Skip to content

bluelight Malware Hash - Detect

ID: bluelight-malware-hash

Severity: info

Author: pussycat0x

Tags: malware,inkysquid

North Korean origin malware which uses a custom Google App for C2 communications.

id: bluelight-malware-hash
info:
name: bluelight Malware Hash - Detect
author: pussycat0x
severity: info
description: North Korean origin malware which uses a custom Google App for C2 communications.
reference:
- https://github.com/volexity/threat-intel/blob/main/2021/2021-08-17%20-%20InkySquid%20Part%201/indicators/yara.yar
tags: malware,inkysquid
file:
- extensions:
- all
matchers:
- type: dsl
dsl:
- "sha256(raw) == '837eaf7b736583497afb8bbdb527f70577901eff04cc69d807983b233524bfed'"
- "sha256(raw) == '7c40019c1d4cef2ffdd1dd8f388aaba537440b1bffee41789c900122d075a86d'"
- "sha256(raw) == '94b71ee0861cc7cfbbae53ad2e411a76f296fd5684edf6b25ebe79bf6a2a600a'"
condition: or
# digest: 4b0a00483046022100851f3a17c1ccf314b9ad26d8a52300591c3cec578b9a25ccdc838316f664798a0221008bcb7873aad3e31ad6866ddf9a122042bde78f061654deb0bdfdd0521c627c79:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/hash/bluelight-malware-hash.yaml"

View on Github