nuclei-templates/network/c2/xtremerat-trojan.yaml

31 lines
878 B
YAML

id: xtremerat-trojan
info:
name: XtremeRAT Trojan - Detect
author: pussycat0x
severity: info
description: |
Xtreme Rat is a Remote Access Trojan that can steal information. This RAT has been used in attacks targeting Israeli and Syrian governments last 2012.
reference:
- https://github.com/montysecurity/C2-Tracker/blob/main/tracker.py
metadata:
verified: true
max-request: 1
shodan-query: product:'XtremeRAT Trojan'
tags: network,c2,ir,osint,cti,xtreamerat
tcp:
- inputs:
- data: 2E
type: hex
host:
- "{{Hostname}}"
port: 10001
read-size: 1024
matchers:
- type: regex
regex:
- "^X$"
# digest: 4a0a0047304502206fa95ec595a2933ca08a0326dbce0d411afd01de4b65c0c060b9d1317264e96e022100a648393498fd3a99b1aec95f74372fc476d2e484933f438b68468bc6efa642d4:922c64590222798bb761d5b6d8e72950