Skip to content

LuminosityLink Malware - Detect

ID: luminositylink-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: luminositylink-malware
info:
name: LuminosityLink Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Ratdecoders.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "SMARTLOGS"
- "RUNPE"
- "b.Resources"
- "CLIENTINFO*"
- "Invalid Webcam Driver Download URL, or Failed to Download File!"
- "Proactive Anti-Malware has been manually activated!"
- "REMOVEGUARD"
- "C0n1f8"
- "Luminosity"
- "LuminosityCryptoMiner"
- "MANAGER*CLIENTDETAILS*"
condition: and
# digest: 4a0a0047304502204a4a13f286987fc00d74f81fe5149e1ef6b66a2e50253a430e7d7d49556aee1f022100a4b0be2c2fb741cca1179a1eed43aac447b46dc2017ba3c69258d1590c9b7546:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/luminositylink-malware.yaml"

View on Github