MalwareBazaar Database

This page shows some basic information the YARA rule maritime_RAR_v3 including corresponding malware samples.

Database Entry


YARA Rule:maritime_RAR_v3
Author:CERT OWN
Description:This rule is designed to monitor RAR archive files that contain certain maritime-related keywords. The monitored patterns include variations of MV (Motor Vessel) or MT(Motor Tanker) keywords followed by a combination of letters, numbers, and special characters, and ending with .exe. There are also patterns that match CTM, vessel, stowage, vsl.part, and agency followed by similar combinations of characters and .exe
Firstseen:2023-05-03 13:31:14 UTC
Lastseen:2025-10-09 13:16:40 UTC
Sightings:28

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter