- "48474920435D475200000000FFFFFFFF" - "0A000000525E5C41495C4F703F520000"
- "0A000000525E5C41495C4F703F520000" - "FFFFFFFF0A000000525E5C41495C4F70"
- "FFFFFFFF0A000000525E5C41495C4F70" - "3C520000FFFFFFFF0800000052494141"
- "3C520000FFFFFFFF0800000052494141" - "49424B5200000000FFFFFFFF06000000"
- "49424B5200000000FFFFFFFF06000000" - "525A4B435E520000FFFFFFFF08000000"
- "525A4B435E520000FFFFFFFF08000000" - "52483A4C4D703F5200000000FFFFFFFF"
- "52483A4C4D703F5200000000FFFFFFFF" - "0A000000524F42425B5D4B703F520000"
- "0A000000524F42425B5D4B703F520000" - "FFFFFFFF0A000000525E5C41495C4F70"
- "FFFFFFFF0A000000525E5C41495C4F70" - "3F520000FFFFFFFF0A000000525E5C41"
- "3F520000FFFFFFFF0A000000525E5C41" - "495C4F703C520000FFFFFFFF09000000"
- "495C4F703C520000FFFFFFFF09000000" - "524F5E5E4A4F5A4F52000000FFFFFFFF"
- "524F5E5E4A4F5A4F52000000FFFFFFFF" - "0A000000525E5C41495C4F703D520000"
- "0A000000525E5C41495C4F703D520000" - "FFFFFFFF08000000525E5B4C42474D52"
- "FFFFFFFF08000000525E5B4C42474D52"
condition: and condition: and

View File

@ -1,26 +1,27 @@
id: malware_cxpid id: cxpid-malware
info: info:
name: Cxpid Malware Detector name: Cxpid Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Cxpid.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Cxpid.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word #cxpidStrings - type: word
words: part: raw
- '/cxpid/submit.php?SessionID=' words:
- '/cxgid/' - '/cxpid/submit.php?SessionID='
- 'E21BC52BEA2FEF26D005CF' - '/cxgid/'
- 'E21BC52BEA39E435C40CD8' - 'E21BC52BEA2FEF26D005CF'
- ' -,L-,O+,Q-,R-,Y-,S-' - 'E21BC52BEA39E435C40CD8'
- ' -,L-,O+,Q-,R-,Y-,S-'
- type: binary #cxpidCode
binary: - type: binary
binary:
- "558BECB9380400006A006A004975F9" - "558BECB9380400006A006A004975F9"

View File

@ -1,18 +1,18 @@
id: malware_cythosia id: cythosia-malware
info: info:
name: Cythosia Malware Detector name: Cythosia Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Cythosia.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Cythosia.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'HarvesterSocksBot.Properties.Resources' - 'HarvesterSocksBot.Properties.Resources'

View File

@ -1,25 +1,25 @@
id: malware_darkrat id: darkrat-malware
info: info:
name: DarkRAT Malware Detector name: DarkRAT Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "@1906dark1996coder@" - "@1906dark1996coder@"
- "SHEmptyRecycleBinA" - "SHEmptyRecycleBinA"
- "mciSendStringA" - "mciSendStringA"
- "add_Shutdown" - "add_Shutdown"
- "get_SaveMySettingsOnExit" - "get_SaveMySettingsOnExit"
- "get_SpecialDirectories" - "get_SpecialDirectories"
- "Client.My" - "Client.My"
condition: and condition: and

View File

@ -1,29 +1,30 @@
id: malware_ddostf id: ddostf-malware
info: info:
name: DDoSTf Malware Detector name: DDoSTf Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- http://blog.malwaremustdie.org/2016/01/mmd-0048-2016-ddostf-new-elf-windows.html - http://blog.malwaremustdie.org/2016/01/mmd-0048-2016-ddostf-new-elf-windows.html
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_DDoSTf.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_DDoSTf.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: part: raw
- 'ddos.tf' words:
- 'Accept-Language: zh' - 'ddos.tf'
- '%d Kb/bps|%d%%' - 'Accept-Language: zh'
condition: and - '%d Kb/bps|%d%%'
condition: and
- type: binary
binary: - type: binary
- 'E8AEBEE7BDAE5443505F4B454550494E54564CE99499E8AFAFEFBC9A00' #TCP_KEEPINTVL binary:
- 'E8AEBEE7BDAE5443505F4B454550434E54E99499E8AFAFEFBC9A00' #TCP_KEEPCNT - 'E8AEBEE7BDAE5443505F4B454550494E54564CE99499E8AFAFEFBC9A00'
- 'E8AEBEE7BDAE5443505F4B454550434E54E99499E8AFAFEFBC9A00'
condition: and condition: and

View File

@ -1,25 +1,25 @@
id: malware_derkziel id: derkziel-malware
info: info:
name: Derkziel Malware Detector name: Derkziel Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://bhf.su/threads/137898/ - https://bhf.su/threads/137898/
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Derkziel.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Derkziel.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- '{!}DRZ{!}' - '{!}DRZ{!}'
- 'User-Agent: Uploador' - 'User-Agent: Uploador'
- 'SteamAppData.vdf' - 'SteamAppData.vdf'
- 'loginusers.vdf' - 'loginusers.vdf'
- 'config.vdf' - 'config.vdf'
condition: and condition: and

View File

@ -1,24 +1,24 @@
id: malware_dexter id: dexter-malware
info: info:
name: Dexter Malware Detector name: Dexter Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Dexter.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Dexter.yar
- http://goo.gl/oBvy8b - http://goo.gl/oBvy8b
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'Java Security Plugin' - 'Java Security Plugin'
- '%s\\%s\\%s.exe' - '%s\\%s\\%s.exe'
- 'Sun Java Security Plugin' - 'Sun Java Security Plugin'
- '\\Internet Explorer\\iexplore.exe' - '\\Internet Explorer\\iexplore.exe'
condition: and condition: and

