Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
rules
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
rules
Commits
b2e3b3d7
Commit
b2e3b3d7
authored
Sep 30, 2016
by
mmorenog
Committed by
GitHub
Sep 30, 2016
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Create POS_BruteforcingBot.yar
parent
7a4d7748
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
21 additions
and
0 deletions
+21
-0
POS_BruteforcingBot.yar
malware/POS_BruteforcingBot.yar
+21
-0
No files found.
malware/POS_BruteforcingBot.yar
0 → 100644
View file @
b2e3b3d7
/*
This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license.
*/
rule POS_bruteforcing_bot
{
meta:
maltype = "botnet"
ref = "https://github.com/reed1713"
reference = "http://www.alienvault.com/open-threat-exchange/blog/botnet-bruteforcing-point-of-sale-via-remote-desktop"
date = "3/11/2014"
description = "botnet bruteforcing POS terms via RDP"
strings:
$type="Microsoft-Windows-Security-Auditing"
$eventid="4688"
$data="\\AppData\\Roaming\\lsacs.exe"
condition:
all of them
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment