diff options
| author | jvoisin | 2016-01-05 10:44:38 +0100 |
|---|---|---|
| committer | jvoisin | 2016-01-05 10:44:38 +0100 |
| commit | 44dd7450c5f957f37f9d55a69cd24c9a24332a30 (patch) | |
| tree | ed7e551c6baef08b567d9f375bef98a3856c84d1 | |
| parent | 1c6cf5f703c3ddeafa43237150f750d4b4ca6a1f (diff) | |
Cleanup the wordlist
| -rw-r--r-- | malwares.yara | 69 |
1 files changed, 34 insertions, 35 deletions
diff --git a/malwares.yara b/malwares.yara index c3679b2..5bf6dd3 100644 --- a/malwares.yara +++ b/malwares.yara | |||
| @@ -171,35 +171,39 @@ rule DangerousPhp | |||
| 171 | rule DodgyStrings | 171 | rule DodgyStrings |
| 172 | { | 172 | { |
| 173 | strings: | 173 | strings: |
| 174 | $ = "/../../../" | ||
| 175 | $ = /\/bin\/(ba)?sh/ fullword | ||
| 174 | $ = "/etc/passwd" | 176 | $ = "/etc/passwd" |
| 175 | $ = "/etc/shadow" | 177 | $ = "/etc/proftpd.conf" |
| 176 | $ = "/etc/resolv.conf" | 178 | $ = "/etc/resolv.conf" |
| 179 | $ = "/etc/shadow" | ||
| 177 | $ = "/etc/syslog.conf" | 180 | $ = "/etc/syslog.conf" |
| 178 | $ = "/etc/proftpd.conf" | 181 | $ = "/proc/cpuinfo" fullword |
| 179 | $ = "/windows/system32/" | 182 | $ = "/windows/system32/" |
| 180 | $ = "WScript.Shell" | 183 | $ = "WScript.Shell" |
| 181 | $ = "WinExec" | 184 | $ = "WinExec" |
| 182 | $ = "uname -a" fullword | 185 | $ = "b374k" fullword nocase |
| 183 | $ = "nc -l" fullword | 186 | $ = "backdoor" fullword nocase |
| 184 | $ = "ls -la" fullword | 187 | $ = "c99shell" fullword nocase |
| 185 | $ = "cmd.exe" fullword nocase | 188 | $ = "cmd.exe" fullword nocase |
| 186 | $ = "ipconfig" fullword nocase | ||
| 187 | $ = "find . -type f" fullword | ||
| 188 | $ = "defaced" fullword nocase | 189 | $ = "defaced" fullword nocase |
| 189 | $ = "slowloris" fullword nocase | ||
| 190 | $ = "id_rsa" fullword | ||
| 191 | $ = "backdoor" fullword nocase | ||
| 192 | $ = "webshell" fullword nocase | ||
| 193 | $ = "exploit" fullword nocase | 190 | $ = "exploit" fullword nocase |
| 194 | $ = "hacking" fullword nocase | 191 | $ = "find . -type f" fullword |
| 195 | $ = "hacker" fullword nocase | 192 | $ = /hack(ing|er)/ nocase |
| 196 | $ = "/proc/cpuinfo" fullword | 193 | $ = "hashcrack" nocase |
| 197 | $ = "/bin/sh" fullword | 194 | $ = "id_rsa" fullword |
| 198 | $ = "/bin/bash" fullword | 195 | $ = "ipconfig" fullword nocase |
| 196 | $ = "kingdefacer" nocase | ||
| 197 | $ = "locus7s" nocase | ||
| 198 | $ = "ls -la" fullword | ||
| 199 | $ = "nc -l" fullword | ||
| 199 | $ = "ps -aux" fullword | 200 | $ = "ps -aux" fullword |
| 200 | $ = "b374k" fullword | 201 | $ = "rootkit" fullword nocase |
| 202 | $ = "slowloris" fullword nocase | ||
| 203 | $ = "uname -a" fullword | ||
| 204 | $ = "warez" fullword nocase | ||
| 201 | $ = /(reverse|web)\s*shell/ nocase | 205 | $ = /(reverse|web)\s*shell/ nocase |
| 202 | $ = /\t{16,}?/ | 206 | $ = /\t{16,}?/ /* a lot of spaces */ |
| 203 | 207 | ||
| 204 | $vbs = /language\s*=\s*vbscript/ nocase | 208 | $vbs = /language\s*=\s*vbscript/ nocase |
| 205 | $asp = "scripting.filesystemobject" nocase | 209 | $asp = "scripting.filesystemobject" nocase |
| @@ -211,28 +215,23 @@ rule DodgyStrings | |||
| 211 | rule Websites | 215 | rule Websites |
| 212 | { | 216 | { |
| 213 | strings: | 217 | strings: |
| 214 | $ = "milw0rm.com" | ||
| 215 | $ = "exploit-db.com" | ||
| 216 | $ = "1337day.com" | 218 | $ = "1337day.com" |
| 217 | $ = "rapid7.com" | 219 | $ = "antichat.ru" |
| 218 | $ = "shodan.io" | 220 | $ = "ccteam.ru" |
| 219 | $ = "packetstormsecurity" | ||
| 220 | $ = "crackfor" nocase | 221 | $ = "crackfor" nocase |
| 221 | $ = "md5.rednoize" | ||
| 222 | $ = "hashcracking" nocase | ||
| 223 | $ = "darkc0de" nocase | 222 | $ = "darkc0de" nocase |
| 224 | $ = "securityfocus" nocase | 223 | $ = "egyspider.eu" |
| 225 | $ = "antichat.ru" | 224 | $ = "exploit-db.com" |
| 226 | $ = "KingDefacer" nocase | 225 | $ = "fopo.com.ar" /* Free Online Php Obfuscator */ |
| 226 | $ = "hashchecker.com" | ||
| 227 | $ = "hashkiller.com" nocase | ||
| 227 | $ = "md5crack.com" | 228 | $ = "md5crack.com" |
| 228 | $ = "md5decrypter.com" | 229 | $ = "md5decrypter.com" |
| 229 | $ = "hashkiller.com" | 230 | $ = "milw0rm.com" |
| 230 | $ = "hashchecker.com" | 231 | $ = "packetstormsecurity" nocase |
| 231 | $ = "www.fopo.com.ar" /* Free Online Php Obfuscator */ | 232 | $ = "rapid7.com" |
| 232 | $ = "ccteam.ru" | 233 | $ = "securityfocus" nocase |
| 233 | $ = "locus7s.com" | 234 | $ = "shodan.io" |
| 234 | $ = "b374k" | ||
| 235 | $ = "www.egyspider.eu" | ||
| 236 | 235 | ||
| 237 | condition: | 236 | condition: |
| 238 | any of them and not IsWhitelisted | 237 | any of them and not IsWhitelisted |
