42 lines
840 B
YAML
42 lines
840 B
YAML
|
id: shimrat-malware
|
||
|
|
||
|
info:
|
||
|
name: ShimRat Malware - Detect
|
||
|
author: daffainfo
|
||
|
severity: info
|
||
|
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar
|
||
|
tags: malware,file
|
||
|
|
||
|
file:
|
||
|
- extensions:
|
||
|
- all
|
||
|
|
||
|
matchers-condition: or
|
||
|
matchers:
|
||
|
- type: word
|
||
|
part: raw
|
||
|
words:
|
||
|
- ".dll"
|
||
|
- ".dat"
|
||
|
- "QWERTYUIOPLKJHG"
|
||
|
- "MNBVCXZLKJHGFDS"
|
||
|
condition: and
|
||
|
|
||
|
- type: word
|
||
|
part: raw
|
||
|
words:
|
||
|
- "Data$$00"
|
||
|
- "Data$$01%c%sData"
|
||
|
condition: and
|
||
|
|
||
|
- type: word
|
||
|
part: raw
|
||
|
words:
|
||
|
- "ping localhost -n 9 /c %s > nul"
|
||
|
- "Demo"
|
||
|
- "Win32App"
|
||
|
- "COMSPEC"
|
||
|
- "ShimMain"
|
||
|
- "NotifyShims"
|
||
|
- "GetHookAPIs"
|
||
|
condition: and
|