2025-03-26 02:30:13 +09:00
|
|
|
rule CHINESE_NEZHA_ARGO {
|
|
|
|
strings:
|
|
|
|
$a1 = "TkVaSEE=" // Base64 for "NEZHA"
|
|
|
|
$a2 = "tunnel.json"
|
|
|
|
$a3 = "vless"
|
|
|
|
$a4 = "dmxlc3M=" // Base64 for "vless"
|
|
|
|
$a5 = "/vmess"
|
|
|
|
$a6 = "L3ZtZXNz" // Base64 for "/vmess"
|
|
|
|
$a7 = "V0FSUA==" // Base64 for "WARP"
|
|
|
|
$a8 = "/eooce/"
|
|
|
|
$a9 = "ARGO_AUTH"
|
|
|
|
$a10 = "--edge-ip-version"
|
|
|
|
$a11 = "LS1lZGdlLWlwLXZlcnNpb24=" // Base64 for "--edge-ip-version"
|
|
|
|
$a12 = "sub.txt"
|
|
|
|
$a13 = "Server\x20is\x20running\x20on\x20port\x20"
|
|
|
|
$a14 = "nysteria2"
|
|
|
|
$a15 = "openssl req"
|
2025-03-26 11:42:31 +01:00
|
|
|
$a16 = "hysteria2"
|
|
|
|
$a17 = "NEZHA" nocase
|
|
|
|
$a18 = "babama1001980"
|
2025-03-26 02:30:13 +09:00
|
|
|
condition:
|
|
|
|
2 of ($a*)
|
|
|
|
}
|
|
|
|
|
|
|
|
rule OBFUSCATED_CODE {
|
|
|
|
meta:
|
|
|
|
description = "Detects an obfuscated script"
|
|
|
|
strings:
|
|
|
|
$f1 = "0x" nocase
|
|
|
|
$f2 = "x20" nocase
|
|
|
|
$f3 = "x0a" nocase
|
|
|
|
condition:
|
|
|
|
2 of ($f1, $f2, $f3)
|
|
|
|
}
|
|
|
|
|
|
|
|
rule OVERLOAD_CRYPTO_MINER {
|
|
|
|
meta:
|
|
|
|
ref = "https://gist.github.com/GelosSnake/c2d4d6ef6f93ccb7d3afb5b1e26c7b4e"
|
|
|
|
strings:
|
|
|
|
$a1 = "stratum+tcp"
|
|
|
|
$a2 = "xmrig"
|
|
|
|
$a3 = "crypto"
|
|
|
|
|
|
|
|
condition:
|
|
|
|
any of them
|
|
|
|
}
|
|
|
|
|
|
|
|
rule REVERSE_SHELL {
|
|
|
|
strings:
|
|
|
|
$a1 = "0>&1"
|
|
|
|
$a2 = "sh"
|
|
|
|
$a3 = "-i"
|
|
|
|
$a4 = "0<&196"
|
|
|
|
$a5 = "<>/dev/tcp"
|
|
|
|
$a6 = "socket.socket"
|
|
|
|
|
|
|
|
condition:
|
|
|
|
2 of them
|
|
|
|
}
|