nuclei-templates/file/malware/hash/gimmick-malware-hash.yaml

19 lines
684 B
YAML
Raw Normal View History

2024-06-20 09:42:34 +00:00
id: gimmick-malware-hash
2024-06-19 10:13:35 +00:00
info:
2024-06-20 09:42:34 +00:00
name: GIMMICK Malware Hash - Detect
2024-06-19 10:13:35 +00:00
author: pussycat0x
severity: info
description: Detects the macOS port of the GIMMICK malware.
reference:
- https://github.com/volexity/threat-intel/blob/main/2022/2022-03-22%20GIMMICK/indicators/yara.yar
tags: malware,stormcloud
file:
- extensions:
- all
matchers:
- type: dsl
dsl:
- "sha256(raw) == '2a9296ac999e78f6c0bee8aca8bfa4d4638aa30d9c8ccc65124b1cbfc9caab5f'"
# digest: 4b0a004830460221009a442dbe1b3ff7ed49002fc578c8ad40e1c5a5855deaff427a05a0f1cd6ff4de022100953b763bcdad0701a73662bb7a3af2afa83bb5a161fc87762e19bea7b9293a24:922c64590222798bb761d5b6d8e72950