Skip to content

Commit

Permalink
fix: Go marker
Browse files Browse the repository at this point in the history
  • Loading branch information
Neo23x0 committed Feb 12, 2025
1 parent 1d92684 commit e869a43
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 4 deletions.
4 changes: 2 additions & 2 deletions yara/gen_fireeye_redteam_tools.yar
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ rule APT_Backdoor_Win_GORAT_3
$dirty4 = "gorat" ascii nocase wide
$dirty5 = "flare" ascii nocase wide
$go1 = "go.buildid" ascii wide
$go2 = "Go build ID:" ascii wide
$go2 = "Go build" ascii wide
$json1 = "json:\"pid\"" ascii wide
$json2 = "json:\"key\"" ascii wide
$json3 = "json:\"agent_time\"" ascii wide
Expand Down Expand Up @@ -1460,7 +1460,7 @@ rule APT_Backdoor_Win_GORAT_2
id = "e2c47711-d088-5cb4-8d21-f8199a865a28"
strings:
$go1 = "go.buildid" ascii wide
$go2 = "Go build ID:" ascii wide
$go2 = "Go build" ascii wide
$json1 = "json:\"pid\"" ascii wide
$json2 = "json:\"key\"" ascii wide
$json3 = "json:\"agent_time\"" ascii wide
Expand Down
2 changes: 1 addition & 1 deletion yara/gen_lnx_malware_indicators.yar
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

rule SUSP_LNX_Linux_Malware_Indicators_Aug20_1 {
meta:
description = "Detects indicators often found in linux malware samples"
description = "Detects indicators often found in linux malware samples. Note: This detection is based on common characteristics typically associated with the mentioned threats, must be considered a clue and does not conclusively prove maliciousness."
author = "Florian Roth (Nextron Systems)"
score = 65
reference = "Internal Research"
Expand Down
2 changes: 1 addition & 1 deletion yara/gen_powershell_obfuscation.yar
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ rule SUSP_PowerShell_Caret_Obfuscation_2 {

rule SUSP_OBFUSC_PowerShell_True_Jun20_1 {
meta:
description = "Detects indicators often found in obfuscated PowerShell scripts"
description = "Detects indicators often found in obfuscated PowerShell scripts. Note: This detection is based on common characteristics typically associated with the mentioned threats, must be considered a clue and does not conclusively prove maliciousness."
author = "Florian Roth (Nextron Systems)"
reference = "https://github.com/corneacristian/mimikatz-bypass/"
date = "2020-06-27"
Expand Down

0 comments on commit e869a43

Please sign in to comment.