Sneed-Reactivity/yara-Neo23x0/apt_hkdoor.yar

100 lines
3.8 KiB
Text
Raw Normal View History

import "pe"
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-10-18
Identifier: HKDoor
Reference: https://www.cylance.com/en_us/blog/threat-spotlight-opening-hackers-door.html
*/
rule hkdoor_backdoor_dll {
meta:
description = "Hacker's Door Backdoor DLL"
author = "Cylance Inc."
reference = "https://www.cylance.com/en_us/blog/threat-spotlight-opening-hackers-door.html"
id = "470e5d37-8a5a-500f-b9b9-245b8dc2c4d7"
strings:
$s1 = "The version of personal hacker's door server is" fullword ascii
$s2 = "The connect back interval is %d (minutes)" fullword ascii
$s3 = "I'mhackeryythac1977" fullword ascii
$s4 = "Welcome to http://www.yythac.com" fullword ascii
$s5 = "SeLoadDriverPrivilege" fullword ascii
condition:
uint16(0) == 0x5a4d and
filesize < 400KB and
( 3 of ($s*) ) and
pe.characteristics & pe.DLL and
pe.imports("ws2_32.dll", "WSAStartup") and
pe.imports("ws2_32.dll", "sendto")
}
rule hkdoor_backdoor {
meta:
description = "Hacker's Door Backdoor"
author = "Cylance Inc."
reference = "https://www.cylance.com/en_us/blog/threat-spotlight-opening-hackers-door.html"
id = "470e5d37-8a5a-500f-b9b9-245b8dc2c4d7"
strings:
$s1 = "http://www.yythac.com" fullword ascii
$s2 = "Example:%s 192.168.1.100 139 -p yyt_hac -t 1" fullword ascii
$s3 = "password-----------The hacker's door's password" fullword ascii
$s4 = "It is the client of hacker's door %d.%d public version" fullword ascii
$s5 = "hkdoordll.dll" fullword ascii
$s6 = "http://www.yythac.com/images/mm.jpg" fullword ascii
$s7 = "I'mhackeryythac1977" fullword ascii
$s8 = "yythac.yeah.net" fullword ascii
condition:
uint16(0) == 0x5a4d and
filesize < 400KB and
( 4 of ($s*) )
}
rule hkdoor_dropper {
meta:
description = "Hacker's Door Dropper"
author = "Cylance Inc."
date = "2018-01-01"
modified = "2023-01-07"
reference = "https://www.cylance.com/en_us/blog/threat-spotlight-opening-hackers-door.html"
id = "8c8171b9-6256-591a-8f74-abac1cb9a50b"
strings:
$s1 = "The version of personal hacker's door server is" fullword ascii
$s2 = "The connect back interval is %d (minutes)" fullword ascii
$s3 = "I'mhackeryythac1977" fullword ascii
$s4 = "Welcome to http://www.yythac.com" fullword ascii
$s5 = "SeLoadDriverPrivilege" fullword ascii
$s6 = "\\drivers\\ntfs.sys" ascii
$s7 = "kifes" fullword ascii
condition:
uint16(0) == 0x5a4d and
filesize < 1000KB and
( 4 of ($s*) ) and
pe.number_of_resources > 0 and
for any i in (0..pe.number_of_resources - 1):
(pe.resources[i].type_string == "B\x00I\x00N\x00" and
uint16(pe.resources[i].offset) == 0x5A4D) and
pe.imports("KERNEL32.dll", "FindResourceW") and
pe.imports("KERNEL32.dll", "LoadResource")
}
rule hkdoor_driver {
meta:
description = "Hacker's Door Driver"
author = "Cylance Inc."
date = "2018-01-01"
modified = "2023-01-07"
reference = "https://www.cylance.com/en_us/blog/threat-spotlight-opening-hackers-door.html"
id = "50b763a9-6d4f-59dd-ba6c-27e2ae117523"
strings:
$s1 = "ipfltdrv.sys" fullword ascii
$s2 = "Patch Success." fullword ascii
$s3 = "\\DosDevices\\kifes" ascii
$s4 = "\\Device\\kifes" ascii
$s5 = {75 28 22 36 30 5b 4a 77 7b 58 4d 6c 3f 73 63 5e 38 47 7c 7d 7a 40 3a 41 2a 45 4e 44 79 64 67 6d 65 74 21 39 23 3c 20 49 43 69 4c 3b 31 57 2f 55 3e 26 59 62 61 54 53 5a 2d 25 78 35 5c 76 3d 34 27 6b 5f 72 2c 32 4f 2b 71 66 42 33 37 56 52 60 5d 29 4b 51 2e 6f 50 68 6e 6a 24 48 7e 46 70}
condition:
uint16(0) == 0x5a4d and
pe.subsystem == pe.SUBSYSTEM_NATIVE and
( 4 of ($s*) )
}