Rule Info
Name
APT_DarkPink_KamiKakaBot_Mar23
Author
MalGamy
Description
Detects KamiKakaBot that is used by DarkPink threat actors
Score
80
Reference
Date
2023-03-10
Minimum Yara
1.7
Rule Hash
37336cda988c980a43849b789a4888a5
Tags
['APT', 'FILE', 'EXE']
Required Modules
[]
Antivirus Verdicts
Rating
Number of Samples
Malicious (>= 10 engines)
3
Suspicious (< 10 engines)
0
Clean (0 engines)
0
Rule Matches
Timestamp
Positives
Total
Hash
VT