Skip to content

Zegost Malware - Detect

ID: zeghost-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: zeghost-malware
info:
name: Zegost Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Zegost.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: binary
binary:
- '392F6633304C693575624F35444E414444784738733736327471593D'
- '00BADA2251426F6D6500'
condition: and
# digest: 4b0a004830460221009dc2cfd7d143e00af1bd649c88a4c15e41684cbd0f5a03aeb8e1a5dd551cc4a6022100aeb1e329d09a7b2e34d3f8e94042ce6a4b8d594b3d8cee2775cf39c188957df7:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/zeghost-malware.yaml"

View on Github