Neo23x0/Loki

YARA rules trigger for Teamviewer service

backherozzo opened this issue · 6 comments

Hello, Loki scanner trigger the following YARA rule RAT_DarkComet, RAT_DarkRAT and RAT_QRat for TeamViewer_Service.exe did it happen to you too? Thanks

Please provide a hash or a Virustotal.com link of an analysis of that file.

I can't see the matches on that file.
When did it match? Could you provide the full line of the match?
You can remove the hostname if you like.

This is the the line of match at the truncted end there are the classic Teamviewer path
YARA_suspicious

Ah, the rules triggered on the memory of the process - not the file on disk.
This could be caused by:

  1. Copying the LOKI Package to the end system using TeamViewer (cause this would bring the clear text signatures into the memory of the service)
  2. An attacked that injected malicious code in the process (less likely)

Thank you for your feedback, I'll verify accordingly with your indication