133 lines
5.5 KiB
Text
133 lines
5.5 KiB
Text
|
/*
|
||
|
Yara Rule Set
|
||
|
Author: Florian Roth
|
||
|
Date: 2015-09-24
|
||
|
Identifier: Unit 78020 Malware
|
||
|
*/
|
||
|
|
||
|
rule APT_MAL_CN_Unit78020_Sep15 {
|
||
|
meta:
|
||
|
description = "Detects malware used by Unit78020"
|
||
|
author = "Florian Roth (Nextron Systems)"
|
||
|
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
|
||
|
date = "2015-09-24"
|
||
|
modified = "2023-01-31"
|
||
|
score = 80
|
||
|
old_rule_name = "Unit78020_Malware_Gen1"
|
||
|
hash1 = "2b15e614fb54bca7031f64ab6caa1f77b4c07dac186826a6cd2e254090675d72"
|
||
|
hash2 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
|
||
|
hash3 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
|
||
|
hash4 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
|
||
|
hash5 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
|
||
|
hash6 = "88c5be84afe20c91e4024160303bafb044f98aa5fbf8c9f9997758a014238790"
|
||
|
id = "d26d401f-3806-5a0b-bdb3-87d5d8af209c"
|
||
|
strings:
|
||
|
$x1 = "greensky27.vicp.net" fullword wide
|
||
|
$x2 = "POST http://%s:%d/aspxabcdefg.asp?%s HTTP/1.1" fullword ascii
|
||
|
$x3 = "GET http://%s:%d/aspxabcdef.asp?%s HTTP/1.1" fullword ascii
|
||
|
/* additional strings based on PDF report - not found in samples */
|
||
|
$x4 = "serch.vicp.net" fullword wide
|
||
|
$x5 = "greensky27.vicp.net" fullword wide
|
||
|
$x6 = "greensky27.vicp.net.as" fullword wide
|
||
|
$x7 = "greensky27.vcip.net" fullword wide
|
||
|
$x8 = "pnoc-ec.vicp.net" fullword wide
|
||
|
$x9 = "aseanph.vicp.net" fullword wide
|
||
|
$x10 = "pnoc.vicp.net" fullword wide
|
||
|
|
||
|
$sa1 = "dMozilla/4.0 (compatible; MSIE 6.0;Windows NT 5.0; .NET CLR 1.1.4322)" wide fullword
|
||
|
$sa2 = "x-www-form-urlencoded/r/n" wide fullword
|
||
|
$sa3 = "/%d%s%d" ascii fullword
|
||
|
$sa4 = "dMozilla" wide fullword
|
||
|
$sa5 = "Accept-Language:En-us" wide fullword
|
||
|
|
||
|
$sb1 = "%USERPROFILE%\\Application Data\\Mozilla\\Firefox\\Profiles" wide fullword
|
||
|
$sb2 = "\\Office Start.lnk" wide fullword
|
||
|
$sb3 = "%02d-%02d-%02d %02d:%02d" wide fullword
|
||
|
|
||
|
$sc1 = "\\MSN Talk Start.lnk" wide fullword
|
||
|
$sc2 = "-GetModuleFileNameExW" ascii fullword
|
||
|
$sc3 = "dwError1 = %d" ascii fullword
|
||
|
condition:
|
||
|
uint16(0) == 0x5a4d and
|
||
|
filesize < 2000KB and (
|
||
|
1 of ($x*) or
|
||
|
all of ($sa*) or
|
||
|
all of ($sb*) or
|
||
|
all of ($sc*)
|
||
|
)
|
||
|
}
|
||
|
|
||
|
rule Unit78020_Malware_1 {
|
||
|
meta:
|
||
|
description = "Detects malware by Chinese APT PLA Unit 78020 - Specific Rule - msictl.exe"
|
||
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
||
|
author = "Florian Roth (Nextron Systems)"
|
||
|
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
|
||
|
date = "2015-09-24"
|
||
|
hash = "a93d01f1cc2d18ced2f3b2b78319aadc112f611ab8911ae9e55e13557c1c791a"
|
||
|
id = "0374de68-98cb-5cb8-a936-fe7845de9330"
|
||
|
strings:
|
||
|
$s1 = "%ProgramFiles%\\Internet Explorer\\iexplore.exe" fullword ascii
|
||
|
$s2 = "msictl.exe" fullword ascii
|
||
|
$s3 = "127.0.0.1:8080" fullword ascii
|
||
|
$s4 = "mshtml.dat" fullword ascii
|
||
|
$s5 = "msisvc" fullword ascii
|
||
|
$s6 = "NOKIAN95/WEB" fullword ascii
|
||
|
condition:
|
||
|
uint16(0) == 0x5a4d and filesize < 160KB and 4 of them
|
||
|
}
|
||
|
|
||
|
rule Unit78020_Malware_Gen2 {
|
||
|
meta:
|
||
|
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
|
||
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
||
|
author = "Florian Roth (Nextron Systems)"
|
||
|
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
|
||
|
date = "2015-09-24"
|
||
|
super_rule = 1
|
||
|
hash1 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
|
||
|
hash2 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
|
||
|
hash3 = "981e2fa1ae4145359036b46e8b53cc5da37dd2311204859761bd91572f025e8a"
|
||
|
id = "9492b1f8-c2a9-5e3b-ad62-fbc3d99392b3"
|
||
|
strings:
|
||
|
$s0 = "-GetModuleFileNameExW" fullword ascii
|
||
|
$s1 = "\\MSN Talk Start.lnk" wide
|
||
|
$s2 = ":SeDebugPrivilege" fullword wide
|
||
|
$s3 = "WinMM Version 1.0" fullword wide
|
||
|
$s4 = "dwError1 = %d" fullword ascii
|
||
|
$s5 = "*Can't Get" fullword wide
|
||
|
condition:
|
||
|
uint16(0) == 0x5a4d and filesize < 1000KB and all of them
|
||
|
}
|
||
|
|
||
|
rule Unit78020_Malware_Gen3 {
|
||
|
meta:
|
||
|
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule - Chong"
|
||
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
||
|
author = "Florian Roth (Nextron Systems)"
|
||
|
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
|
||
|
date = "2015-09-24"
|
||
|
super_rule = 1
|
||
|
hash1 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
|
||
|
hash2 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
|
||
|
id = "e26f386e-e98c-5005-9343-1873d2e35a1f"
|
||
|
strings:
|
||
|
$x1 = "GET http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
|
||
|
$x2 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
|
||
|
$x3 = "J:\\chong\\" ascii
|
||
|
|
||
|
$s1 = "User-Agent: Netscape" fullword ascii
|
||
|
$s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii
|
||
|
$s3 = "Software\\Microsoft\\Windows\\CurrentVersion\\explorer\\User Shell Folders" fullword wide
|
||
|
$s4 = "J:\\chong\\nod\\Release\\SslMM.exe" fullword ascii
|
||
|
$s5 = "MM.exe" fullword ascii
|
||
|
$s6 = "network.proxy.ssl" fullword wide
|
||
|
$s7 = "PeekNamePipe" fullword ascii
|
||
|
$s8 = "Host: %ws:%d" fullword ascii
|
||
|
$s9 = "GET %dHTTP/1.1" fullword ascii
|
||
|
$s10 = "SCHANNEL.DLL" fullword ascii /* Goodware String - occured 6 times */
|
||
|
condition:
|
||
|
( uint16(0) == 0x5a4d and filesize < 300KB and 1 of ($x*) ) or
|
||
|
4 of ($s*)
|
||
|
}
|