Skip to content

PoetRat Malware - Detect

ID: poetrat-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: poetrat-malware
info:
name: PoetRat Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_PoetRATDoc.yar
tags: malware,file
file:
- extensions:
- all
matchers-condition: and
matchers:
- type: word
part: raw
words:
- "launcher.py"
- "smile.zip"
- "smile_funs.py"
- "frown.py"
- "backer.py"
- "smile.py"
- "affine.py"
- "cmd"
- ".exe"
condition: and
- type: regex
regex:
- '(\.py$|\.pyc$|\.pyd$|Python)'
- '\.dll'
condition: and
# digest: 490a00463044022073dcd784f9fc2dc7919634b0787270fd25b130a01886b68d893521dbc716f27602200cb0d58c7ae8453bba735bf79e3897f7762b11e275ad18ebf0223d44f2ce9953:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/poetrat-malware.yaml"

View on Github