Sneed-Reactivity/yara-Neo23x0/vul_drivecrypt.yar

39 lines
1.4 KiB
Text
Raw Normal View History

rule EXP_DriveCrypt_1 {
meta:
description = "Detects DriveCrypt exploit"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "Internal Research"
date = "2018-08-21"
hash1 = "0dd09bc97c768abb84d0fb6d1ae7d789f1f83bfb2ce93ff9ff3c538dc1effa33"
id = "c192ca53-1de3-5d2d-a216-47e534ff4d01"
strings:
$s1 = "x64passldr.exe" fullword ascii
$s2 = "DCR.sys" fullword ascii
$s3 = "amd64\\x64pass.sys" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 700KB and 2 of them
}
rule EXP_DriveCrypt_x64passldr {
meta:
description = "Detects DriveCrypt exploit"
author = "Florian Roth (Nextron Systems)"
reference = "Internal Research"
date = "2018-08-21"
modified = "2023-01-06"
hash1 = "c828304c83619e2cb9dab80305e5286aba91742dc550e1469d91812af27101a1"
id = "94594b4e-091d-5964-b2b4-5d7d44601b28"
strings:
$s1 = "\\x64\\x64passldr.pdb" ascii
$s2 = "\\amd64\\x64pass.sys" wide
$s3 = "\\\\.\\DCR" fullword ascii
$s4 = "Open SC Mgr Error" fullword ascii
$s5 = "thing is ok " fullword ascii
$s6 = "x64pass" fullword wide
$s7 = "%ws\\%ws\\Security" fullword wide
condition:
uint16(0) == 0x5a4d and filesize < 200KB and 3 of them
}