nuclei-templates/file/malware/shimratreporter-malware.yaml

31 lines
882 B
YAML
Raw Normal View History

2023-08-01 11:37:58 +00:00
id: shimratreporter-malware
2023-03-05 16:58:03 +00:00
info:
2023-03-09 18:14:31 +00:00
name: ShimRatReporter Malware - Detect
2023-03-05 16:58:03 +00:00
author: daffainfo
2023-08-01 09:54:35 +00:00
severity: info
2023-03-05 16:58:03 +00:00
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
2023-08-01 11:37:58 +00:00
part: raw
2023-03-05 16:58:03 +00:00
words:
- "IP-INFO"
- "Network-INFO"
- "OS-INFO"
- "Process-INFO"
- "Browser-INFO"
- "QueryUser-INFO"
- "Users-INFO"
- "Software-INFO"
- "%02X-%02X-%02X-%02X-%02X-%02X"
- "(from environment) = %s"
- "NetUserEnum"
- "GetNetworkParams"
condition: and
# digest: 4b0a004830460221008a0d2f7db3a9984378cf10f44fa78b4160a493e9e3b8bd7c6ae0ae600b0777cb022100b36b3c25e9b677e7c62fc45315d79df0f7157479630f3e871854cd7557538f54:922c64590222798bb761d5b6d8e72950