Sneed-Reactivity/yara-Neo23x0/gen_mal_link.yar

27 lines
1 KiB
Text
Raw Normal View History

rule LNK_Malicious_Nov1 {
meta:
description = "Detects a suspicious LNK file"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://www.virustotal.com/en/file/ee069edc46a18698fa99b6d2204895e6a516af1a306ea986a798b178f289ecd6/analysis/"
date = "2017-11-06"
score = 60
id = "1d08ac78-6ff0-5e3f-acc2-91bd63267d4c"
strings:
$c1 = "C:\\Windows\\System32\\cmd.exe" ascii wide
$s1 = "cmd.exe /" ascii wide nocase
$s2 = { 00 25 00 53 00 79 00 73 00 74 00 65 00 6D 00 52
00 6F 00 6F 00 74 00 25 00 5C 00 53 00 79 00 73
00 74 00 65 00 6D 00 33 00 32 00 EF 01 2F 00 43
00 20 00 22 00 63 00 6D 00 64 00 2E 00 65 00 78
00 65 }
$s3 = "%comspec%" ascii wide nocase fullword
$fp1 = "Microsoft Visual" ascii wide
condition:
( uint32(0) == 0x0000004c and filesize < 4KB and $c1 and 1 of ($s*) )
and not 1 of ($fp*)
}