只需一步,快速开始
只需两步,快速登录
签到天数: 150 天
[LV.7]常住居民III
repost Clip_Studio_Paint_v5.0.4_EX_v2.7z 0/60 https://www.virustotal.com/gui/file/94c9d4889e956d49c1e0e93f46a58ee2bda3ff2327965893e71adef1675fde3c/detection CLIPStudioPaint.exe 0/70 https://www.virustotal.com/gui/file/6e2678055c1c294a99f797af9e8e54f69c0b5c561605fb03b1791141193cfac9 Crowdsourced YARA rules Matches rule skip20_sqllang_hook from ruleset skip20_sqllang_hook at https://github.com/eset/malware-ioc by Mathieu Tartare <mathieu.tartare@eset.com> YARA rule to detect if a sqllang.dll version is targeted by skip-2.0. Each byte pattern corresponds to a function hooked by skip-2.0. If $1_0 or $1_1 match, it is probably targeted as it corresponds to the hook responsible for bypassing the authentication. - 8 minutes ago 公开 YARA 规则 匹配规则 skip20_sqllang_hook 来自规则集 skip20_sqllang_hook,由 Mathieu Tartare <mathieu.tartare@eset.com> 在 https://github.com/eset/malware-ioc 提供 YARA 规则,用于检测 sqllang.dll 版本是否被 skip-2.0 针对。每个字节模式对应 skip-2.0 钩住的一个函数。如果$1_0 或$1_1 匹配,很可能被针对,因为它对应于绕过身份验证的钩子。- 9 分钟前
使用道具 举报
本版积分规则 发表回复 回帖后跳转到最后一页
手机版|Archiver|Mail me|网站地图|IT技术交流论坛 ( 闽ICP备13013206号-7 )
GMT+8, 2026/5/2 23:19 , Processed in 0.113639 second(s), 20 queries , MemCache On.
Powered by itzmx! X3.4
© 2011- sakura