Skip to content

CryptXXX Dropper Malware - Detect

ID: cryptxxx-dropper-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: cryptxxx-dropper-malware
info:
name: CryptXXX Dropper Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RANSOM_.CRYPTXXX.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: binary
binary:
- "50653157584346765962486F35"
- "43003A005C0042004900450052005C0051006D006B004E0052004C00460000"
condition: and
# digest: 490a00463044022049a25cfefa89e34e49c5831f8cc259f2f94c2c798c995ecb0eb365bede36848002203168742d76b356672dce84ff108dc028008e58bb1eb5442a0a062fbfffc4e4f9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/cryptxxx-dropper-malware.yaml"

View on Github