Sneed-Reactivity/yara-Neo23x0/apt_hizor_rat.yar

29 lines
1 KiB
Text
Raw Permalink Normal View History

rule apt_win32_dll_rat_hiZorRAT
{
meta:
dexcription = "Detects hiZor RAT"
hash1 = "75d3d1f23628122a64a2f1b7ef33f5cf"
hash2 = "d9821468315ccd3b9ea03161566ef18e"
hash3 = "b9af5f5fd434a65d7aa1b55f5441c90a"
ref1 = "http://www.threatgeek.com/2016/01/introducing-hi-zor-rat.html"
reference = "https://www.fidelissecurity.com/sites/default/files/FTA_1020_Fidelis_Inocnation_FINAL.pdf"
id = "06fd02f2-2630-5aac-8011-67d67ff42c3f"
strings:
// Part of the encoded User-Agent = Mozilla
$s1 = { c7 [5] 40 00 62 00 c7 [5] 77 00 64 00 c7 [5] 61 00 61 00 c7 [5] 6c 00 }
// XOR to decode User-Agent after string stacking 0x10001630
$s2 = { 66 [7] 0d 40 83 ?? ?? 7c ?? }
// XOR with 0x2E - 0x10002EF6
$s3 = { 80 [2] 2e 40 3b ?? 72 ?? }
$s4 = "CmdProcessExited" wide ascii
$s5 = "rootDir" wide ascii
$s6 = "DllRegisterServer" wide ascii
$s7 = "GetNativeSystemInfo" wide ascii
$s8 = "%08x%08x%08x%08x" wide ascii
condition:
(uint16(0) == 0x5A4D or uint32(0) == 0x464c457f) and (all of them)
}