Authenticate for API access | If you are experiencing issues with receiving data from abuse.ch platforms via API, please ensure your requests are authenticated. ➡️ Read here for more info

YARAhub

You are currently viewing the YARAhub entry of the YARA rule Spynote_craxsrat_strings. Depending on the TLP classification of this YARA rule chosen by the author, further information about this YARA rule is available below.

YARA Rule Details: Spynote_craxsrat_strings


Rule name:Spynote_craxsrat_strings
Author:Alberto Segura
Description:Detects Spynote Android Malware
Reference MD5: fc3d73f557dddf0ad172f568a9c4717f
Likes: 0
Reference Link :n/a
Malpedia Family : https://malpedia.caad.fkie.fraunhofer.de/details/apk.spynote
Date added:2023-08-24
Rule Matching TLP :TLP:WHITE
Rule Sharing TLP :TLP:RED
License : https://creativecommons.org/publicdomain/zero/1.0/
UUID: 2f876ec2-9a33-4919-afcb-2b298209acc6
Static hits:18
Unpacker hits:0

YARA Rule Content


The content of the YARA rule is shown below.

YARA Rule Matches


The following table shows the most recent files matching this particular YARA rule.

First seen (UTC)SHA256 hashStatic matchesUnpacker matches