Sneed-Reactivity/yara-Neo23x0/gen_ps_empire_eval.yar

41 lines
1.5 KiB
Text
Raw Normal View History

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-07-27
Identifier: PowerShell Empire Eval
2 of 8 rules
*/
/* Rule Set ----------------------------------------------------------------- */
rule PowerShell_Emp_Eval_Jul17_A1 {
meta:
description = "Detects suspicious sample with PowerShell content "
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "PowerShell Empire Eval"
date = "2017-07-27"
hash1 = "4d10e80c7c80ef040efc680424a429558c7d76a965685bbc295908cb71137eba"
id = "1699f153-f972-5e06-a94b-eb95af637e6b"
strings:
$s1 = "powershell" wide
$s2 = "pshcmd" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 30KB and all of them )
}
rule PowerShell_Emp_Eval_Jul17_A2 {
meta:
description = "Detects suspicious sample with PowerShell content "
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "PowerShell Empire Eval"
date = "2017-07-27"
hash1 = "e14c139159c23fdc18969afe57ec062e4d3c28dd42a20bed8ddde37ab4351a51"
id = "8f299fcd-156c-5ce1-8582-c2a4ff2c0cfc"
strings:
$x1 = "\\support\\Release\\ab.pdb" ascii
$s2 = "powershell.exe" ascii fullword
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and all of them )
}