Sneed-Reactivity/yara-Neo23x0/apt_revenge_rat.yar

35 lines
1.3 KiB
Text
Raw Normal View History

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-09-04
Identifier: RevengeRAT
Reference: Internal Research
*/
/* Rule Set ----------------------------------------------------------------- */
rule RevengeRAT_Sep17 {
meta:
description = "Detects RevengeRAT malware"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "Internal Research"
date = "2017-09-04"
modified = "2020-07-27"
hash1 = "2a86a4b2dcf1657bcb2922e70fc787aa9b66ec1c26dc2119f669bd2ce3f2e94a"
hash2 = "7c271484c11795876972aabeb277c7b3035f896c9e860a852d69737df6e14213"
hash3 = "fe00c4f9c8439eea50b44f817f760d8107f81e2dba7f383009fde508ff4b8967"
id = "7e58af06-a0ce-532c-9483-b1eca5e3cc28"
strings:
$x1 = "Nuclear Explosion.g.resources" fullword ascii
$x4 = "5B1EE7CAD3DFF220A95D1D6B91435D9E1520AC41" fullword ascii
$x5 = "\\RevengeRAT\\" ascii
$x6 = "Revenge-RAT client has been successfully installed." ascii
$x7 = "Nuclear Explosion.exe" fullword ascii
$x8 = " Revenge-RAT 201" wide
$s1 = "{11111-22222-20001-00001}" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 500KB and 1 of ($x*) ) or ( 3 of them )
}