Sneed-Reactivity/yara-Neo23x0/mal_fortinet_coathanger_feb24.yar

39 lines
1.3 KiB
Text
Raw Normal View History

rule MAL_Fortinet_COATHANGER_Beacon {
meta:
description = "Detects COATHANGER beaconing code"
malware = "COATHANGER"
author = "NLD MIVD - JSCU"
date = "2024-02-06"
reference = "https://www.ncsc.nl/documenten/publicaties/2024/februari/6/mivd-aivd-advisory-coathanger-tlp-clear"
id = "0c84e6e4-afae-5150-82e2-8de528cd11fc"
strings:
$chunk_1 = { 48 B8 47 45 54 20 2F 20 48 54 48 89 45 B0 48 B8 54 50 2F 32 0A 48 6F 73 48 89 45 B8 48 B8 74 3A 20 77 77 77 2E 67 48 89 45 C0 48 B8 6F 6F 67 6C 65 2E 63 6F }
condition:
uint32(0) == 0x464c457f and filesize < 5MB and
any of them
}
rule MAL_Fortinet_COATHANGER_Files {
meta:
description = "Detects COATHANGER files by used filenames"
malware = "COATHANGER"
author = "NLD MIVD - JSCU"
date = "2024-02-06"
reference = "https://www.ncsc.nl/documenten/publicaties/2024/februari/6/mivd-aivd-advisory-coathanger-tlp-clear"
id = "0aa2f266-247b-5510-9fd9-4c7940fb80e8"
strings:
$1 = "/data2/"
$2 = "/httpsd"
$3 = "/preload.so"
$4 = "/authd"
$5 = "/tmp/packfile"
$6 = "/smartctl"
$7 = "/etc/ld.so.preload"
$8 = "/newcli"
$9 = "/bin/busybox"
condition:
(uint32(0) == 0x464c457f or uint32(4) == 0x464c457f)
and filesize < 5MB and 4 of them
}