Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
rules
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
rules
Commits
e7a08c00
Commit
e7a08c00
authored
Jan 10, 2017
by
mmorenog
Committed by
GitHub
Jan 10, 2017
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Create MALW_Magento_suspicious.yar
parent
4ac36f8f
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
87 additions
and
0 deletions
+87
-0
MALW_Magento_suspicious.yar
malware/MALW_Magento_suspicious.yar
+87
-0
No files found.
malware/MALW_Magento_suspicious.yar
0 → 100644
View file @
e7a08c00
/*
This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license.
*/
/*
ref : https://github.com/gwillem/magento-malware-scanner/
author : https://github.com/gwillem
*/
global private rule malware_size {
meta:
description = "Limit on file size"
condition:
/* uint16(0) == 0x4B50 and filesize < 3MB */
filesize < 500KB
}
rule fromCharCode_in_unicode {
strings: $ = "\\u0066\\u0072\\u006f\\u006d\\u0043\\u0068\\u0061\\u0072\\u0043\\u006f\\u0064\\u0065"
condition: any of them
}
rule function_through_object {
strings:
$ = "['eval']"
$ = "['unescape']"
$ = "['charCodeAt']"
$ = "['fromCharCode']"
condition: any of them
}
rule hex_script {
strings:
$ = "\\x73\\x63\\x72\\x69\\x70\\x74\\x22"
condition: any of them
}
rule php_malfunctions {
strings:
$ = "eval("
$ = "gzinflate("
$ = "str_rot13("
$ = "base64_decode("
condition: 3 of them
}
rule php_obf_malfunctions {
strings:
$ = "eval(base64_decode"
$ = "eval(gzinflate"
$ = "str_rot13(base64_decode"
condition: any of them
}
rule fopo_obfuscator {
strings:
$ = "www.fopo.com.ar"
condition: any of them
}
rule obf_base64_decode {
strings: $ = "\\x62\\x61\\x73\\145\\x36\\x34\\x5f\\x64\\x65\\143\\x6f\\144\\145"
condition: any of them
}
rule html_upload {
strings:
$ = "<input type='submit' name='upload' value='upload'>"
$ = "if($_POST['upload'])"
condition: any of them
}
rule php_uname {
strings: $ = "php_uname()"
condition: any of them
}
rule scriptkiddies {
strings:
$ = "lastc0de@Outlook.com" nocase
$ = "CodersLeet" nocase
$ = "AgencyCaFc" nocase
$ = "IndoXploit" nocase
$ = "Kapaljetz666" nocase
condition: any of them
}
rule eval_with_comments {
strings:
$ = /(^|\s)eval\s*\/\*.{,128}\*\/\s*\(/
condition: any of them
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment