Sneed-Reactivity/yara-Neo23x0/crime_kr_malware.yar

35 lines
1.3 KiB
Text
Raw Permalink Normal View History

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-08-23
Identifier: South Korea Target
Reference: https://twitter.com/eyalsela/status/900250203097354240
*/
/* Rule Set ----------------------------------------------------------------- */
rule KR_Target_Malware_Aug17 {
meta:
description = "Detects malware that targeted South Korea in Aug 2017 - file MRDqsbuEqGxrgqtbXU.exe"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://twitter.com/eyalsela/status/900250203097354240"
date = "2017-08-23"
hash1 = "82cada01643a42c8cd9600b8c33f3760d15e5eb6fabec2d531cf13cece095c78"
id = "2a6a7921-953a-502c-9702-b27325b2c3b8"
strings:
$x1 = { 53 00 75 00 63 00 63 00 65 00 00 2F 53 00 6F 00
6D 00 65 00 74 00 68 00 69 00 6E 00 67 00 20 00
77 00 65 00 6E 00 74 00 20 00 77 00 72 00 6F 00
6E 00 67 00 }
$x2 = "lnVMODvjSfOQQnfiuFogghlL" fullword ascii
$x3 = "E X I T +R U N A S /a P P d A T A " fullword ascii
$x4 = "uSEsHELLeXECUTE gETeNTRYaSSEMBLY GET" fullword ascii
$x5 = "ZahUKBXz" fullword wide
condition:
( uint16(0) == 0x5a4d and
filesize < 800KB and
1 of them
)
}