Skip to content

ShimRat Malware - Detect

ID: shimrat-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: shimrat-malware
info:
name: ShimRat Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar
tags: malware,file
file:
- extensions:
- all
matchers-condition: or
matchers:
- type: word
part: raw
words:
- ".dll"
- ".dat"
- "QWERTYUIOPLKJHG"
- "MNBVCXZLKJHGFDS"
condition: and
- type: word
part: raw
words:
- "Data$$00"
- "Data$$01%c%sData"
condition: and
- type: word
part: raw
words:
- "ping localhost -n 9 /c %s > nul"
- "Demo"
- "Win32App"
- "COMSPEC"
- "ShimMain"
- "NotifyShims"
- "GetHookAPIs"
condition: and
# digest: 4a0a0047304502200734d0070adc77b90bf9b94466d6c4b30e2ff7378e2872fa28de767b5fc2a6ce022100c09931d0cc7f242cdfac1cfef15ed9428c0fbd18a209d9566a467a69882b8178:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/shimrat-malware.yaml"

View on Github