yara/rules/Linux_Exploit_Alie.yar (19 lines of code) (raw):
rule Linux_Exploit_Alie_e69de1ee {
meta:
author = "Elastic Security"
id = "e69de1ee-294d-437e-a943-abb731842523"
fingerprint = "01fa5343fa0fb60c320f9fa49beb9c7a8a821ace7f1d6e48ea103e746b3f27a2"
creation_date = "2021-04-06"
last_modified = "2021-09-16"
threat_name = "Linux.Exploit.Alie"
reference_sample = "882839549f062ab4cbe6df91336ed320eaf6c2300fc2ed64d1877426a0da567d"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "linux"
strings:
$a = { 0C 8D 4B 08 8D 53 0C B0 0B CD 80 89 C3 31 C0 B0 }
condition:
all of them
}