View File

@ -1,24 +1,24 @@
id: malware_diamondfox id: diamondfox-malware
info: info:
name: DiamondFox Malware Detector name: DiamondFox Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_DiamondFox.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_DiamondFox.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'UPDATE_B' - 'UPDATE_B'
- 'UNISTALL_B' - 'UNISTALL_B'
- 'S_PROTECT' - 'S_PROTECT'
- 'P_WALLET' - 'P_WALLET'
- 'GR_COMMAND' - 'GR_COMMAND'
- 'FTPUPLOAD' - 'FTPUPLOAD'
condition: and condition: and

View File

@ -1,21 +1,22 @@
id: malware_dmalocker id: dmalocker-malware
info: info:
name: DMA Locker Malware Detector name: DMA Locker Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_DMALocker.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_DMALocker.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "41424358595a3131" - "41424358595a3131"
- "21444d414c4f434b" - "21444d414c4f434b"
- "21444d414c4f434b332e30" - "21444d414c4f434b332e30"
- "3F520000FFFFFFFF06000000524C4141" - "3F520000FFFFFFFF06000000524C4141"
- "21444d414c4f434b342e30" #v4 - "21444d414c4f434b342e30"
condition: or

View File

@ -1,18 +1,19 @@
id: malware_doublepulsar id: doublepulsar-malware
info: info:
name: DoublePulsar Malware Detector name: DoublePulsar Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_DoublePulsar_Petya.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_DoublePulsar_Petya.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "FD0C8C5CB8C424C5CCCCCC0EE8CC246BCCCCCC0F24CDCCCCCC275C9775BACDCCCCC3FE" #xor - "FD0C8C5CB8C424C5CCCCCC0EE8CC246BCCCCCC0F24CDCCCCCC275C9775BACDCCCCC3FE"
- "45208D938D928D918D90929391970F9F9E9D99844529844D20CCCDCCCC9B844503844514844549CC3333332477CCCCCC844549C43333332484CDCCCC844549DC333333844749CC333333844741" #dll - "45208D938D928D918D90929391970F9F9E9D99844529844D20CCCDCCCC9B844503844514844549CC3333332477CCCCCC844549C43333332484CDCCCC844549DC333333844749CC333333844741"
condition: or

View File

@ -1,17 +1,18 @@
id: malware_eicar id: eicar-malware
info: info:
name: Eicar Malware Detector name: Eicar Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Eicar.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Eicar.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: word - type: word
words: part: raw
words:
- "X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*" - "X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"

View File

@ -1,20 +1,20 @@
id: malware_erebus id: erebus-malware
info: info:
name: Erebus Malware Detector name: Erebus Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Erebus.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Erebus.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "/{5f58d6f0-bb9c-46e2-a4da-8ebc746f24a5}//log.log" - "/{5f58d6f0-bb9c-46e2-a4da-8ebc746f24a5}//log.log"
- "EREBUS IS BEST." - "EREBUS IS BEST."
condition: and condition: and

View File

@ -1,21 +1,23 @@
id: malware_ezcob id: ezcob-malware
info: info:
name: Ezcob Malware Detector name: Ezcob Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Ezcob.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Ezcob.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: word - type: word
words: part: raw
- '\x12F\x12F\x129\x12E\x12A\x12E\x12B\x12A\x12-\x127\x127\x128\x123\x12' words:
- '\x121\x12D\x128\x123\x12B\x122\x12E\x128\x12-\x12B\x122\x123\x12D\x12' - '\x12F\x12F\x129\x12E\x12A\x12E\x12B\x12A\x12-\x127\x127\x128\x123\x12'
- 'Ezcob' - '\x121\x12D\x128\x123\x12B\x122\x12E\x128\x12-\x12B\x122\x123\x12D\x12'
- 'l\x12i\x12u\x122\x120\x121\x123\x120\x124\x121\x126' - 'Ezcob'
- '20110113144935' - 'l\x12i\x12u\x122\x120\x121\x123\x120\x124\x121\x126'
- '20110113144935'
condition: or

View File

@ -1,30 +1,31 @@
id: malware_fudcrypt id: fudcrypt-malware
info: info:
name: FUDCrypt Malware Detector name: FUDCrypt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/gigajew/FudCrypt/ - https://github.com/gigajew/FudCrypt/
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_FUDCrypt.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_FUDCrypt.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: word - type: word
words: part: raw
- 'OcYjzPUtJkNbLOABqYvNbvhZf' words:
- 'gwiXxyIDDtoYzgMSRGMckRbJi' - 'OcYjzPUtJkNbLOABqYvNbvhZf'
- 'BclWgISTcaGjnwrzSCIuKruKm' - 'gwiXxyIDDtoYzgMSRGMckRbJi'
- 'CJyUSiUNrIVbgksjxpAMUkAJJ' - 'BclWgISTcaGjnwrzSCIuKruKm'
- 'fAMVdoPUEyHEWdxQIEJPRYbEN' - 'CJyUSiUNrIVbgksjxpAMUkAJJ'
- 'CIGQUctdcUPqUjoucmcoffECY' - 'fAMVdoPUEyHEWdxQIEJPRYbEN'
- 'wcZfHOgetgAExzSoWFJFQdAyO' - 'CIGQUctdcUPqUjoucmcoffECY'
- 'DqYKDnIoLeZDWYlQWoxZnpfPR' - 'wcZfHOgetgAExzSoWFJFQdAyO'
- 'MkhMoOHCbGUMqtnRDJKnBYnOj' - 'DqYKDnIoLeZDWYlQWoxZnpfPR'
- 'sHEqLMGglkBAOIUfcSAgMvZfs' - 'MkhMoOHCbGUMqtnRDJKnBYnOj'
- 'JtZApJhbFAIFxzHLjjyEQvtgd' - 'sHEqLMGglkBAOIUfcSAgMvZfs'
- 'JtZApJhbFAIFxzHLjjyEQvtgd'
- 'IIQrSWZEMmoQIKGuxxwoTwXka' - 'IIQrSWZEMmoQIKGuxxwoTwXka'

View File

@ -1,22 +1,22 @@
id: malware_gafgyt_bash id: gafgyt-bash-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'PONG!' - 'PONG!'
- 'GETLOCALIP' - 'GETLOCALIP'
- 'HTTPFLOOD' - 'HTTPFLOOD'
- 'LUCKYLILDUDE' - 'LUCKYLILDUDE'
condition: and condition: and

View File

@ -1,22 +1,22 @@
id: malware_gafgyt_generic id: gafgyt-generic-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "/bin/busybox;echo -e 'gayfgt'" - "/bin/busybox;echo -e 'gayfgt'"
- '/proc/net/route' - '/proc/net/route'
- 'admin' - 'admin'
- 'root' - 'root'
condition: and condition: and

View File

@ -1,24 +1,24 @@
id: malware_gafgyt_hihi id: gafgyt-hihi-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'PING' - 'PING'
- 'PONG' - 'PONG'
- 'TELNET LOGIN CRACKED - %s:%s:%s' - 'TELNET LOGIN CRACKED - %s:%s:%s'
- 'ADVANCEDBOT' - 'ADVANCEDBOT'
- '46.166.185.92' - '46.166.185.92'
- 'LOLNOGTFO' - 'LOLNOGTFO'
condition: and condition: and

View File

@ -1,22 +1,22 @@
id: malware_gafgyt_hoho id: gafgyt-hoho-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'PING' - 'PING'
- 'PRIVMSG' - 'PRIVMSG'
- 'Remote IRC Bot' - 'Remote IRC Bot'
- '23.95.43.182' - '23.95.43.182'
condition: and condition: and

View File

@ -1,22 +1,22 @@
id: malware_gafgyt_jackmy id: gafgyt-jackmy-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'PING' - 'PING'
- 'PONG' - 'PONG'
- 'jackmy' - 'jackmy'
- '203.134.%d.%d' - '203.134.%d.%d'
condition: and condition: and

View File

@ -1,22 +1,22 @@
id: malware_gafgyt_oh id: gafgyt-oh-malware
info: info:
name: Gafgyt Malware Detector name: Gafgyt Oh Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gafgyt.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'busyboxterrorist' - 'busyboxterrorist'
- 'BOGOMIPS' - 'BOGOMIPS'
- '124.105.97.%d' - '124.105.97.%d'
- 'fucknet' - 'fucknet'
condition: and condition: and

View File

@ -1,21 +1,21 @@
id: malware_genome id: genome-malware
info: info:
name: Genome Malware Detector name: Genome Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Genome.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Genome.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- 'Attempting to create more than one keyboard::Monitor instance' - 'Attempting to create more than one keyboard::Monitor instance'
- '{Right windows}' - '{Right windows}'
- 'Access violation - no RTTI data!' - 'Access violation - no RTTI data!'
condition: and condition: and

View File

@ -1,22 +1,22 @@
id: malware_glass id: glass-malware
info: info:
name: Glass Malware Detector name: Glass Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Glass.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Glass.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "PostQuitMessage" - "PostQuitMessage"
- "pwlfnn10,gzg" - "pwlfnn10,gzg"
- "update.dll" - "update.dll"
- "_winver" - "_winver"
condition: and condition: and

View File

@ -1,29 +1,30 @@
id: malware_glasses id: glasses-malware
info: info:
name: Glasses Malware Detector name: Glasses Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://citizenlab.ca/2013/02/apt1s-glasses-watching-a-human-rights-organization/ - https://citizenlab.ca/2013/02/apt1s-glasses-watching-a-human-rights-organization/
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Glasses.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Glasses.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word #GlassesStrings - type: word
words: part: raw
- 'thequickbrownfxjmpsvalzydg' words:
- 'Mozilla/4.0 (compatible; Windows NT 5.1; MSIE 7.0; Trident/4.0; %s.%s)' - 'thequickbrownfxjmpsvalzydg'
- '" target="NewRef"></a>' - 'Mozilla/4.0 (compatible; Windows NT 5.1; MSIE 7.0; Trident/4.0; %s.%s)'
condition: and - '" target="NewRef"></a>'
condition: and
- type: binary #GlassesCode
binary: - type: binary
- "B8ABAAAAAAF7E1D1EA8D04522BC8" binary:
- "B856555555F7E98B4C241C8BC2C1E81F03D0493BCA" - "B8ABAAAAAAF7E1D1EA8D04522BC8"
- "B856555555F7E98B4C241C8BC2C1E81F03D0493BCA"
condition: or condition: or

View File

@ -1,19 +1,19 @@
id: malware_gozi id: gozi-malware
info: info:
name: Gozi Malware Detector name: Gozi Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html - https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gozi.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gozi.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "63006F006F006B006900650073002E00730071006C006900740065002D006A006F00750072006E0061006C0000004F504552412E45584500" - "63006F006F006B006900650073002E00730071006C006900740065002D006A006F00750072006E0061006C0000004F504552412E45584500"

View File

@ -1,22 +1,22 @@
id: malware_gpgqwerty id: gpgqwerty-malware
info: info:
name: GPGQwerty Malware Detector name: GPGQwerty Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_GPGQwerty.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_GPGQwerty.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "gpg.exe recipient qwerty -o" - "gpg.exe recipient qwerty -o"
- "%s%s.%d.qwerty" - "%s%s.%d.qwerty"
- "del /Q /F /S %s$recycle.bin" - "del /Q /F /S %s$recycle.bin"
- "cryz1@protonmail.com" - "cryz1@protonmail.com"
condition: and condition: and

View File

@ -1,30 +1,31 @@
id: malware_greame id: greame-malware
info: info:
name: Greame Malware Detector name: Greame Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: part: raw
- "EditSvr" words:
- "TLoader" - "EditSvr"
- "Stroks" - "TLoader"
- "Avenger by NhT" - "Stroks"
- "####@####" - "Avenger by NhT"
- "GREAME" - "####@####"
condition: and - "GREAME"
condition: and
- type: binary
binary: - type: binary
- "232323234023232323E8EEE9F9232323234023232323" binary:
- "232323234023232323FAFDF0EFF9232323234023232323" - "232323234023232323E8EEE9F9232323234023232323"
- "232323234023232323FAFDF0EFF9232323234023232323"
condition: and condition: and

View File

@ -1,19 +1,19 @@
id: malware_grozlex id: grozlex-malware
info: info:
name: Grozlex Malware Detector name: Grozlex Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html - https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Grozlex.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Grozlex.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "4C006F00670073002000610074007400610063006800650064002000620079002000690043006F007A0065006E" - "4C006F00670073002000610074007400610063006800650064002000620079002000690043006F007A0065006E"

View File

@ -1,27 +1,27 @@
id: malware_hawkeye id: hawkeye-malware
info: info:
name: HawkEye Malware Detector name: HawkEye Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "HawkEyeKeylogger" - "HawkEyeKeylogger"
- "099u787978786" - "099u787978786"
- "HawkEye_Keylogger" - "HawkEye_Keylogger"
- "holdermail.txt" - "holdermail.txt"
- "wallet.dat" - "wallet.dat"
- "Keylog Records" - "Keylog Records"
- "<!-- do not script -->" - "<!-- do not script -->"
- "\\pidloc.txt" - "\\pidloc.txt"
- "BSPLIT" - "BSPLIT"
condition: and condition: and

View File

@ -1,35 +1,37 @@
id: malware_imminent id: imminent-malware
info: info:
name: Imminent Malware Detector name: Imminent Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "DecodeProductKey" words:
- "StartHTTPFlood" - "DecodeProductKey"
- "CodeKey" - "StartHTTPFlood"
- "MESSAGEBOX" - "CodeKey"
- "GetFilezillaPasswords" - "MESSAGEBOX"
- "DataIn" - "GetFilezillaPasswords"
- "UDPzSockets" - "DataIn"
condition: and - "UDPzSockets"
condition: and
- type: word
words: - type: word
- "<URL>k__BackingField" part: raw
- "<RunHidden>k__BackingField" words:
- "DownloadAndExecute" - "<URL>k__BackingField"
- "england.png" - "<RunHidden>k__BackingField"
- "-CHECK & PING -n 2 127.0.0.1 & EXIT" - "DownloadAndExecute"
- "Showed Messagebox" - "england.png"
- "-CHECK & PING -n 2 127.0.0.1 & EXIT"
- "Showed Messagebox"
condition: and condition: and

View File

@ -1,26 +1,26 @@
id: malware_infinity id: infinity-malware
info: info:
name: Infinity Malware Detector name: Infinity Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "CRYPTPROTECT_PROMPTSTRUCT" - "CRYPTPROTECT_PROMPTSTRUCT"
- "discomouse" - "discomouse"
- "GetDeepInfo" - "GetDeepInfo"
- "AES_Encrypt" - "AES_Encrypt"
- "StartUDPFlood" - "StartUDPFlood"
- "BATScripting" - "BATScripting"
- "FBqINhRdpgnqATxJ.html" - "FBqINhRdpgnqATxJ.html"
- "magic_key" - "magic_key"
condition: and condition: and

View File

@ -1,27 +1,28 @@
id: malware_insta11 id: insta11-malware
info: info:
name: Insta11 Malware Detector name: Insta11 Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Install11.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Install11.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- 'XTALKER7' words:
- 'Insta11 Microsoft' - 'XTALKER7'
- 'wudMessage' - 'Insta11 Microsoft'
- 'ECD4FC4D-521C-11D0-B792-00A0C90312E1' - 'wudMessage'
- 'B12AE898-D056-4378-A844-6D393FE37956' - 'ECD4FC4D-521C-11D0-B792-00A0C90312E1'
condition: or - 'B12AE898-D056-4378-A844-6D393FE37956'
condition: or
- type: binary
binary: - type: binary
binary:
- 'E9000000006823040000' - 'E9000000006823040000'

View File

@ -1,29 +1,29 @@
id: malware_intel_virtualization id: intel-virtualization-malware
info: info:
name: Intel Virtualization Malware Detector name: Intel Virtualization Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Intel_Virtualization.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Intel_Virtualization.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: binary - type: binary
binary: binary:
- '4C6F6164535452494E47' - '4C6F6164535452494E47'
- '496E697469616C697A654B6579486F6F6B' - '496E697469616C697A654B6579486F6F6B'
- '46696E645265736F7572636573' - '46696E645265736F7572636573'
- '4C6F6164535452494E4746726F6D484B4355' - '4C6F6164535452494E4746726F6D484B4355'
- '6863637574696C732E444C4C' - '6863637574696C732E444C4C'
condition: and condition: and
- type: binary # Dynamic dll (malicious) - type: binary
binary: binary:
- '483A5C466173745C506C756728686B636D64295C' - '483A5C466173745C506C756728686B636D64295C'
- '646C6C5C52656C656173655C48696A61636B446C6C2E706462' - '646C6C5C52656C656173655C48696A61636B446C6C2E706462'
condition: and condition: and

View File

@ -1,27 +1,28 @@
id: malware_iotreaper id: iotreaper-malware
info: info:
name: IotReaper Malware Detector name: IotReaper Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_IotReaper.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_IotReaper.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- 'XTALKER7' words:
- 'Insta11 Microsoft' - 'XTALKER7'
- 'wudMessage' - 'Insta11 Microsoft'
- 'ECD4FC4D-521C-11D0-B792-00A0C90312E1' - 'wudMessage'
- 'B12AE898-D056-4378-A844-6D393FE37956' - 'ECD4FC4D-521C-11D0-B792-00A0C90312E1'
condition: or - 'B12AE898-D056-4378-A844-6D393FE37956'
condition: or
- type: binary
binary: - type: binary
binary:
- 'E9000000006823040000' - 'E9000000006823040000'

