Skip to main content
Glama
Kirandawadi

Volatility3 MCP Server

by Kirandawadi
MALW_Korplug.yar1.71 kB
/* This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license. */ rule Korplug_FAST { meta: description = "Rule to detect Korplug/PlugX FAST variant" author = "Florian Roth" date = "2015-08-20" hash = "c437465db42268332543fbf6fd6a560ca010f19e0fd56562fb83fb704824b371" strings: $x1 = "%s\\rundll32.exe \"%s\", ShadowPlay" fullword ascii $a1 = "ShadowPlay" fullword ascii $s1 = "%s\\rundll32.exe \"%s\"," fullword ascii $s2 = "nvdisps.dll" fullword ascii $s3 = "%snvdisps.dll" fullword ascii $s4 = "\\winhlp32.exe" fullword ascii $s5 = "nvdisps_user.dat" fullword ascii $s6 = "%snvdisps_user.dat" fullword ascii condition: uint16(0) == 0x5a4d and filesize < 500KB and ( $x1 or ($a1 and 1 of ($s*)) or 4 of ($s*) ) } rule Korplug { meta: maltype = "Korplug Backdoor" author = "https://github.com/reed1713" reference = "http://www.symantec.com/connect/blogs/new-sample-backdoorkorplug-signed-stolen-certificate" description = "IOC looks for events associated with the KORPLUG Backdoor linked to the recent operation greedy wonk activity." strings: $type="Microsoft-Windows-Security-Auditing" $eventid="4688" $data="ProgramData\\RasTls\\RasTls.exe" $type1="Microsoft-Windows-Security-Auditing" $eventid1="4688" $data1="ProgramData\\RasTls\\rundll32.exe" $type2="Microsoft-Windows-Security-Auditing" $eventid2="4688" $data2="ProgramData\\RasTls\\svchost.exe" condition: all of them }

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Kirandawadi/volatility3-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server