Petya Malware (Variant 1) - Detect
ID: petya-malware-variant-1
Severity: info
Author: daffainfo
Tags: malware,file,petya
Description
Section titled “Description”YAML Source
Section titled “YAML Source”id: petya-malware-variant-1
info: name: Petya Malware (Variant 1) - Detect author: daffainfo severity: info reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/ransomware/windows/ransomware_windows_petya_variant_1.yara tags: malware,file,petyafile: - extensions: - all matchers: - type: word part: raw words: - "Ooops, your important files are encrypted." - "Send your Bitcoin wallet ID and personal installation key to e-mail" - "Send $300 worth of Bitcoin to following address:" - "have been encrypted. Perhaps you are busy looking for a way to recover your" - "need to do is submit the payment and purchase the decryption key." condition: or# digest: 490a0046304402207487595ce36b31173248f1cf96ff40ee329c7a55f6fb0190291726cce20bfdd2022021fa397c76ca7d71a178481094c9a24c8f342973b1cadbc4948429566c36f082:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "file/malware/petya-malware-variant-1.yaml"