diff options
| author | Julien (jvoisin) Voisin | 2016-02-23 17:54:33 +0100 |
|---|---|---|
| committer | Julien (jvoisin) Voisin | 2016-02-23 17:54:33 +0100 |
| commit | 153b5ad97afe623a558ccc061bb753fd88e2ee00 (patch) | |
| tree | 8b59a4541db046117bf045f5a4ce60a9a030284b | |
| parent | 313d489694d4330a31d0f03c699e09b46b63bca0 (diff) | |
Tweak some minor rules
| -rw-r--r-- | php-malware-finder/malwares.yara | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/php-malware-finder/malwares.yara b/php-malware-finder/malwares.yara index d07c057..7e2acc0 100644 --- a/php-malware-finder/malwares.yara +++ b/php-malware-finder/malwares.yara | |||
| @@ -103,7 +103,8 @@ rule DodgyPhp | |||
| 103 | { | 103 | { |
| 104 | strings: | 104 | strings: |
| 105 | $basedir_bypass = /curl_init\s*\(\s*["']file:\/\// | 105 | $basedir_bypass = /curl_init\s*\(\s*["']file:\/\// |
| 106 | $disable_magic_quotes = /set_magic_quotes_runtime\(0\)/ | 106 | $basedir_bypass2 = "file:file:///" // https://www.intelligentexploit.com/view-details.html?id=8719 |
| 107 | $disable_magic_quotes = /set_magic_quotes_runtime\s*\(\s*0/ | ||
| 107 | $double_encoding = /(base64_decode\s*\(\s*){2}/ | 108 | $double_encoding = /(base64_decode\s*\(\s*){2}/ |
| 108 | $execution = /(eval|assert|passthru|exec|system|win_shell_execute|base64_decode)\s*\(\s*(base64_decode|php:\/\/input|str_rot13|gz(inflate|uncompress)|getenv|pack|\\?\$_(GET|REQUEST|POST|COOKIE))/ | 109 | $execution = /(eval|assert|passthru|exec|system|win_shell_execute|base64_decode)\s*\(\s*(base64_decode|php:\/\/input|str_rot13|gz(inflate|uncompress)|getenv|pack|\\?\$_(GET|REQUEST|POST|COOKIE))/ |
| 109 | $htaccess = "SetHandler application/x-httpd-php" | 110 | $htaccess = "SetHandler application/x-httpd-php" |
