Sneed-Reactivity/yara-Neo23x0/crime_enfal.yar

58 lines
1.9 KiB
Text
Raw Permalink Normal View History

rule MAL_Enfal_Nov22 {
meta:
old_rule_name = "Enfal_Malware"
description = "Detects a certain type of Enfal Malware"
author = "Florian Roth (Nextron Systems)"
reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.enfal"
date = "2015-02-10"
modified = "2023-01-06"
hash2 = "42fa6241ab94c73c7ab386d600fae70da505d752daab2e61819a0142b531078a"
hash2 = "bf433f4264fa3f15f320b35e773e18ebfe94465d864d3f4b2a963c3e5efd39c2"
score = 75
id = "9dcba14e-2175-5da0-8629-5b952c213f6c"
strings:
$xop1 = { 00 00 83 c9 ff 33 c0 f2 ae f7 d1 49 b8 ff 8f 01 00 2b c1 }
$s1 = "POWERPNT.exe" fullword ascii
$s2 = "%APPDATA%\\Microsoft\\Windows\\" ascii
$s3 = "%HOMEPATH%" fullword ascii
$s4 = "Server2008" fullword ascii
$s5 = "%ComSpec%" fullword ascii
condition:
uint16(0) == 0x5a4d and
filesize < 200KB and
( 1 of ($x*) or 3 of ($s*) )
}
rule Enfal_Malware_Backdoor {
meta:
description = "Generic Rule to detect the Enfal Malware"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
date = "2015/02/10"
super_rule = 1
hash0 = "6d484daba3927fc0744b1bbd7981a56ebef95790"
hash1 = "d4071272cc1bf944e3867db299b3f5dce126f82b"
hash2 = "6c7c8b804cc76e2c208c6e3b6453cb134d01fa41"
score = 60
id = "4631888c-e1e2-5969-a312-0f0011cd605c"
strings:
$x1 = "Micorsoft Corportation" fullword wide
$x2 = "IM Monnitor Service" fullword wide
$s1 = "imemonsvc.dll" fullword wide
$s2 = "iphlpsvc.tmp" fullword
$z1 = "urlmon" fullword
$z2 = "Registered trademarks and service marks are the property of their respec" wide
$z3 = "XpsUnregisterServer" fullword
$z4 = "XpsRegisterServer" fullword
$z5 = "{53A4988C-F91F-4054-9076-220AC5EC03F3}" fullword
condition:
uint16(0) == 0x5a4d and
(
1 of ($x*) or
( all of ($s*) and all of ($z*) )
)
}