yara/rules/Windows_Hacktool_Gmer.yar (19 lines of code) (raw):
rule Windows_Hacktool_Gmer_8aabdd5e {
meta:
author = "Elastic Security"
id = "8aabdd5e-1ce7-4257-abaa-8d02dc6856a6"
fingerprint = "960721d4d111a670907fe7d3ce01dfd134ad03a2d8440a945c75a7d46de46238"
creation_date = "2022-04-04"
last_modified = "2022-04-04"
threat_name = "Windows.Hacktool.Gmer"
reference_sample = "18c909a2b8c5e16821d6ef908f56881aa0ecceeaccb5fa1e54995935fcfd12f7"
severity = 50
arch_context = "x86"
scan_context = "file"
license = "Elastic License v2"
os = "windows"
strings:
$str1 = "\\gmer64.pdb"
condition:
int16(uint32(0x3C) + 0x5c) == 0x0001 and $str1
}