Sneed-Reactivity/yara-mikesxrs/RSA/Kingslayer_codekey.yar

19 lines
678 B
Text
Raw Normal View History

rule Kingslayer_codekey
{
meta:
description = "detects Win32 files signed with stolen code signing key used in Kingslayer attack"
author = "RSA Research"
reference = "http://firstwat.ch/kingslayer"
date = "03 February 2017"
hash0 = "fbb7de06dcb6118e060dd55720b51528"
hash1 = "3974a53de0601828e272136fb1ec5106"
hash2 = "f97a2744a4964044c60ac241f92e05d7"
hash3 = "76ab4a360b59fe99be1ba7b9488b5188"
hash4 = "1b57396c834d2eb364d28eb0eb28d8e4"
strings:
$val0 = { 31 33 31 31 30 34 31 39 33 39 31 39 5A 17 0D 31 35 31 31 30 34 31 39 33 39 31 39 5A }
$ven0 = { 41 6C 74 61 69 72 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 }
condition:
uint16(0) == 0x5A4D and $val0 and $ven0
}