View File

@ -1,34 +1,37 @@
id: malware_linux_aesddos id: linux-aesddos-malware
info: info:
name: Linux AESDDOS Malware Detector name: Linux AESDDOS Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "3AES" words:
- "Hacker" - "3AES"
condition: and - "Hacker"
condition: and
- type: word
words: - type: word
- "3AES" part: raw
- "VERSONEX" words:
condition: and - "3AES"
- "VERSONEX"
- type: word condition: and
words:
- "VERSONEX" - type: word
- "Hacker" part: raw
condition: and words:
- "VERSONEX"
- "Hacker"
condition: and

View File

@ -1,22 +1,22 @@
id: malware_linux_billgates id: linux-billgates-malware
info: info:
name: Linux BillGates Malware Detector name: Linux BillGates Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3429 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3429
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "12CUpdateGates" - "12CUpdateGates"
- "11CUpdateBill" - "11CUpdateBill"
condition: and condition: and

View File

@ -1,22 +1,22 @@
id: malware_linux_elknot id: linux-elknot-malware
info: info:
name: Linux Elknot Malware Detector name: Linux Elknot Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3099 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3099
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "ZN8CUtility7DeCryptEPciPKci" - "ZN8CUtility7DeCryptEPciPKci"
- "ZN13CThreadAttack5StartEP11CCmdMessage" - "ZN13CThreadAttack5StartEP11CCmdMessage"
condition: and condition: and

View File

@ -1,22 +1,22 @@
id: malware_linux_mrblack id: linux-mrblack-malware
info: info:
name: Linux MrBlack Malware Detector name: Linux MrBlack Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "Mr.Black" - "Mr.Black"
- "VERS0NEX:%s|%d|%d|%s" - "VERS0NEX:%s|%d|%d|%s"
condition: and condition: and

View File

@ -1,21 +1,22 @@
id: malware_linux_tsunami id: linux-tsunami-malware
info: info:
name: Linux Tsunami Malware Detector name: Linux Tsunami Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Miscelanea_Linux.yar
- http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483 - http://www.kernelmode.info/forum/viewtopic.php?f=16&t=3483
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: word - type: word
words: part: raw
- "PRIVMSG %s :[STD]Hitting %s" words:
- "NOTICE %s :TSUNAMI <target> <secs>" - "PRIVMSG %s :[STD]Hitting %s"
- "NOTICE %s :I'm having a problem resolving my host, someone will have to SPOOFS me manually." - "NOTICE %s :TSUNAMI <target> <secs>"
- "NOTICE %s :I'm having a problem resolving my host, someone will have to SPOOFS me manually."

View File

@ -1,31 +1,31 @@
id: malware_locky id: locky-malware
info: info:
name: Locky Malware Detector name: Locky Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Locky.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Locky.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "45b899f7f90faf45b88945b8" - "45b899f7f90faf45b88945b8"
- "2b0a0faf4df8894df8c745" - "2b0a0faf4df8894df8c745"
condition: and condition: and
- type: binary - type: binary
binary: binary:
- "2E006C006F0063006B00790000" - "2E006C006F0063006B00790000"
- "005F004C006F0063006B007900" - "005F004C006F0063006B007900"
- "5F007200650063006F00760065" - "5F007200650063006F00760065"
- "0072005F0069006E0073007400" - "0072005F0069006E0073007400"
- "720075006300740069006F006E" - "720075006300740069006F006E"
- "0073002E0074007800740000" - "0073002E0074007800740000"
- "536F6674776172655C4C6F636B7900" - "536F6674776172655C4C6F636B7900"
condition: and condition: and

View File

@ -1,31 +1,32 @@
id: malware_lostdoor id: lostdoor-malware
info: info:
name: LostDoor Malware Detector name: LostDoor Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: part: raw
- "*mlt* = %" words:
- "*ip* = %" - "*mlt* = %"
- "*victimo* = %" - "*ip* = %"
- "*name* = %" - "*victimo* = %"
- "[START]" - "*name* = %"
- "[DATA]" - "[START]"
- "We Control Your Digital World" - "[DATA]"
- "RC4Initialize" - "We Control Your Digital World"
- "RC4Decrypt" - "RC4Initialize"
condition: and - "RC4Decrypt"
condition: and
- type: binary
binary: - type: binary
binary:
- "0D0A2A454449545F5345525645522A0D0A" - "0D0A2A454449545F5345525645522A0D0A"

View File

@ -1,29 +1,29 @@
id: malware_luminositylink id: luminositylink-malware
info: info:
name: LuminosityLink Malware Detector name: LuminosityLink Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "SMARTLOGS" - "SMARTLOGS"
- "RUNPE" - "RUNPE"
- "b.Resources" - "b.Resources"
- "CLIENTINFO*" - "CLIENTINFO*"
- "Invalid Webcam Driver Download URL, or Failed to Download File!" - "Invalid Webcam Driver Download URL, or Failed to Download File!"
- "Proactive Anti-Malware has been manually activated!" - "Proactive Anti-Malware has been manually activated!"
- "REMOVEGUARD" - "REMOVEGUARD"
- "C0n1f8" - "C0n1f8"
- "Luminosity" - "Luminosity"
- "LuminosityCryptoMiner" - "LuminosityCryptoMiner"
- "MANAGER*CLIENTDETAILS*" - "MANAGER*CLIENTDETAILS*"
condition: and condition: and

View File

@ -1,24 +1,24 @@
id: malware_luxnet id: luxnet-malware
info: info:
name: LuxNet Malware Detector name: LuxNet Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "GetHashCode" - "GetHashCode"
- "Activator" - "Activator"
- "WebClient" - "WebClient"
- "op_Equality" - "op_Equality"
- "dickcursor.cur" - "dickcursor.cur"
- "{0}|{1}|{2}" - "{0}|{1}|{2}"
condition: and condition: and

