29 lines
1 KiB
Text
29 lines
1 KiB
Text
|
rule apt_win32_dll_rat_hiZorRAT
|
||
|
{
|
||
|
meta:
|
||
|
dexcription = "Detects hiZor RAT"
|
||
|
hash1 = "75d3d1f23628122a64a2f1b7ef33f5cf"
|
||
|
hash2 = "d9821468315ccd3b9ea03161566ef18e"
|
||
|
hash3 = "b9af5f5fd434a65d7aa1b55f5441c90a"
|
||
|
ref1 = "http://www.threatgeek.com/2016/01/introducing-hi-zor-rat.html"
|
||
|
reference = "https://www.fidelissecurity.com/sites/default/files/FTA_1020_Fidelis_Inocnation_FINAL.pdf"
|
||
|
id = "06fd02f2-2630-5aac-8011-67d67ff42c3f"
|
||
|
strings:
|
||
|
// Part of the encoded User-Agent = Mozilla
|
||
|
$s1 = { c7 [5] 40 00 62 00 c7 [5] 77 00 64 00 c7 [5] 61 00 61 00 c7 [5] 6c 00 }
|
||
|
|
||
|
// XOR to decode User-Agent after string stacking 0x10001630
|
||
|
$s2 = { 66 [7] 0d 40 83 ?? ?? 7c ?? }
|
||
|
|
||
|
// XOR with 0x2E - 0x10002EF6
|
||
|
$s3 = { 80 [2] 2e 40 3b ?? 72 ?? }
|
||
|
|
||
|
$s4 = "CmdProcessExited" wide ascii
|
||
|
$s5 = "rootDir" wide ascii
|
||
|
$s6 = "DllRegisterServer" wide ascii
|
||
|
$s7 = "GetNativeSystemInfo" wide ascii
|
||
|
$s8 = "%08x%08x%08x%08x" wide ascii
|
||
|
condition:
|
||
|
(uint16(0) == 0x5A4D or uint32(0) == 0x464c457f) and (all of them)
|
||
|
}
|