Sneed-Reactivity/yara-mikesxrs/NCSC/SparrowDoor_strings.yar

24 lines
1 KiB
Text
Raw Normal View History

rule SparrowDoor_strings {
meta:
author = "NCSC"
description = "Strings that appear in SparrowDoors backdoor. Targeting in memory."
reference = "https://www.ncsc.gov.uk/files/NCSC-MAR-SparrowDoor.pdf"
date = "2022-02-28"
hash1 = "c1890a6447c991880467b86a013dbeaa66cc615f"
strings:
$reg = "Software\\Microsoft\\Windows\\CurrentVersion\\Run" ascii
$http_headers = {55 73 65 72 2D 41 67 65 6E 74 3A 20 4D 6F 7A 69 6C 6C 61 2F 34 2E 30 20 28 63 6F 6D 70 61 74 69 62 6C 65 3B 20 4D 53 49 45 20 35 2E 30 3B 20 57 69 6E 64 6F 77 73 20 4E 54 20 35 2E 30 29 0D 0A 41 63 63 65 70 74 2D 4C 61 6E 67 75 61 67 65 3A 20 65 6E 2D 55 53 0D 0A 41 63 63 65 70 74 3A 20 2A 2F 2A 0D 0A}
$http_proxy = "HTTPS=HTTPS://%s:%d" ascii
$debug = "SeDebugPrivilege" ascii
$av1 = "avp.exe" ascii // Kaspersky
$av2 = "ZhuDongFangYu.exe" ascii // Qihoo360
$av3 = "egui.exe" ascii // ESET
$av4 = "TMBMSRV.exe" ascii // Trend Micro
$av5 = "ccSetMgr.exe" ascii // Norton
$clipshot = "clipshot" ascii
$ComSpec = "ComSpec" ascii
$export = "curl_easy_init" ascii
condition:
10 of them
}