/* Yara Rule Set Author: Florian Roth Date: 2015-07-14 Identifier: SeaDuke */ /* Rule Set ----------------------------------------------------------------- */ rule SeaDuke_Sample { meta: description = "SeaDuke Malware" license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE" author = "Florian Roth (Nextron Systems)" reference = "http://goo.gl/MJ0c2M" date = "2015-07-14" score = 70 hash = "d2e570129a12a47231a1ecb8176fa88a1bf415c51dabd885c513d98b15f75d4e" id = "011a303b-b051-519f-9687-668c9bcd15ca" strings: $s0 = "bpython27.dll" fullword ascii $s1 = "email.header(" ascii /* PEStudio Blacklist: strings */ $s2 = "LogonUI.exe" fullword wide /* PEStudio Blacklist: strings */ $s3 = "Crypto.Cipher.AES(" ascii /* PEStudio Blacklist: strings */ $s4 = "mod is NULL - %s" fullword ascii condition: uint16(0) == 0x5a4d and filesize < 4000KB and all of them }