Rule Info
Name
APT_MAL_IronWind_Downloader_Nov23_2
Author
X__Junior
Description
Detects IronWind downloader - seen being used by TA402
Score
80
Date
2023-11-27
Minimum Yara
1.7
Rule Hash
8b3d505070130fdf1dc003726e330b22
Tags
['FILE', 'MAL', 'APT']
Required Modules
[]
Antivirus Verdicts
Rating
Number of Samples
Malicious (>= 10 engines)
14
Suspicious (< 10 engines)
2
Clean (0 engines)
2
Rule Matches
Timestamp
Positives
Total
Hash
VT