View File

@ -1,24 +1,24 @@
id: malware_macgyver_installer id: macgyver-installer-malware
info: info:
name: MacGyver.cap Installer Malware Detector name: MacGyver.cap Installer Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/fboldewin/MacGyver-s-return---An-EMV-Chip-cloning-case/blob/master/MacGyver's%20return%20-%20An%20EMV%20Chip%20cloning%20case.pdf - https://github.com/fboldewin/MacGyver-s-return---An-EMV-Chip-cloning-case/blob/master/MacGyver's%20return%20-%20An%20EMV%20Chip%20cloning%20case.pdf
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MacGyver.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MacGyver.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "delete -AID 315041592e5359532e4444463031" - "delete -AID 315041592e5359532e4444463031"
- "install -file MacGyver.cap -nvDataLimit 1000 -instParam 00 -priv 4" - "install -file MacGyver.cap -nvDataLimit 1000 -instParam 00 -priv 4"
- "-mac_key 404142434445464748494a4b4c4d4e4f" - "-mac_key 404142434445464748494a4b4c4d4e4f"
- "-enc_key 404142434445464748494a4b4c4d4e4f" - "-enc_key 404142434445464748494a4b4c4d4e4f"
condition: and condition: and

View File

@ -1,27 +1,27 @@
id: malware_macgyver id: macgyver-malware
info: info:
name: MacGyver.cap Malware Detector name: MacGyver.cap Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/fboldewin/MacGyver-s-return---An-EMV-Chip-cloning-case/blob/master/MacGyver's%20return%20-%20An%20EMV%20Chip%20cloning%20case.pdf - https://github.com/fboldewin/MacGyver-s-return---An-EMV-Chip-cloning-case/blob/master/MacGyver's%20return%20-%20An%20EMV%20Chip%20cloning%20case.pdf
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MacGyver.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MacGyver.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "src/MacGyver/javacard/Header.cap" - "src/MacGyver/javacard/Header.cap"
- "src/MacGyver/javacard/Directory.cap" - "src/MacGyver/javacard/Directory.cap"
- "src/MacGyver/javacard/Applet.cap" - "src/MacGyver/javacard/Applet.cap"
- "src/MacGyver/javacard/Import.cap" - "src/MacGyver/javacard/Import.cap"
- "src/MacGyver/javacard/ConstantPool.cap" - "src/MacGyver/javacard/ConstantPool.cap"
- "src/MacGyver/javacard/Class.cap" - "src/MacGyver/javacard/Class.cap"
- "src/MacGyver/javacard/Method.cap" - "src/MacGyver/javacard/Method.cap"
condition: and condition: and

View File

@ -1,28 +1,28 @@
id: malware_madness id: madness-malware
info: info:
name: Madness DDOS Malware Detector name: Madness DDOS Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- https://github.com/arbor/yara/blob/master/madness.yara - https://github.com/arbor/yara/blob/master/madness.yara
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Madness.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Madness.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNS4xOyBlbi1VUzsgcnY6MS44LjAuNSkgR2Vja28vMjAwNjA3MzEgRmlyZWZveC8xLjUuMC41IEZsb2NrLzAuNy40LjE" - "TW96aWxsYS81LjAgKFdpbmRvd3M7IFU7IFdpbmRvd3MgTlQgNS4xOyBlbi1VUzsgcnY6MS44LjAuNSkgR2Vja28vMjAwNjA3MzEgRmlyZWZveC8xLjUuMC41IEZsb2NrLzAuNy40LjE"
- "TW96aWxsYS81LjAgKFgxMTsgVTsgTGludXggMi40LjItMiBpNTg2OyBlbi1VUzsgbTE4KSBHZWNrby8yMDAxMDEzMSBOZXRzY2FwZTYvNi4wMQ==" - "TW96aWxsYS81LjAgKFgxMTsgVTsgTGludXggMi40LjItMiBpNTg2OyBlbi1VUzsgbTE4KSBHZWNrby8yMDAxMDEzMSBOZXRzY2FwZTYvNi4wMQ=="
- "document.cookie=" - "document.cookie="
- "[\"cookie\",\"" - "[\"cookie\",\""
- "\"realauth=" - "\"realauth="
- "\"location\"];" - "\"location\"];"
- "d3Rm" - "d3Rm"
- "ZXhl" - "ZXhl"
condition: and condition: and

View File

@ -1,18 +1,19 @@
id: malware_miner id: miner-malware
info: info:
name: Miner Malware Detector name: Miner Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_XMRIG_Miner.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_XMRIG_Miner.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: word - type: word
words: part: raw
- "stratum+tcp" words:
- "stratum+tcp"
- "stratum+udp" - "stratum+udp"

View File

@ -1,54 +1,59 @@
id: malware_miniasp3 id: miniasp3-malware
info: info:
name: MiniASP3 Malware Detector name: MiniASP3 Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MiniAsp3_mem.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_MiniAsp3_mem.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "MiniAsp3\\Release\\MiniAsp.pdb" words:
- "http://%s/about.htm" - "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/result_%s.htm" - "http://%s/about.htm"
- "open internet failed…" - "http://%s/result_%s.htm"
condition: and - "open internet failed…"
condition: and
- type: word
words: - type: word
- "MiniAsp3\\Release\\MiniAsp.pdb" part: raw
- "http://%s/about.htm" words:
- "http://%s/result_%s.htm" - "MiniAsp3\\Release\\MiniAsp.pdb"
- "run error!" - "http://%s/about.htm"
condition: and - "http://%s/result_%s.htm"
- "run error!"
- type: word condition: and
words:
- "MiniAsp3\\Release\\MiniAsp.pdb" - type: word
- "http://%s/about.htm" part: raw
- "http://%s/result_%s.htm" words:
- "run ok!" - "MiniAsp3\\Release\\MiniAsp.pdb"
condition: and - "http://%s/about.htm"
- "http://%s/result_%s.htm"
- type: word - "run ok!"
words: condition: and
- "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/about.htm" - type: word
- "http://%s/result_%s.htm" part: raw
- "time out,change to mode 0" words:
condition: and - "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/about.htm"
- type: word - "http://%s/result_%s.htm"
words: - "time out,change to mode 0"
- "MiniAsp3\\Release\\MiniAsp.pdb" condition: and
- "http://%s/about.htm"
- "http://%s/result_%s.htm" - type: word
- "command is null!" part: raw
condition: and words:
- "MiniAsp3\\Release\\MiniAsp.pdb"
- "http://%s/about.htm"
- "http://%s/result_%s.htm"
- "command is null!"
condition: and

