icedid/peloader/icedid_peloader.yar (16 lines of code) (raw):
rule icedid_peloader
{
meta:
description = "Hardcoded strings within the unpacked IcedID peloader"
os = "Windows"
category_type = "Trojan"
family = "IcedID"
threat_name = "Windows.Trojan.IcedID"
author = "Myrtus0x0"
date = "2021-05-15"
strings:
$sadl_filename = "sadl_64.dll" ascii wide fullword
condition:
uint16(0) == 0x5A4D and
all of them
}