Sneed-Reactivity/yara-Neo23x0/gen_wmi_implant.yar

29 lines
1.1 KiB
Text
Raw Normal View History

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-03-24
Identifier: WMImplant
*/
/* Rule Set ----------------------------------------------------------------- */
rule WMImplant {
meta:
description = "Auto-generated rule - file WMImplant.ps1"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://www.fireeye.com/blog/threat-research/2017/03/wmimplant_a_wmi_ba.html"
date = "2017-03-24"
hash1 = "860d7c237c2395b4f51b8c9bd0ee6cab06af38fff60ce3563d160d50c11d2f78"
id = "18dadc55-e12f-5c4c-9e11-27dc2d6c8dd2"
strings:
$x1 = "Invoke-ProcessPunisher -Creds $RemoteCredential" fullword ascii
$x2 = "$Target -query \"SELECT * FROM Win32_NTLogEvent WHERE (logfile='security')" ascii
$x3 = "WMImplant -Creds" fullword ascii
$x4 = "-Download -RemoteFile C:\\passwords.txt" ascii
$x5 = "-Command 'powershell.exe -command \"Enable-PSRemoting" fullword ascii
$x6 = "Invoke-WMImplant" fullword ascii
condition:
1 of them
}