/* Yara Rule Set Author: Florian Roth Date: 2015-07-22 Identifier: CloudDuke */ /* Rule Set ----------------------------------------------------------------- */ rule CloudDuke_Malware { meta: description = "Detects CloudDuke Malware" license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE" author = "Florian Roth (Nextron Systems)" reference = "https://www.f-secure.com/weblog/archives/00002822.html" date = "2015-07-22" score = 60 hash1 = "97d8725e39d263ed21856477ed09738755134b5c0d0b9ae86ebb1cdd4cdc18b7" hash2 = "88a40d5b679bccf9641009514b3d18b09e68b609ffaf414574a6eca6536e8b8f" hash3 = "1d4ac97d43fab1d464017abb5d57a6b4601f99eaa93b01443427ef25ae5127f7" hash4 = "ed7abf93963395ce9c9cba83a864acb4ed5b6e57fd9a6153f0248b8ccc4fdb46" hash5 = "ee5eb9d57c3611e91a27bb1fc2d0aaa6bbfa6c69ab16e65e7123c7c49d46f145" hash6 = "a713982d04d2048a575912a5fc37c93091619becd5b21e96f049890435940004" hash7 = "56ac764b81eb216ebed5a5ad38e703805ba3e1ca7d63501ba60a1fb52c7ebb6e" id = "902ef68b-7ed1-5622-b796-4e3bb2388124" strings: $s1 = "ProcDataWrap" fullword ascii $s2 = "imagehlp.dll" fullword ascii $s3 = "dnlibsh" fullword ascii $s4 = "%ws_out%ws" fullword wide $s5 = "Akernel32.dll" fullword wide $op0 = { 0f b6 80 68 0e 41 00 0b c8 c1 e1 08 0f b6 c2 8b } /* Opcode */ $op1 = { 8b ce e8 f8 01 00 00 85 c0 74 41 83 7d f8 00 0f } /* Opcode */ $op2 = { e8 2f a2 ff ff 83 20 00 83 c8 ff 5f 5e 5d c3 55 } /* Opcode */ condition: uint16(0) == 0x5a4d and filesize < 720KB and 4 of ($s*) and 1 of ($op*) } /* Super Rules ------------------------------------------------------------- */ rule SFXRAR_Acrotray { meta: description = "Most likely a malicious file acrotray in SFX RAR / CloudDuke APT 5442.1.exe, 5442.2.exe" author = "Florian Roth (Nextron Systems)" reference = "https://www.f-secure.com/weblog/archives/00002822.html" date = "2015-07-22" super_rule = 1 score = 70 hash1 = "51e713c7247f978f5836133dd0b8f9fb229e6594763adda59951556e1df5ee57" hash2 = "5d695ff02202808805da942e484caa7c1dc68e6d9c3d77dc383cfa0617e61e48" hash3 = "56531cc133e7a760b238aadc5b7a622cd11c835a3e6b78079d825d417fb02198" id = "1566fb75-d3a8-5e22-b05b-3a2f37374f31" strings: $s1 = "winrarsfxmappingfile.tmp" fullword wide /* PEStudio Blacklist: strings */ $s2 = "GETPASSWORD1" fullword wide /* PEStudio Blacklist: strings */ $s3 = "acrotray.exe" fullword ascii $s4 = "CryptUnprotectMemory failed" fullword wide /* PEStudio Blacklist: strings */ condition: uint16(0) == 0x5a4d and filesize < 2449KB and all of them }