Sneed-Reactivity/yara-mikesxrs/RSA/RSA_index.yar

150 lines
4.5 KiB
Text
Raw Permalink Normal View History

rule Trojan_Lurker2_ORION
{
meta:
Author = "HB"
Date = "30 Sep 2013"
Project = "Orion"
Filename = "ntmrsvc.dll"
Reference = "https://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"
strings:
$b1 = {636D642E657865004C55524B}
$b2 = {45525F52414353004C55524B25735F534D5F2573}
$b3 = {4C55524B4552524143535F524D5F2573}
$a1 = "01234567890123456789eric0123456789012345678karen"
condition:
any of them
}
rule Trojan_HIKIT
{
meta:
Author = "HB"
Date = "26 Sep 2013"
Project = "Orion"
MD5 = "7D4F241428A2496142DF1C4A376CEC88"
MD5 = "A5F07E00D3EEF7A16ECFEC03E94677E3"
Reference = "https://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"
strings:
$b1 = {63006F006E006E006500630074002000250064002E00250064002E00250064002E002500640020002500640000000000680069006B00690074003E}
$b2 = {68006900740078002E0073007900730000006D00610074007200690078005F00700061007300730077006F007200}
$b3 = {700072006F0078007900000063006F006E006E006500630074000000660069006C006500000000007300680065006C006C}
$a1 = "Open backdoor error" wide
$a2 = "data send err..." wide
condition:
any of ($b*) or all of ($a*)
}
rule Trojan_Derusbi {
meta:
Author = "RSA_IR"
Date = "4Sept13"
File = "derusbi_variants v 1.3"
MD5 = " c0d4c5b669cc5b51862db37e972d31ec "
Reference = "https://www.emc.com/collateral/white-papers/h12756-wp-shell-crew.pdf"
strings:
$b1 = {8b 15 ?? ?? ?? ?? 8b ce d3 ea 83 c6 ?? 30 90 ?? ?? ?? ??
40 3b 05 ?? ?? ?? ?? 72 ??}
$b2 = {F3 5D 88 2E ?? ?? 00 00 BE 07 18 2E F0 5D 88 2E F7 5D 88 2E 0C A2 88 2E 4B 5D 88 2E F3 5D 88 2E}
$b3 = {4E E6 40 BB}
$b4 = {B1 19 BF 44}
$b5 = {6A F5 44 3D ?? ?? 00 00 27 AF D4 3D 69 F5 44 3D 6E F5 44 3D 95 0A 44 3D D2 F5 44 3D 6A F5 44 3D}
$b6 = {F3 5D 88 2E ?? ?? 00 00 BE 07 18 2E F0 5D 88 2E}
$b7 = {D6 D5 A4 A3 ?? ?? 00 00 9B 8F 34 A3 D5 D5 A4 A3 D2 D5 A4
A3 29 2A A4 A3}
$b8 = {C3 76 33 9F ?? ?? 00 00 8E 2C A3 9F C0 76 33 9F C7 76 33 9F 3C 89 33 9F}
condition:
2 of ($b1, $b2, $b3, $b4) and 1 of ($b5, $b6, $b7, $b8) }
rule Trojan_Derusbi_AP32_Orion
{
meta:
Author = "HB"
Date = "30 Sep 2013"
Project = "Orion"
Info = "Compressed with aPACK"
MagicBytes = "AP32"
Reference = "https://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"
strings:
$http1 = {00000000485454502F312E312032303000000000485454502F312E3020323030}
$http2 = {00000000434F4E4E4543542025733A256420485454502F312E300D0A0D0A0000}
$file1 = "%s\\seclogon.nls"
$file2 = "%s\\seclogon.nt"
$file3 = "%swindows.exe"
$o1 = "\\wsedrf\\qazxsw"
$o2 = "\\shell\\open\\command"
$b1 = {4C4F47494E494E464F3A2025640A0000}
$b2 = {436F6465506167653A2025730A000000}
$b3 = {5C636D642E657865}
condition:
all of ($http*) or all of ($file*) or all of ($o*) or all of ($b*)
}
rule Artifact_ORION_aPlib
{
meta:
Author = "HB"
Date = "30 Sep 2013"
Project = "Orion"
Reference = "https://blogs.rsa.com/wp-content/uploads/2015/05/RSA-IR-Case-Study.pdf"
strings:
$a1 = "aPLib v"
$a2 = "the smaller the better :)"
$a3 = "Joergen Ibsen"
condition:
all of them
}
rule TROJAN_Notepad {
meta:
Author = "RSA_IR"
Date = "4Jun13"
File = "notepad.exe v 1.1"
MD5 = "106E63DBDA3A76BEEB53A8BBD8F98927"
Reference = "https://www.emc.com/collateral/white-papers/h12756-wp-shell-crew.pdf"
strings:
$s1 = "75BAA77C842BE168B0F66C42C7885997"
$s2 = "B523F63566F407F3834BCC54AAA32524"
condition:
$s1 or $s2
}
rule liudoor{
meta:
author = "RSA FirstWatch"
date = "2015-07-23"
description = "Detects Liudoor daemon backdoor"
reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/"
hash0 = "78b56bc3edbee3a425c96738760ee406"
hash1 = "5aa0510f6f1b0e48f0303b9a4bfc641e"
hash2 = "531d30c8ee27d62e6fbe855299d0e7de"
hash3 = "2be2ac65fd97ccc97027184f0310f2f3"
hash4 = "6093505c7f7ec25b1934d3657649ef07"
type = "Win32 DLL"
strings:
$string0 = "Succ"
$string1 = "Fail"
$string2 = "pass"
$string3 = "exit"
$string4 = "svchostdllserver.dll"
$string5 = "L$,PQR"
$string6 = "0/0B0H0Q0W0k0"
$string7 = "QSUVWh"
$string8 = "Ht Hu["
condition:
all of them
}