signature-base/yara/gen_elf_file_anomalies.yar
2019-06-02 12:17:05 +02:00

21 lines
680 B
Plaintext

rule SUSP_ELF_LNX_UPX_Compressed_File {
meta:
description = "Detects a suspicious ELF binary with UPX compression"
author = "Florian Roth"
reference = "Internal Research"
date = "2018-12-12"
score = 40
hash1 = "038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4"
strings:
$s1 = "PROT_EXEC|PROT_WRITE failed." fullword ascii
$s2 = "$Id: UPX" fullword ascii
$s3 = "$Info: This file is packed with the UPX executable packer" ascii
$fp1 = "check your UCL installation !"
condition:
uint16(0) == 0x457f and filesize < 2000KB and
filesize > 30KB and 2 of ($s*)
and not 1 of ($fp*)
}