Sneed-Reactivity/yara-Neo23x0/apt_tidepool.yar

33 lines
1.4 KiB
Text
Raw Normal View History

/*
Yara Rule Set
Author: Florian Roth
Date: 2016-05-24
Identifier: TidePool (Ke3chang)
*/
rule TidePool_Malware {
meta:
description = "Detects TidePool malware mentioned in Ke3chang report by Palo Alto Networks"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "http://goo.gl/m2CXWR"
date = "2016-05-24"
hash1 = "9d0a47bdf00f7bd332ddd4cf8d95dd11ebbb945dda3d72aac512512b48ad93ba"
hash2 = "67c4e8ab0f12fae7b4aeb66f7e59e286bd98d3a77e5a291e8d58b3cfbc1514ed"
hash3 = "2252dcd1b6afacde3f94d9557811bb769c4f0af3cb7a48ffe068d31bb7c30e18"
hash4 = "38f2c86041e0446730479cdb9c530298c0c4936722975c4e7446544fd6dcac9f"
hash5 = "9d0a47bdf00f7bd332ddd4cf8d95dd11ebbb945dda3d72aac512512b48ad93ba"
id = "eec12fd7-f5f8-5bee-98e0-2111766deb55"
strings:
$x1 = "Content-Disposition: form-data; name=\"m1.jpg\"" fullword ascii
$x2 = "C:\\PROGRA~2\\IEHelper\\mshtml.dll" fullword wide
$x3 = "C:\\DOCUME~1\\ALLUSE~1\\IEHelper\\mshtml.dll" fullword wide
$x4 = "IEComDll.dat" fullword ascii
$s1 = "Content-Type: multipart/form-data; boundary=----=_Part_%x" fullword wide
$s2 = "C:\\Windows\\System32\\rundll32.exe" fullword wide
$s3 = "network.proxy.socks_port\", " fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and ( 1 of ($x*) ) ) or ( 4 of them )
}