nuclei-templates/file/malware/xhide-malware.yaml

21 lines
590 B
YAML

id: xhide-malware
info:
name: xHide Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_XHide.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- 'XHide - Process Faker'
- 'Fakename: %s PidNum: %d'
condition: and
# digest: 4a0a00473045022100de21a884f48a0719bc4f2ee4ef7743dd573ac95eff672f1593fd0645dbd63cb5022027b0a93e2dcd4d005fbd53e222c2377c7aebf23269112986ecf201251c520856:922c64590222798bb761d5b6d8e72950