Skip to content

xHide Malware - Detect

ID: xhide-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: xhide-malware
info:
name: xHide Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_XHide.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- 'XHide - Process Faker'
- 'Fakename: %s PidNum: %d'
condition: and
# digest: 4a0a0047304502200e8d201589c85e810ed12db931220e35e3dea2e08a69aab05c865a1e5ac7d0cc02210097ad364378e00b522355c8dba5e4978ec563a57f8b5cafba23cfa6eb21c68c0b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/xhide-malware.yaml"

View on Github