Skip to content

AVBurner Malware Hash - Detect

ID: avburner-malware-hash

Severity: info

Author: pussycat0x

Tags: malware,snakecharmer

Detects AVBurner based on a combination of API calls used, hard-coded strings, and bytecode patterns

id: avburner-malware-hash
info:
name: AVBurner Malware Hash - Detect
author: pussycat0x
severity: info
description: Detects AVBurner based on a combination of API calls used, hard-coded strings, and bytecode patterns
reference:
- https://github.com/volexity/threat-intel/blob/main/2023/2023-03-07%20AVBurner/yara.yar
tags: malware,snakecharmer
file:
- extensions:
- all
matchers:
- type: dsl
dsl:
- "sha256(raw) == '4b1b1a1293ccd2c0fd51075de9376ebb55ab64972da785153fcb0a4eb523a5eb'"
# digest: 4a0a00473045022100865a9f8b4734867712b0381d1b772d7159c158079e6b470bb679ae136ac33e8d0220111e1eac92b7781a90d16681a260f65d2ab2e329975784211d011ccd7798ac34:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/hash/avburner-malware-hash.yaml"

View on Github