yara/rules/Linux_Exploit_Vmsplice.yar (95 lines of code) (raw):

rule Linux_Exploit_Vmsplice_cfa94001 { meta: author = "Elastic Security" id = "cfa94001-6000-4633-9af2-efabfaa96f94" fingerprint = "3fb484112484e2afc04a88d50326312af950605c61f258651479427b7bae300a" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.Vmsplice" reference_sample = "0a26e67692605253819c489cd4793a57e86089d50150124394c30a8801bf33e6" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 7A 00 21 40 23 24 00 6D 6D 61 70 00 5B 2B 5D 20 6D 6D 61 70 3A } condition: all of them } rule Linux_Exploit_Vmsplice_a000f267 { meta: author = "Elastic Security" id = "a000f267-b4d7-46e9-ab61-818633083ba2" fingerprint = "0753ef1bc3e151fd6d4773967b5cde6ad789df593e7d8b9ed08052151a1a1849" creation_date = "2021-01-12" last_modified = "2021-09-16" threat_name = "Linux.Exploit.Vmsplice" reference_sample = "c85cc6768a28fb7de16f1cad8d3c69d8f0b4aa01e00c8e48759d27092747ca6f" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 24 04 73 00 00 00 89 44 24 00 CF 83 C4 10 5B C9 C3 55 89 E5 83 } condition: all of them } rule Linux_Exploit_Vmsplice_8b9e4f9f { meta: author = "Elastic Security" id = "8b9e4f9f-7903-4aa5-9098-766f4311a22b" fingerprint = "585b16ad3e4489a17610f0a226be428def33e411886f273d0c1db45b3819ba3f" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.Vmsplice" reference_sample = "0230c81ba747e588cd9b6113df6e1867dcabf9d8ada0c1921d1bffa9c1b9c75d" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 00 00 00 00 20 4C 69 6E 75 78 20 76 6D 73 70 6C } condition: all of them } rule Linux_Exploit_Vmsplice_055f88b8 { meta: author = "Elastic Security" id = "055f88b8-b1b0-4b02-8fc5-97804b564d27" fingerprint = "38f7d6c56ee1cd465062b5c82320710c4d0393a3b33f5586b6c0c0c778e5d3b2" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Exploit.Vmsplice" reference_sample = "607c8c5edc8cbbd79a40ce4a0eccf46e01447985d9415d1eff6a91bf64074507" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 2D 2D 2D 00 20 4C 69 6E 75 78 20 76 6D 73 70 6C } condition: all of them } rule Linux_Exploit_Vmsplice_431e689d { meta: author = "Elastic Security" id = "431e689d-0c41-4c92-98b0-0dac529d8328" fingerprint = "1e8aee445a3adef6ccbd2d25f7b38202bef98a99b828eda56fb8b9269b6316b4" creation_date = "2021-06-28" last_modified = "2021-09-16" threat_name = "Linux.Exploit.Vmsplice" reference = "1cbb09223f16af4cd13545d72dbeeb996900535b1e279e4bcf447670728de1e1" severity = "100" arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { 69 6F 6E 00 70 75 74 65 6E 76 00 73 74 64 6F 75 74 00 73 65 } condition: all of them }