Sneed-Reactivity/yara-mikesxrs/Fireeye/APT32_ActiveMime_Lure.yar

19 lines
671 B
Text
Raw Normal View History

rule APT32_ActiveMime_Lure{
meta:
filetype = "MIME entity"
author = "Ian Ahl (@TekDefense) and Nick Carr (@ItsReallyNick)"
date = "2017-03-02"
description = "Developed to detect APT32 (OceanLotus Group phishing lures used to target Fireeye Customers in 2016 and 2017"
reference = "https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html"
strings:
$a1 = "office_text" wide ascii
$a2 = "schtasks /create /tn" wide ascii
$a3 = "scrobj.dll" wide ascii
$a4 = "new-object net.webclient" wide ascii
$a5 = "GetUserName" wide ascii
$a6 = "WSHnet.UserDomain" wide ascii
$a7 = "WSHnet.UserName" wide ascii
condition:
4 of them
}