Skip to content

ShimRatReporter Malware - Detect

ID: shimratreporter-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: shimratreporter-malware
info:
name: ShimRatReporter Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Shim.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "IP-INFO"
- "Network-INFO"
- "OS-INFO"
- "Process-INFO"
- "Browser-INFO"
- "QueryUser-INFO"
- "Users-INFO"
- "Software-INFO"
- "%02X-%02X-%02X-%02X-%02X-%02X"
- "(from environment) = %s"
- "NetUserEnum"
- "GetNetworkParams"
condition: and
# digest: 490a00463044022029aeafd14f84b27dc4e43bebeff60e1be318e50c21c4c0ae3c8d8bd114a2a3a4022061b094a6e61ada5717180be3934de3a2bed78fc9a24eb776b63d2ab2ca6f0071:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/shimratreporter-malware.yaml"

View on Github