Malicious File Detection Using Yara

critical Nessus Plugin ID 91990

Synopsis

Nessus detected malicious files on the remote host.

Description

Nessus detected one or more files on the remote Windows host that match a Yara rule.

Note that Nessus has only scanned files with the following extensions:

.application, .asp, .aspx, .bat, .chm, .class, .cmd, .com, .cpl, .csh, .dll, .doc, .docx, .drv, .exe, .gadget, .hta, .inf, .ins, .inx, .isu, .jar, .job, .jpeg, .jpg, .jse, .jsp, .lnk, .msc, .msi, .msp, .mst, .paf, .pdf, .php, .pif, .ppt, .pptx, .ps1, .ps1xml, .ps2, .ps2xml, .psc1, .psc2, .reg, .rgs, .scf, .scr, .sct, .shb, .shs, .swf, .sys, .u3p, .vbe, .vbs, .vbscript, .wsf, .xls, xlsx

See Also

http://virustotal.github.io/yara/

Plugin Details

Severity: Critical

ID: 91990

File Name: wmi_malware_yara_filesystem.nbin

Version: 1.175

Type: local

Agent: windows

Family: Windows

Published: 7/11/2016

Updated: 3/19/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS Score Rationale: The detection is suspected as being malware.

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

Required KB Items: malscan/enabled