Sneed-Reactivity/yara-Neo23x0/gen_elf_file_anomalies.yar

22 lines
748 B
Text
Raw Normal View History

rule SUSP_ELF_LNX_UPX_Compressed_File {
meta:
description = "Detects a suspicious ELF binary with UPX compression"
author = "Florian Roth (Nextron Systems)"
reference = "Internal Research"
date = "2018-12-12"
score = 40
hash1 = "038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4"
id = "078937de-59b3-538e-a5c3-57f4e6050212"
strings:
$s1 = "PROT_EXEC|PROT_WRITE failed." fullword ascii
$s2 = "$Id: UPX" fullword ascii
$s3 = "$Info: This file is packed with the UPX executable packer" ascii
$fp1 = "check your UCL installation !"
condition:
uint16(0) == 0x457f and filesize < 2000KB and
filesize > 30KB and 2 of ($s*)
and not 1 of ($fp*)
}