nuclei-malware/Yara-Rules/cerberus-malware.yaml

29 lines
569 B
YAML

id: cerberus-malware
info:
name: Cerberus Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Cerberus.yar
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- "Ypmw1Syv023QZD"
- "wZ2pla"
- "wBmpf3Pb7RJe"
condition: or
- type: word
part: raw
words:
- "cerberus"
case-insensitive: true