nuclei-malware/Yara-Rules/miner--malware.yaml

19 lines
375 B
YAML

id: miner-malware
info:
name: Miner Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_XMRIG_Miner.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "stratum+tcp"
- "stratum+udp"