Sneed-Reactivity/yara-mikesxrs/Spider-labs/punkey.yar

32 lines
1.3 KiB
Text
Raw Normal View History

rule Punkey
{
meta:
author = "Trustwave SpiderLabs"
date = "2015-04-09"
description = "Used to detect Punkey malware. Blog: https://www.trustwave.com/Resources/SpiderLabs-Blog/New-POS-Malware-Emerges---Punkey/"
strings:
$pdb1 = "C:\\Documents and Settings\\Administrator\\Desktop\\Verios\\jusched\\jusched32.pdb" nocase
$pdb2 = "C:\\Documents and Settings\\Administrator\\Desktop\\Verios\\jusched\\troi.pdb" nocase
$pdb3 = "D:\\freelancer\\gale.kreeb\\jusched10-19\\jusched32.pdb" nocase
$pdb4 = "D:\\freelancer\\gale.kreeb\\jusched10-19\\troi.pdb" nocase
$pdb5 = "C:\\Users\\iptables\\Desktop\\x86\\jusched32.pdb" nocase
$pdb6 = "C:\\Users\\iptables\\Desktop\\x86\\troi.pdb"
$pdb7 = "C:\\Users\\iptables\\Desktop\\27 Octomber\\jusched10-27\\troi.pdb" nocase
$pdb8 = "D:\\work\\visualstudio\\jusched\\dllx64.pdb" nocase
$string0 = "explorer.exe" nocase
$string1 = "jusched.exe" nocase
$string2 = "dllx64.dll" nocase
$string3 = "exportDataApi" nocase
$memory1 = "troi.exe"
$memory2 = "unkey="
$memory3 = "key="
$memory4 = "UPDATE"
$memory5 = "RUN"
$memory6 = "SCANNING"
$memory7 = "86afc43868fea6abd40fbf6d5ed50905"
$memory8 = "f4150d4a1ac5708c29e437749045a39a"
condition:
(any of ($pdb*)) or (all of ($str*)) or (all of ($mem*))
}