nuclei-templates/file/malware/shimrat-malware.yaml

44 lines
1.0 KiB
YAML
Raw Normal View History

2023-08-01 11:37:58 +00:00
id: shimrat-malware
2023-03-05 16:58:03 +00:00
info:
2023-03-09 18:14:31 +00:00
name: ShimRat Malware - Detect
2023-03-05 16:58:03 +00:00
author: daffainfo
2023-08-01 09:54:35 +00:00
severity: info
2023-03-05 16:58:03 +00:00
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
2023-08-01 09:54:35 +00:00
part: raw
2023-03-05 16:58:03 +00:00
words:
- ".dll"
- ".dat"
- "QWERTYUIOPLKJHG"
- "MNBVCXZLKJHGFDS"
condition: and
- type: word
2023-08-01 09:54:35 +00:00
part: raw
2023-03-05 16:58:03 +00:00
words:
- "Data$$00"
- "Data$$01%c%sData"
condition: and
- type: word
2023-08-01 09:54:35 +00:00
part: raw
2023-03-05 16:58:03 +00:00
words:
- "ping localhost -n 9 /c %s > nul"
- "Demo"
- "Win32App"
- "COMSPEC"
- "ShimMain"
- "NotifyShims"
- "GetHookAPIs"
2023-10-14 11:27:55 +00:00
condition: and
# digest: 4b0a004830460221009da26e19a00937b0d0349977f9fec211af3d556f9f893e2867131c0abd215ddf0221008601cdf41e002a97fba4584ad7e7c4df833a7b6f67cfa3bde6e2f3c5c87af44d:922c64590222798bb761d5b6d8e72950