nuclei-templates/file/malware/powerware-malware.yaml

22 lines
671 B
YAML

id: powerware-malware
info:
name: PowerWare Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_powerware_locky.yara
tags: malware,file,powerware
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "ScriptRunner.dll"
- "ScriptRunner.pdb"
- "fixed.ps1"
condition: and
# digest: 4a0a0047304502202f84f482f615237f07e7c108cd61c226f08b6b515c6736d3e88fb43de8e7c025022100bcd4078138a73ac29b4c59b0b58365b09396c0db1a124c04fc08d86788f1e52a:922c64590222798bb761d5b6d8e72950