Sneed-Reactivity/yara-mikesxrs/plxsertr/ntserverexe.yar

20 lines
521 B
Text
Raw Normal View History

rule StormNtServerExe : ntserverexe
{
meta:
author = "plxsert"
date = "2014-01-15"
description = "Storm ntserver payload"
sample_filetype = "exe"
strings:
$callWinExec = { 8B FA C1 E9 02 F3 A5 8B C8 83 E1 03 F3 A4 8D 4C 24 10 51 FF 15 48 50 40 00 }
$string0 = "\\ntserver.dll" fullword
$string1 = "iexplore.exe" fullword
//$string2 = "C:\\Program Files\\Internet Explorer\\iexplore.exe" fullword
$string3 = "SeDebugPrivilege" fullword
condition:
all of ($string*) and ($callWinExec in (0..0x106c))
}