nuclei-templates/file/malware/aar-malware.yaml

26 lines
724 B
YAML

id: aar-malware
info:
name: AAR Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "Hashtable"
- "get_IsDisposed"
- "TripleDES"
- "testmemory.FRMMain.resources"
- "$this.Icon"
- "{11111-22222-20001-00001}"
- "@@@@@"
condition: and
# digest: 4b0a00483046022100c3a9a57d91e28a49a5e9b6b0d1cb748be88c636110c9eb9482a51fde9f35266d022100a6f13bde1916d01e42c6dca9544ffdb9fe475e393657f82d753701898621b765:922c64590222798bb761d5b6d8e72950