id: shimrat-malware info: name: ShimRat Malware - Detect author: daffainfo severity: info reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar tags: malware,file file: - extensions: - all matchers-condition: or matchers: - type: word part: raw words: - ".dll" - ".dat" - "QWERTYUIOPLKJHG" - "MNBVCXZLKJHGFDS" condition: and - type: word part: raw words: - "Data$$00" - "Data$$01%c%sData" condition: and - type: word part: raw words: - "ping localhost -n 9 /c %s > nul" - "Demo" - "Win32App" - "COMSPEC" - "ShimMain" - "NotifyShims" - "GetHookAPIs" condition: and