Skip to content

GIMMICK Malware Hash - Detect

ID: gimmick-malware-hash

Severity: info

Author: pussycat0x

Tags: malware,stormcloud

Detects the macOS port of the GIMMICK malware.

id: gimmick-malware-hash
info:
name: GIMMICK Malware Hash - Detect
author: pussycat0x
severity: info
description: Detects the macOS port of the GIMMICK malware.
reference:
- https://github.com/volexity/threat-intel/blob/main/2022/2022-03-22%20GIMMICK/indicators/yara.yar
tags: malware,stormcloud
file:
- extensions:
- all
matchers:
- type: dsl
dsl:
- "sha256(raw) == '2a9296ac999e78f6c0bee8aca8bfa4d4638aa30d9c8ccc65124b1cbfc9caab5f'"
# digest: 4a0a00473045022037e30718a18425c344961a80b3d4227206c4704ac0dcab83325af9065a14b5e2022100eb785b4840cdbc70e13f2c79bfddddd7e6009714a5c7fe714fb5ef2e6598a17b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/hash/gimmick-malware-hash.yaml"

View on Github