yara/rules/Linux_Hacktool_Tcpscan.yar (19 lines of code) (raw):

rule Linux_Hacktool_Tcpscan_334d0ca5 { meta: author = "Elastic Security" id = "334d0ca5-d143-4a32-8632-9fbdd2d96987" fingerprint = "1f8fc064770bd76577b9455ae858d8a98b573e01a199adf2928d8433d990eaa7" creation_date = "2021-04-06" last_modified = "2021-09-16" threat_name = "Linux.Hacktool.Tcpscan" reference_sample = "62de04185c2e3c22af349479a68ad53c31b3874794e7c4f0f33e8d125c37f6b0" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "linux" strings: $a = { C4 10 89 45 D4 83 7D D4 00 79 1A 83 EC 0C 68 13 } condition: all of them }