View File

@ -1,30 +1,31 @@
id: malware_naikon id: naikon-malware
info: info:
name: Naikon Malware Detector name: Naikon Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Naikon.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Naikon.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "0FAFC1C1E01F" - "0FAFC1C1E01F"
- "355A010000" - "355A010000"
- "81C27F140600" - "81C27F140600"
condition: and condition: and
- type: word - type: word
words: part: raw
- "NOKIAN95/WEB" words:
- "/tag=info&id=15" - "NOKIAN95/WEB"
- "skg(3)=&3.2d_u1" - "/tag=info&id=15"
- "\\Temp\\iExplorer.exe" - "skg(3)=&3.2d_u1"
- "\\Temp\\\"TSG\"" - "\\Temp\\iExplorer.exe"
condition: or - "\\Temp\\\"TSG\""
condition: or

View File

@ -1,26 +1,27 @@
id: malware_naspyupdate id: naspyupdate-malware
info: info:
name: nAspyUpdate Malware Detector name: nAspyUpdate Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Naspyupdate.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Naspyupdate.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "8A5424148A0132C202C28801414E75F4" - "8A5424148A0132C202C28801414E75F4"
- type: word - type: word
words: part: raw
- "\\httpclient.txt" words:
- "password <=14" - "\\httpclient.txt"
- "/%ldn.txt" - "password <=14"
- "Kill You\x00" - "/%ldn.txt"
condition: or - "Kill You\x00"
condition: or

View File

@ -1,18 +1,19 @@
id: malware_notepad id: notepad-malware
info: info:
name: Notepad v1.1 Malware Detector name: Notepad v1.1 Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Notepad.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Notepad.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers: matchers:
- type: word - type: word
words: part: raw
- "75BAA77C842BE168B0F66C42C7885997" words:
- "75BAA77C842BE168B0F66C42C7885997"
- "B523F63566F407F3834BCC54AAA32524" - "B523F63566F407F3834BCC54AAA32524"

View File

@ -1,25 +1,26 @@
id: malware_olyx id: olyx-malware
info: info:
name: Olyx Malware Detector name: Olyx Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Olyx.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Olyx.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "/Applications/Automator.app/Contents/MacOS/DockLight" words:
condition: or - "/Applications/Automator.app/Contents/MacOS/DockLight"
condition: or
- type: binary
binary: - type: binary
- "C7400436363636C7400836363636" binary:
- "C740045C5C5C5CC740085C5C5C5C" - "C7400436363636C7400836363636"
condition: or - "C740045C5C5C5CC740085C5C5C5C"
condition: or

View File

@ -1,25 +1,25 @@
id: malware_osx_leverage id: osx-leverage-malware
info: info:
name: OSX Leverage Malware Detector name: OSX Leverage Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_OSX_Leverage.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_OSX_Leverage.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "ioreg -l | grep \"IOPlatformSerialNumber\" | awk -F" - "ioreg -l | grep \"IOPlatformSerialNumber\" | awk -F"
- "+:Users:Shared:UserEvent.app:Contents:MacOS:" - "+:Users:Shared:UserEvent.app:Contents:MacOS:"
- "rm '/Users/Shared/UserEvent.app/Contents/Resources/UserEvent.icns'" - "rm '/Users/Shared/UserEvent.app/Contents/Resources/UserEvent.icns'"
- "osascript -e 'tell application \"System Events\" to get the hidden of every login item'" - "osascript -e 'tell application \"System Events\" to get the hidden of every login item'"
- "osascript -e 'tell application \"System Events\" to get the name of every login item'" - "osascript -e 'tell application \"System Events\" to get the name of every login item'"
- "osascript -e 'tell application \"System Events\" to get the path of every login item'" - "osascript -e 'tell application \"System Events\" to get the path of every login item'"
- "serverVisible \x00" - "serverVisible \x00"
condition: and condition: and

View File

@ -1,25 +1,25 @@
id: malware_paradox id: paradox-malware
info: info:
name: Paradox Malware Detector name: Paradox Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "ParadoxRAT" - "ParadoxRAT"
- "Form1" - "Form1"
- "StartRMCam" - "StartRMCam"
- "Flooders" - "Flooders"
- "SlowLaris" - "SlowLaris"
- "SHITEMID" - "SHITEMID"
- "set_Remote_Chat" - "set_Remote_Chat"
condition: and condition: and

View File

@ -1,27 +1,27 @@
id: malware_plasma id: plasma-malware
info: info:
name: Plasma Malware Detector name: Plasma Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "Miner: Failed to Inject." - "Miner: Failed to Inject."
- "Started GPU Mining on:" - "Started GPU Mining on:"
- "BK: Hard Bot Killer Ran Successfully!" - "BK: Hard Bot Killer Ran Successfully!"
- "Uploaded Keylogs Successfully!" - "Uploaded Keylogs Successfully!"
- "No Slowloris Attack is Running!" - "No Slowloris Attack is Running!"
- "An ARME Attack is Already Running on" - "An ARME Attack is Already Running on"
- "Proactive Bot Killer Enabled!" - "Proactive Bot Killer Enabled!"
- "PlasmaRAT" - "PlasmaRAT"
- "AntiEverything" - "AntiEverything"
condition: and condition: and

View File

@ -1,33 +1,34 @@
id: malware_poetrat id: poetrat-malware
info: info:
name: PoetRat Malware Detector name: PoetRat Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_PoetRATDoc.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_PoetRATDoc.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: part: raw
- "launcher.py" words:
- "smile.zip" - "launcher.py"
- "smile_funs.py" - "smile.zip"
- "frown.py" - "smile_funs.py"
- "backer.py" - "frown.py"
- "smile.py" - "backer.py"
- "affine.py" - "smile.py"
- "cmd" - "affine.py"
- ".exe" - "cmd"
condition: and - ".exe"
condition: and
- type: regex
regex: - type: regex
- '(\.py$|\.pyc$|\.pyd$|Python)' regex:
- '\.dll' - '(\.py$|\.pyc$|\.pyd$|Python)'
- '\.dll'
condition: and condition: and

