yara/rules/Linux_Exploit_CVE_2016_5195.yar (304 lines of code) (raw):

rule Linux_Exploit_CVE_2016_5195_364f3b7b { meta: author = "Elastic Security" id = "364f3b7b-4361-44ca-bf49-e26c123ae4bd" fingerprint = "ec6cf1d090cd57434c4d3c1c3511fd4b683ff109bfd0ce859552d58cbb83984a" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "0d4c43bf0cdd6486a4bcab988517e58b8c15d276f41600e596ecc28b0b728e69" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 9C 01 7E 24 48 8B 45 90 48 8B 40 08 48 89 45 F8 48 8B 45 F8 48 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_3a2ed31b { meta: author = "Elastic Security" id = "3a2ed31b-a8be-4aff-af5e-e1ff2676f3f9" fingerprint = "0e8e0f58deadf4838464c2f2bc860013e6d47c3d770d0ef743b5dd9021832cae" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "ebbf3bc39ec661e2029d88960a5608e348de92089099019348bc0e891841690f" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 55 48 89 E5 48 83 EC 30 48 89 7D D8 48 8B 45 D8 48 89 45 F0 BE 02 00 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_7448814c { meta: author = "Elastic Security" id = "7448814c-1685-45a9-9a00-039b30485545" fingerprint = "25ffa8f3b2356deebc88d8831bc8664edd6543a7d722d6ddd72e89fad18c66e7" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "e95d0783b635e34743109d090af17aef2e507e8c90060d171e71d9ac79e083ba" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 9C 01 7E 24 48 8B 45 90 48 8B 40 08 48 89 45 C0 48 8B 45 C0 48 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_2fa988e3 { meta: author = "Elastic Security" id = "2fa988e3-dfaf-44c8-bfaa-889778858e22" fingerprint = "a841f4b929c79eadfa8deeb3a6f410056aec94dd1e0d9c8e5dc31675de936403" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "679392e78d4abefc05b885e43aaccc2da235bd7f2a267c6ecfbe2cf824776993" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 55 48 89 E5 48 83 EC 20 89 7D EC 89 75 E8 8B 45 E8 48 C1 E0 05 48 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_ea8801ac { meta: author = "Elastic Security" id = "ea8801ac-ee95-4294-9cfa-99c773a04183" fingerprint = "aa191347bdf2e9fdcf6f9591c370b85208a1c46a329bc648268447dbb5ea898f" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "7acccfd8c2e5555a3e3bf979ad2314c12a939c1ef32b66e61e30a712f07164fd" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 55 48 89 E5 48 83 EC 30 89 7D DC 48 89 75 D0 83 7D DC 02 7F 0A B8 01 00 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_b2ebdebd { meta: author = "Elastic Security" id = "b2ebdebd-0110-46b4-a97f-27c4c495b23d" fingerprint = "2a98a2d1be205145eb2d30a57aaa547b30281b31981f0872ba3f7e1d684a0cc2" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "dee49d4b7f406fd1728dad4dc217484ced2586e014e2cd265ea64eff70a2633d" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 55 48 89 E5 48 83 EC 30 48 89 7D D8 48 8B 45 D8 48 89 45 F8 BE 02 00 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_9190d516 { meta: author = "Elastic Security" id = "9190d516-dea0-4d74-9f2c-bd2337538258" fingerprint = "977bafd175a994edaef5f3fa19d19fe161cebb2447ee32fd5d4b0a3b93fb51fa" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "837ffed1f23293dc9c7cb994601488fc121751a249ffde51326947c33c5fca7f" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 4D 18 48 8B 55 10 48 8B 75 F0 48 8B 45 F8 48 83 EC 08 41 51 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_3b460716 { meta: author = "Elastic Security" id = "3b460716-812e-4884-ab66-e01f2e61996d" fingerprint = "900e22d1a157677698a47d49d2deeb52c938e3a790aba689b920ba1bbd7ed39d" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "8c4d49d4881ebdab1bd0e083d4e644cfc8eb7af3b96664598526ab3d175fc420" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 