Common Information
Type | Value |
---|---|
Value |
rule P0_Hunting_Common_TeamTNT_CredHarvesterTypo_1 { meta: description = "Detecting presence of known credential harvester scripts (commonly used by TeamTNT) containing common typo for 'CREFILE' variable name (assuming intended name is 'CREDFILE' since it is iterating file names in input array" author = "daniel.bohannon@permiso.io (@danielhbohannon)" date = "2023-07-12" reference = "https://permiso.io/blog/s/agile-approach-to-mass-cloud-cred-harvesting-and-cryptomining/" md5_01 = "3e2cddf76334529a14076c3659a68d92" md5_02 = "b9113ccc0856e5d44bab8d3374362a06" md5_03 = "d9ecceda32f6fa8a7720e1bf9425374f" md5_04 = "28165d28693ca807fb3d4568624c5ba9" md5_05 = "0855b8697c6ebc88591d15b954bcd15a" md5_06 = "f7df739f865448ac82da01b3b1a97041" md5_07 = "1a37f2ef14db460e5723f3c0b7a14d23" md5_08 = "99f0102d673423c920af1abc22f66d4e" md5_09 = "99f0102d673423c920af1abc22f66d4e" md5_10 = "5daace86b5e947e8b87d8a00a11bc3c5" strings: $varNameTypo = "for CREFILE in ${" $findArgs = "find / -maxdepth " $xargs = " | xargs -I % sh -c 'echo :::%; cat %' >> $" condition: all of them } |
Category | |
Type | Yara Rule |
Misp Type | |
Description |