yara/rules/Linux_Exploit_Dirtycow.yar (19 lines of code) (raw):

rule Linux_Exploit_Dirtycow_8555f149 { meta: author = "Elastic Security" id = "8555f149-0c91-4384-9199-8250c0fd74fd" fingerprint = "3d607c7ba6667c375eaab454debf8745746230d08a00499395a275e5bd05b3e4" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.Dirtycow" reference_sample = "0fd66e120f97100e48c65322b946b812fa9df4cfb533fb327760a999e4d43945" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 83 45 F8 01 81 7D F8 FF E0 F5 05 7E ?? 8B 45 } condition: all of them }