nuclei-templates/file/malware/luxnet-malware.yaml

25 lines
678 B
YAML

id: luxnet-malware
info:
name: LuxNet Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "GetHashCode"
- "Activator"
- "WebClient"
- "op_Equality"
- "dickcursor.cur"
- "{0}|{1}|{2}"
condition: and
# digest: 4a0a0047304502210091a15227939391bbbb1ff990efe1986b5cee3a1d222ef86e8d87c70d05cfa30e0220328b29c901b6de0f8c662a0c0ae3aa1948899b7ec24346c6679f1c9838b24e60:922c64590222798bb761d5b6d8e72950