Skip to content

Hydracrypt Malware - Detect

ID: ransomware_windows_hydracrypt

Severity: info

Author: daffainfo

Tags: malware,file,hydracrypt

id: ransomware_windows_hydracrypt
info:
name: Hydracrypt Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_hydracrypt.yara
tags: malware,file,hydracrypt
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "oTraining"
- "Stop Training"
- "Play \"sound.wav\""
- "&Start Recording"
- "7About record"
condition: and
# digest: 490a00463044022000c84a49793d7fdf680467facfc1bfb2e189601d24c7ac5a6c1408c285472de602203b0cf6fd7ab92f5b11bc3306e0b6500b6a8366447f2520c3fbb05f856d7c33e8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/hydracrypt-malware.yaml"

View on Github