Skip to content

TidePool Malware Hash - Detect

ID: tidepool-malware-hash

Severity: info

Author: pussycat0x

Tags: malware,tidepool

Detects TidePool malware mentioned in Ke3chang report by Palo Alto Networks

id: tidepool-malware-hash
info:
name: TidePool Malware Hash - Detect
author: pussycat0x
severity: info
description: |
Detects TidePool malware mentioned in Ke3chang report by Palo Alto Networks
reference:
- http://goo.gl/m2CXWR
- https://github.com/Yara-Rules/rules/blob/master/malware/APT_Ke3Chang_TidePool.yar
tags: malware,tidepool
file:
- extensions:
- all
matchers:
- type: dsl
dsl:
- "sha256(raw) == '9d0a47bdf00f7bd332ddd4cf8d95dd11ebbb945dda3d72aac512512b48ad93ba'"
- "sha256(raw) == '67c4e8ab0f12fae7b4aeb66f7e59e286bd98d3a77e5a291e8d58b3cfbc1514ed'"
- "sha256(raw) == '2252dcd1b6afacde3f94d9557811bb769c4f0af3cb7a48ffe068d31bb7c30e18'"
- "sha256(raw) == '38f2c86041e0446730479cdb9c530298c0c4936722975c4e7446544fd6dcac9f'"
condition: or
# digest: 4a0a00473045022100b834f1f9d207445b8ac53b6be4c2829039133037004a2fb250deb01371d5d680022074f42bcdc3139b00878c5d974b002de8517aaafacd70796540900cc75356eda9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/hash/tidepool-malware-hash.yaml"

View on Github