yara/rules/Windows_Trojan_Octopus.yar (19 lines of code) (raw):

rule Windows_Trojan_Octopus_15813e26 { meta: author = "Elastic Security" id = "15813e26-77f8-46cf-a6a3-ae081925b85a" fingerprint = "a3294547f7e3cead0cd64eb3d2e7dbd8ccfc4d9eedede240a643c8cd114cbcce" creation_date = "2021-11-10" last_modified = "2022-01-13" description = "Identifies Octopus, an Open source pre-operation C2 server based on Python and PowerShell" threat_name = "Windows.Trojan.Octopus" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a = "C:\\Users\\UNKNOWN\\source\\repos\\OctopusUnmanagedExe\\OctopusUnmanagedExe\\obj\\x64\\Release\\SystemConfiguration.pdb" ascii fullword condition: all of them }