Skip to content

Gozi Malware - Detect

ID: gozi-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: gozi-malware
info:
name: Gozi Malware - Detect
author: daffainfo
severity: info
reference:
- https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos.html
- https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Gozi.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: binary
binary:
- "63006F006F006B006900650073002E00730071006C006900740065002D006A006F00750072006E0061006C0000004F504552412E45584500"
# digest: 4a0a0047304502202b433c42179adfa95c7b5f536ba9c99b753f6e7a60ac68061289fbe417b4caba022100ccf28f27c5720857917f2c24a9dd6c5c32131035ea3b9f2a07d26c28686fa164:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/gozi-malware.yaml"

View on Github