yara/rules/Linux_Exploit_Race.yar (19 lines of code) (raw):

rule Linux_Exploit_Race_758a0884 { meta: author = "Elastic Security" id = "758a0884-0174-46c8-a57a-980fc04360d0" fingerprint = "3516086ae773ec1c1de75a54bafbb72ad49b4c7f1661961d5613462b53f26c43" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.Race" reference_sample = "a4966baaa34b05cb782071ef114a53cac164e6dece275c862fe96a2cff4a6f06" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 00 22 00 00 00 36 00 00 00 18 85 04 08 34 00 00 00 12 00 00 } condition: all of them }