EfsPotato has been observed in the wild in computer intrusions: https://pinboard.in/u:droberson/t:efspotato/ rule efspotato { meta: description = "EfsPotato privilege escalation exploit" reference = "https://github.com/zcgonvh/EfsPotato" strings: $efspotato = "EfsPotato" condition: uint16(0) == 0x5a4d and $efspotato } YARA Rules Index
Category: 100 days of Yara
100 Days of YARA – Day 42: ptrace
Find ELFs using ptrace with YARA.
100 Days of YARA – Day 41: nmap
For reasons similar to masscan, it is worth investigating if Nmap is discovered on an unexpected host. rule nmap { meta: description = "Nmap network scanner" reference = "https://nmap.org" strings: $ = "Usage: nmap [Scan Type(s)] [Options] {target specification}" condition: all of them } YARA Rules Index
100 Days of YARA – Day 40: masscan
Find masscan with YARA.
100 Days of YARA – Day 39: SilentMoon
Find Turla SilentMoon implants with YARA.
100 Days of YARA – Day 38: pupy
Pupy is yet another open-source RAT/C2 framework. Pupy is a cross-platform, multi function RAT and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple transports, migrate into processes using reflective injection, and load remote python code, python packages and python C-extensions …
100 Days of YARA – Day 37: PRISM
Find PRISM backdoors with YARA.
100 Days of YARA – Day 36: Sliver Adversary Emulation Framework
Find Sliver implants and servers with YARA.
100 Days of YARA – Day 35: nanomet
nanomet is another meterpreter stager, similar to TinyMet, written in C: https://github.com/kost/nanomet I have encountered this malware in real-life intrusions and at attack/defend CTFs. rule nanomet { meta: description = "https://github.com/kost/nanomet" strings: $a = "github.com/kost/nanomet" $b = "nanomet.exe" $c = "Available transports are as follows:" condition: all of them } YARA Rules Index
100 Days of YARA – Day 34: TinyMet
Find TinyMet with YARA.
100 Days of YARA – Day 33: Murmur Hash
Detect samples implementing MurmurHash using YARA.
100 Days of YARA – Day 32: Base64 Alphabet
Find binaries that likely implemented base64 using YARA.