View File

@ -1,22 +1,22 @@
id: malware_pony id: pony-malware
info: info:
name: Pony Malware Detector name: Pony Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Pony.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Pony.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}" - "{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}"
- "YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0" - "YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0"
- "POST %s HTTP/1.0" - "POST %s HTTP/1.0"
- "Accept-Encoding: identity, *;q=0" - "Accept-Encoding: identity, *;q=0"
condition: and condition: and

View File

@ -1,25 +1,26 @@
id: malware_pubsab id: pubsab-malware
info: info:
name: PubSab Malware Detector name: PubSab Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_PubSab.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_PubSab.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "_deamon_init" words:
- "com.apple.PubSabAgent" - "_deamon_init"
- "/tmp/screen.jpeg" - "com.apple.PubSabAgent"
condition: or - "/tmp/screen.jpeg"
condition: or
- type: binary
binary: - type: binary
binary:
- "6B45E43789CA29C28955E4" - "6B45E43789CA29C28955E4"

View File

@ -1,29 +1,30 @@
id: malware_punisher id: punisher-malware
info: info:
name: Punisher Malware Detector name: Punisher Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: part: raw
- "abccba" words:
- "SpyTheSpy" - "abccba"
- "wireshark" - "SpyTheSpy"
- "apateDNS" - "wireshark"
- "abccbaDanabccb" - "apateDNS"
condition: and - "abccbaDanabccb"
condition: and
- type: binary
binary: - type: binary
- "5C006800660068002E007600620073" binary:
- "5C00730063002E007600620073" - "5C006800660068002E007600620073"
- "5C00730063002E007600620073"
condition: and condition: and

View File

@ -1,23 +1,23 @@
id: malware_pypi id: pypi-malware
info: info:
name: Fake PyPI Malware Detector name: Fake PyPI Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: reference:
- http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/ - http://www.nbu.gov.sk/skcsirt-sa-20170909-pypi/
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_PyPI.yar - https://github.com/Yara-Rules/rules/blob/master/malware/MALW_PyPI.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "# Welcome Here! :)" - "# Welcome Here! :)"
- "# just toy, no harm :)" - "# just toy, no harm :)"
- "[0x76,0x21,0xfe,0xcc,0xee]" - "[0x76,0x21,0xfe,0xcc,0xee]"
condition: and condition: and

View File

@ -1,26 +1,26 @@
id: malware_pythorat id: pythorat-malware
info: info:
name: PythoRAT Malware Detector name: PythoRAT Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: word
- type: word part: raw
words: words:
- "TKeylogger" - "TKeylogger"
- "uFileTransfer" - "uFileTransfer"
- "TTDownload" - "TTDownload"
- "SETTINGS" - "SETTINGS"
- "Unknown" - "Unknown"
- "#@#@#" - "#@#@#"
- "PluginData" - "PluginData"
- "OnPluginMessage" - "OnPluginMessage"
condition: and condition: and

View File

@ -1,46 +1,49 @@
id: malware_qrat id: qrat-malware
info: info:
name: QRat Malware Detector name: QRat Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: or matchers-condition: or
matchers: matchers:
- type: word - type: word
words: part: raw
- "quaverse/crypter" words:
- "Qrypt.class" - "quaverse/crypter"
- "Jarizer.class" - "Qrypt.class"
- "URLConnection.class" - "Jarizer.class"
condition: and - "URLConnection.class"
condition: and
- type: word
words: - type: word
- "e-data" part: raw
- "Qrypt.class" words:
- "Jarizer.class" - "e-data"
- "URLConnection.class" - "Qrypt.class"
condition: and - "Jarizer.class"
- "URLConnection.class"
- type: word condition: and
words:
- "e-data" - type: word
- "quaverse/crypter" words:
- "Jarizer.class" - "e-data"
- "URLConnection.class" - "quaverse/crypter"
condition: and - "Jarizer.class"
- "URLConnection.class"
- type: word condition: and
words:
- "e-data" - type: word
- "quaverse/crypter" part: raw
- "Qrypt.class" words:
- "URLConnection.class" - "e-data"
condition: and - "quaverse/crypter"
- "Qrypt.class"
- "URLConnection.class"
condition: and

View File

@ -1,21 +1,20 @@
id: malware_satana_dropper id: satana-dropper-malware
info: info:
name: Satana Dropper Malware Detector name: Satana Dropper Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Satana.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_Satana.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers:
matchers: - type: binary
- type: binary #Dropper binary:
binary: - "25732D547279457863657074"
- "25732D547279457863657074" - "643A5C6C626574776D77795C75696A657571706C667775622E706462"
- "643A5C6C626574776D77795C75696A657571706C667775622E706462" - "71666E7476746862"
- "71666E7476746862"
condition: and condition: and

View File

@ -1,28 +1,28 @@
id: malware_satana id: satana-malware
info: info:
name: Satana Malware Detector name: Satana Malware - Detect
author: daffainfo author: daffainfo
severity: critical severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar
tags: malware,file tags: malware,file
file: file:
- extensions: - extensions:
- all - all
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: binary - type: binary
binary: binary:
- "210073006100740061006E00610021002E0074007800740000" - "210073006100740061006E00610021002E0074007800740000"
- "456E756D4C6F63616C526573" - "456E756D4C6F63616C526573"
- "574E65744F70656E456E756D5700" - "574E65744F70656E456E756D5700"
- "21534154414E4121" - "21534154414E4121"
condition: and condition: and
- type: binary - type: binary
binary: binary:
- "7467777975677771" - "7467777975677771"
- "537776776E6775" - "537776776E6775"
condition: or condition: or

Some files were not shown because too many files have changed in this diff Show More