nuclei-templates/file/malware/hash/rokrat-malware-hash.yaml

21 lines
760 B
YAML

id: rokrat-malware-hash
info:
name: ROKRAT Loader Malware Hash- Detect
author: pussycat0x
severity: info
description: |
Designed to catch loader observed used with ROKRAT malware
reference:
- https://www.carbonblack.com/2018/02/27/threat-analysis-rokrat-malware/
- https://github.com/Yara-Rules/rules/blob/master/malware/APT_DPRK_ROKRAT.yar
tags: malware,taudprkapt
file:
- extensions:
- all
matchers:
- type: dsl
dsl:
- "sha256(raw) == 'e1546323dc746ed2f7a5c973dcecc79b014b68bdd8a6230239283b4f775f4bbd'"
# digest: 4a0a00473045022100cbca5cefa61b6acec8204a107a830aedaa9b77743dee62a6df116671697de095022019a1e5310e6a892e439ed9d62abdec4048b1a41302bce3e9a48b5a6b1a6b3e23:922c64590222798bb761d5b6d8e72950