55 48 89 E5 48 83 EC 30 48 89 7D D8 48 8B 45 D8 48 89 45 E8 BE 02 00 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_ccfd7518 { meta: author = "Elastic Security" id = "ccfd7518-af6c-4378-bd9c-7267a7f0dab4" fingerprint = "4797064d6416f2799691ae7df956d0383dfe6094de29fb03fc8233ad89149942" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "b1017db71cf195aa565c57fed91ff1cdfcce344dc76526256d5817018f1351bf" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 83 45 FC 01 81 7D FC FF E0 F5 05 7F 0A 8B 05 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_d41c2c63 { meta: author = "Elastic Security" id = "d41c2c63-1af7-47c9-88a0-16454c9583db" fingerprint = "77fb7e9911d1037bba0a718d8983a42ad1877c13d865ce415351d599064ea7ea" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "a4e5751b4e8fa2e9b70e1e234f435a03290c414f9547dc7709ce2ee4263a35f1" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { F4 83 45 F0 01 81 7D F0 FF C1 EB 0B 7E D3 C9 C3 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_ffa7f059 { meta: author = "Elastic Security" id = "ffa7f059-b825-4dd6-b10d-e57549a2704f" fingerprint = "c451689042d9290d1bb5b931e002237584217bbddfc0d96c2486a61cb5c37d31" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "a073c6be047ea7b4500b1ffdc8bdadd9a06f9efccd38c88e0fc976b97b2b2df5" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { F8 83 45 FC 01 81 7D FC FF C1 EB 0B 7E D7 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_fb24c7e4 { meta: author = "Elastic Security" id = "fb24c7e4-db4f-405e-8e88-bc313b9a0358" fingerprint = "0a5f15ddb425a6e00f6c3964b4dbdc91a856fd06b6e45dfd4fded8ed97f21ae8" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "a073c6be047ea7b4500b1ffdc8bdadd9a06f9efccd38c88e0fc976b97b2b2df5" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { F8 83 45 FC 01 81 7D FC FF C1 EB 0B 7E ?? 8B 45 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_b45098df { meta: author = "Elastic Security" id = "b45098df-7f26-44a9-8078-f1c05d15cc38" fingerprint = "ed32e66f2c18b16a6f00d6a696a32cdb1b0b18413b4c1af059097f5d301ee084" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "e053aca86570b3781b3e08daab51382712270d2a375257c8b5789d3d87149314" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { FC 83 45 F8 01 81 7D F8 FF C1 EB 0B 7E D7 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_9c67a994 { meta: author = "Elastic Security" id = "9c67a994-dabf-4cb7-95d7-4cc47402be28" fingerprint = "fc6690eef99dd9f84f62444d7a7e1b52dc7f46e831a5ab3e87d4282bba979fde" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "70429d67402a43ed801e295b1ae1757e4fccd5d786c09ee054591ae51dfc1b25" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { FC 83 45 F8 01 81 7D F8 FF C1 EB 0B 7E ?? 8B } condition: all of them } rule Linux_Exploit_CVE_2016_5195_ab87c1ed { meta: author = "Elastic Security" id = "ab87c1ed-f538-4785-b7ae-5333a7ff2808" fingerprint = "3bf2be85120ef3711dd3508bf8fcd573a70c7ad4a5066be1b60d777a53cd37b6" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "c13c32d3a14cbc9c2580b1c76625cce8d48c5ae683230149a3f41640655e7f28" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { FF FF 88 45 EF 80 7D EF FF 75 D6 B8 ?? ?? 04 08 } condition: all of them } rule Linux_Exploit_CVE_2016_5195_f1c0482a { meta: author = "Elastic Security" id = "f1c0482a-fe88-4777-8d49-aa782bf25a98" fingerprint = "96d1ed843aeb59dd43dd76f4edd9e9928dd29f86df87b70d875473b9d908e75c" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.CVE-2016-5195" reference_sample = "a12a1e8253ee1244b018fd3bdcb6b7729dfe16e06aed470f6b08344a110a4061" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { FF FF 88 45 F7 80 7D F7 FF 75 D6 B8 ?? ?? 04 08 } condition: all of them }