Sneed-Reactivity/yara-Neo23x0/exploit_cve_2014_4076.yar

19 lines
797 B
Text
Raw Permalink Normal View History

rule CVE_2014_4076_Exploitcode {
meta:
description = "Detects an exploit code for CVE-2014-4076"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://github.com/Neo23x0/yarGen"
date = "2018-04-04"
hash1 = "44690af85efef2db04c7e8cba7ca0d0e53be1a1432a339570a7d26eec860b8ee"
id = "83563dea-63d9-58a9-82ed-275455122571"
strings:
$x1 = "[+] Created a new cmd.exe process" fullword ascii
$x2 = "[+] Modified shellcode" fullword ascii
$x3 = "[*] Spawning SYSTEM shell..." fullword ascii
$x4 = "[*] MS14-070 (CVE-2014-4076) x86" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 100KB and 1 of them
}