Rule Info
Name
APT_MAL_IronWind_Downloader_Nov23_2
Author
X__Junior
Description
Detects IronWind downloader - seen being used by TA402
Score
80
Date
2023-11-27
Minimum Yara
1.7
Rule Hash
459ea143d247ea41a688c4b8ed9b0c1b
Tags
['MAL', 'FILE', 'APT']
Required Modules
[]
Antivirus Verdicts
Rating
Number of Samples
Malicious (>= 10 engines)
11
Suspicious (< 10 engines)
1
Clean (0 engines)
2
Rule Matches
Timestamp
Positives
Total
Hash
VT