nuclei-templates/file/malware/crimson-malware.yaml

24 lines
786 B
YAML
Raw Normal View History

2023-08-01 11:37:58 +00:00
id: crimson-malware
2023-03-05 16:58:03 +00:00
info:
2023-03-09 18:14:31 +00:00
name: Crimson Malware - Detect
2023-03-05 16:58:03 +00:00
author: daffainfo
2023-08-01 09:54:35 +00:00
severity: info
2023-03-05 16:58:03 +00:00
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Crimson.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
2023-08-01 09:54:35 +00:00
part: raw
2023-03-05 16:58:03 +00:00
words:
- "com/crimson/PK"
- "com/crimson/bootstrapJar/PK"
- "com/crimson/permaJarMulti/PermaJarReporter$1.classPK"
- "com/crimson/universal/containers/KeyloggerLog.classPK"
- "com/crimson/universal/UploadTransfer.classPK"
condition: and
# digest: 4a0a0047304502201aca2f60909bc78a6b817e7ec9f4cc6729f9c7bdebd09dd2a06424bd2e0d9cf9022100a46b5beb11bcdb8be397a0022dd14160bd17e8a8467b600daefd1c205f271319:922c64590222798bb761d5b6d8e72950