yara/rules/Windows_Exploit_Dcom.yar (19 lines of code) (raw):

rule Windows_Exploit_Dcom_7a1bcec7 { meta: author = "Elastic Security" id = "7a1bcec7-e177-4adf-97a7-0d876bf65abc" fingerprint = "0abae84599e490056412d5a5ce1868ea118551243377d59cbb6ebd83701769b8" creation_date = "2021-01-12" last_modified = "2021-08-23" threat_name = "Windows.Exploit.Dcom" reference_sample = "84073caf71d0e0523adeb96169c85b8f0bfea09e7ef3bf677bfc19d3b536d8a5" severity = 100 arch_context = "x86" scan_context = "file" license = "Elastic License v2" os = "windows" strings: $a = { 20 62 79 20 46 6C 61 73 68 53 6B 79 20 61 6E 64 20 42 65 6E } condition: all of them }