Sneed-Reactivity/yara-Neo23x0/crime_mywscript_dropper.yar

27 lines
1,018 B
Text
Raw Normal View History

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-07-27
Identifier: MyWScript
*/
/* Rule Set ----------------------------------------------------------------- */
rule MyWScript_CompiledScript {
meta:
description = "Detects a scripte with default name Mywscript compiled with Script2Exe (can also be a McAfee tool https://community.mcafee.com/docs/DOC-4124)"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "Internal Research"
date = "2017-07-27"
score = 65
hash1 = "515f5188ba6d039b8c38f60d3d868fa9c9726e144f593066490c7c97bf5090c8"
id = "a0480a8a-5a7e-5829-851b-7301cfc9da60"
strings:
$x1 = "C:\\Projets\\vbsedit_source\\script2exe\\Release\\mywscript.pdb" fullword ascii
$s1 = "mywscript2" fullword wide
$s2 = "MYWSCRIPT2" fullword wide
condition:
uint16(0) == 0x5a4d and filesize < 800KB and ( $x1 or 2 of them )
}