Sneed-Reactivity/yara-Neo23x0/apt_monsoon.yar

65 lines
2.4 KiB
Text
Raw Normal View History

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-09-08
Identifier:
Reference: http://blog.fortinet.com/2017/04/05/in-depth-look-at-new-variant-of-monsoon-apt-backdoor-part-2
*/
/* Rule Set ----------------------------------------------------------------- */
import "pe"
rule Monsoon_APT_Malware_1 {
meta:
description = "Detects malware from Monsoon APT"
author = "Florian Roth (Nextron Systems)"
reference = "http://blog.fortinet.com/2017/04/05/in-depth-look-at-new-variant-of-monsoon-apt-backdoor-part-2"
date = "2017-09-08"
modified = "2023-01-06"
hash1 = "c9642f44d33e4c990066ce6fa0b0956ff5ace6534b64160004df31b9b690c9cd"
id = "a543c46d-01fc-5276-a915-183263956455"
strings:
$s1 = "cmd.exe /c start " fullword ascii
$s2 = "\\Microsoft\\Templates\\" ascii
$s3 = "\\Microsoft\\Windows\\" ascii
condition:
( uint16(0) == 0x5a4d and
filesize < 300KB and
(
pe.imphash() == "a0c824244f1d36ea1dd2759cf7599cd1" or
all of them
)
)
}
rule Monsoon_APT_Malware_2 {
meta:
description = "Detects malware from Monsoon APT"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "http://blog.fortinet.com/2017/04/05/in-depth-look-at-new-variant-of-monsoon-apt-backdoor-part-2"
date = "2017-09-08"
hash1 = "17c3d0fe08e1184c9737144fa065f4530def30d6591e5414a36463609f9aa53a"
hash2 = "8e0574ebf3dc640ac82987ab6ee2a02fc3dd5eaf4f6b5275272ba887acd15ac0"
hash3 = "bf93ca5f497fc7f38533d37fd4c083523ececc34aa2d3660d81014c0d9091ae3"
id = "dbbccf56-7e36-5c3a-b8d9-ee08d077f29f"
strings:
$x1 = "\\Microsoft\\Windows\\coco.exe" ascii
$x2 = ":\\System Volume Information\\config" fullword ascii
$x3 = " cscript.[BACKSPA[PAGE DO[CAPS LO[PAGE UPTPX498.dTPX499.d" fullword wide
$s1 = "\\Microsoft\\Templates\\msvcrt.dll" ascii
$s2 = "%04d/%02d/%02d %02d:%02d:%02d - {%s}" fullword wide
$s3 = "wininet.dll " fullword ascii
$s4 = "DMCZ0001.dat" fullword ascii
$s5 = "TZ0000001.dat" fullword ascii
$s6 = "\\MUT.dat" ascii
$s7 = "ouemm/emm!!!!!!!!!!!!!" fullword ascii
condition:
( uint16(0) == 0x5a4d and
filesize < 400KB and ( 1 of ($x*) or 3 of them )
)
}