diff --git a/signatures/rules.yara b/signatures/rules.yara new file mode 100644 index 0000000..29aa9b5 --- /dev/null +++ b/signatures/rules.yara @@ -0,0 +1,140 @@ +rule Suspicious_PHP_Code { + meta: + description = "Suspicious PHP code" + author = "AI" + strings: + $eval_call = "eval(" + $exec_call = "exec(" + $suspicious_function = /[$][a-zA-Z_][a-zA-Z_0-9]{,20}\(/ + condition: + any of ($eval_call, $exec_call, $suspicious_function) +} + +rule Malicious_Python_Webshell { + meta: + description = "Malicious Python webshell" + author = "AI" + strings: + $import_os = "import os" + $os_system = "os.system(" + $variable_assignment = /[$][a-zA-Z_][a-zA-Z_0-9]{,20}\s*=/ + condition: + any of ($import_os, $os_system, $variable_assignment) +} + +rule Cryptolocker_Virus { + meta: + description = "Cryptolocker virus" + author = "AI" + strings: + $crypto_collision = "from Crypto.Collision import collision" + $crypto_rsa = /from Crypto\.RSA import RSA.{1,100}/ + condition: + any of ($crypto_collision, $crypto_rsa) +} + +rule Coin_Mining_Malware { + meta: + description = "Coin mining malware" + author = "AI" + strings: + $hashlib_import = "import hashlib" + $multiprocessing_import = "import multiprocessing" + $os_import = "import os" + condition: + any of ($hashlib_import, $multiprocessing_import, $os_import) +} + +rule SQL_Injection_Attack { + meta: + description = "SQL injection attack" + author = "AI" + strings: + $drop_table = "DROP TABLE" + $delete_from = "DELETE FROM" + $union_all = "UNION ALL" + condition: + any of ($drop_table, $delete_from, $union_all) +} + +rule Cross_Site_Scripting { + meta: + description = "Cross-site scripting" + author = "AI" + strings: + $script_tag = /