yara/rules/Windows_Trojan_Merlin.yar (19 lines of code) (raw):

rule Windows_Trojan_Merlin_e8ecb3be { meta: author = "Elastic Security" id = "e8ecb3be-edba-4617-b4df-9d5b6275d310" fingerprint = "54e03337930d74568a91e797cfda3b7bfbce3aad29be2543ed58c51728d8e185" creation_date = "2022-01-05" last_modified = "2022-04-12" threat_name = "Windows.Trojan.Merlin" reference_sample = "768c120e63d3960a0842dcc538749955ab7caabaeaf3682f6d1e30666aac65a8" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a = { AF F0 4C 01 F1 4C 8B B4 24 A8 00 00 00 4D 0F AF F4 4C 01 F1 4C 8B B4 24 B0 00 } condition: all of them }