icedid/peloader/icedid_peloader.yar (16 lines of code) (raw):

rule icedid_peloader { meta: description = "Hardcoded strings within the unpacked IcedID peloader" os = "Windows" category_type = "Trojan" family = "IcedID" threat_name = "Windows.Trojan.IcedID" author = "Myrtus0x0" date = "2021-05-15" strings: $sadl_filename = "sadl_64.dll" ascii wide fullword condition: uint16(0) == 0x5A4D and all of them }