yara/rules/Linux_Cryptominer_Zexaf.yar (19 lines of code) (raw):
rule Linux_Cryptominer_Zexaf_b90e7683 {
meta:
author = "Elastic Security"
id = "b90e7683-84bf-4c07-b6ef-54c631280217"
fingerprint = "4ca9fad98bdde19f71c117af9cb87007dc46494666e7664af111beded1100ae4"
creation_date = "2021-01-12"
last_modified = "2021-09-16"
threat_name = "Linux.Cryptominer.Zexaf"
reference_sample = "98650ebb7e463a06e737bcea4fd2b0f9036fafb0638ba8f002e6fe141b9fecfe"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "linux"
strings:
$a = { 89 F2 C1 E7 18 C1 E2 18 C1 ED 08 09 D5 C1 EE 08 8B 14 24 09 FE }
condition:
all of them
}