Sneed-Reactivity/yara-Neo23x0/apt_turbo_campaign.yar

190 lines
5.8 KiB
Text
Raw Normal View History

rule apt_nix_elf_derusbi {
meta:
description = "Detects Derusbi Backdoor ELF"
author = "Fidelis Cybersecurity"
date = "2016/02/29"
modified = "2023-05-04"
reference = "https://github.com/fideliscyber/indicators/tree/master/FTA-1021"
id = "c825c5d6-1c2f-5ee7-871e-4be3f41d73f7"
strings:
$s1 = "LxMain"
$s2 = "execve"
$s3 = "kill"
$s4 = "cp -a %s %s"
$s5 = "%s &"
$s6 = "dbus-daemon"
$s7 = "--noprofile"
$s8 = "--norc"
$s9 = "TERM=vt100"
$s10 = "/proc/%u/cmdline"
$s11 = "loadso"
$s12 = "/proc/self/exe"
$s13 = "Proxy-Connection: Keep-Alive"
$s14 = "Connection: Keep-Alive"
$s15 = "CONNECT %s"
$s16 = "HOST: %s:%d"
$s17 = "User-Agent: Mozilla/4.0"
$s18 = "Proxy-Authorization: Basic %s"
$s19 = "Server: Apache"
$s20 = "Proxy-Authenticate"
$s21 = "gettimeofday"
$s22 = "pthread_create"
$s23 = "pthread_join"
$s24 = "pthread_mutex_init"
$s25 = "pthread_mutex_destroy"
$s26 = "pthread_mutex_lock"
$s27 = "getsockopt"
$s28 = "socket"
$s29 = "setsockopt"
$s30 = "select"
$s31 = "bind"
$s32 = "shutdown"
$s33 = "listen"
$s34 = "opendir"
$s35 = "readdir"
$s36 = "closedir"
$s37 = "rename"
condition:
uint32(0) == 0x464c457f and all of them
}
rule apt_nix_elf_derusbi_kernelModule
{
meta:
description = "Detects Derusbi Backdoor ELF Kernel Module"
author = "Fidelis Cybersecurity"
date = "2016/02/29"
modified = "2023-05-04"
reference = "https://github.com/fideliscyber/indicators/tree/master/FTA-1021"
id = "98196ffc-8a6f-5edc-a688-eeb449410b72"
strings:
$s1 = "__this_module"
$s2 = "init_module"
$s3 = "unhide_pid"
$s4 = "is_hidden_pid"
$s5 = "clear_hidden_pid"
$s6 = "hide_pid"
$s7 = "license"
$s8 = "description"
$s9 = "srcversion="
$s10 = "depends="
$s12 = "vermagic="
$s13 = "current_task"
$s14 = "sock_release"
$s15 = "module_layout"
$s16 = "init_uts_ns"
$s17 = "init_net"
$s18 = "init_task"
$s19 = "filp_open"
$s20 = "__netlink_kernel_create"
$s21 = "kfree_skb"
condition:
uint32(0) == 0x464c457f and all of them
}
rule apt_nix_elf_Derusbi_Linux_SharedMemCreation {
meta:
description = "Detects Derusbi Backdoor ELF Shared Memory Creation"
author = "Fidelis Cybersecurity"
date = "2016/02/29"
reference = "https://github.com/fideliscyber/indicators/tree/master/FTA-1021"
id = "068b7bea-853d-57e8-a9fe-8b451dbc7582"
strings:
$byte1 = { B6 03 00 00 ?? 40 00 00 00 ?? 0D 5F 01 82 }
condition:
uint32(0) == 0x464C457F and any of them
}
rule apt_nix_elf_Derusbi_Linux_Strings {
meta:
description = "Detects Derusbi Backdoor ELF Strings"
author = "Fidelis Cybersecurity"
date = "2016/02/29"
reference = "https://github.com/fideliscyber/indicators/tree/master/FTA-1021"
id = "06717cc9-678d-5912-a671-65605b9c9968"
strings:
$a1 = "loadso" wide ascii fullword
$a2 = "\nuname -a\n\n" wide ascii
$a3 = "/dev/shm/.x11.id" wide ascii
$a4 = "LxMain64" wide ascii nocase
$a5 = "# \\u@\\h:\\w \\$ " wide ascii
$b1 = "0123456789abcdefghijklmnopqrstuvwxyz" wide
$b2 = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ" wide
$b3 = "ret %d" wide fullword
$b4 = "uname -a\n\n" wide ascii
$b5 = "/proc/%u/cmdline" wide ascii
$b6 = "/proc/self/exe" wide ascii
$b7 = "cp -a %s %s" wide ascii
$c1 = "/dev/pts/4" wide ascii fullword
$c2 = "/tmp/1408.log" wide ascii fullword
condition:
uint32(0) == 0x464C457F and
(
(1 of ($a*) and 4 of ($b*) ) or
(1 of ($a*) and 1 of ($c*)) or
2 of ($a*) or
all of ($b*)
)
}
rule apt_win_exe_trojan_derusbi {
meta:
description = "Detects Derusbi Backdoor Win32"
author = "Fidelis Cybersecurity"
date = "2016/02/29"
reference = "https://github.com/fideliscyber/indicators/tree/master/FTA-1021"
id = "6e7fecfa-f801-59b2-a394-df4c368011b7"
strings:
$sa_4 = "HOST: %s:%d"
$sa_6 = "User-Agent: Mozilla"
$sa_7 = "Proxy-Connection: Keep-Alive"
$sa_8 = "Connection: Keep-Alive"
$sa_9 = "Server: Apache"
$sa_12 = "ZwUnloadDriver"
$sa_13 = "ZwLoadDriver"
$sa_18 = "_time64"
$sa_19 = "DllRegisterServer"
$sa_20 = "DllUnregisterServer"
$sa_21 = { 8b [5] 8b ?? d3 ?? 83 ?? 08 30 [5] 40 3b [5] 72 } // Decode Driver
$sb_1 = "PCC_CMD_PACKET"
$sb_2 = "PCC_CMD"
$sb_3 = "PCC_BASEMOD"
$sb_4 = "PCC_PROXY"
$sb_5 = "PCC_SYS"
$sb_6 = "PCC_PROCESS"
$sb_7 = "PCC_FILE"
$sb_8 = "PCC_SOCK"
$sc_1 = "bcdedit -set testsigning" wide ascii
$sc_2 = "update.microsoft.com" wide ascii
$sc_3 = "_crt_debugger_hook" wide ascii
$sc_4 = "ue8G5" wide ascii
/* $sd_1 = "NET" wide ascii */ /* disabled due to performance reasons */
$sd_2 = "\\\\.\\pipe\\%s" wide ascii
$sd_3 = ".dat" wide ascii
$sd_4 = "CONNECT %s:%d" wide ascii
$sd_5 = "\\Device\\" wide ascii
$se_1 = "-%s-%04d" wide ascii
$se_2 = "-%04d" wide ascii
/* $se_3 = "FAL" wide ascii */ /* disabled due to performance reasons */
/* $se_4 = "OK" wide ascii */ /* disabled due to performance reasons */
$se_5 = "2.03" wide ascii
/* $se_6 = "XXXXXXXXXXXXXXX" wide ascii */ /* disabled due to memory usage reasons */
condition:
uint16(0) == 0x5A4D and (
all of ($sa_*) or
(
(8 of ($sa_*)) and (
(5 of ($sb_*)) or
(3 of ($sc_*)) or
(all of ($sd_*)) or
( 1 of ($sc_*) and all of ($se_*) )
)
)
)
}