rule Explosive_EXE : APT { meta: description = "Explosion/Explosive Malware - Volatile Cedar APT" author = "Check Point Software Technologies Inc." id = "3a9fb6b2-2f19-5d70-81ed-a08c3b8b2d80" strings: $DLD_S = "DLD-S:" $DLD_E = "DLD-E:" condition: all of them and uint16(0) == 0x5A4D } rule Explosion_Sample_1 { meta: description = "Explosion/Explosive Malware - Volatile Cedar APT" license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE" author = "Florian Roth (Nextron Systems)" reference = "http://goo.gl/5vYaNb" date = "2015/04/03" score = 70 hash = "c97693ecb36247bdb44ab3f12dfeae8be4d299bb" id = "dcf28185-75a8-5c9f-9f60-edb8dc187e16" strings: $s5 = "REG ADD \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run" ascii $s9 = "WinAutologon From Winlogon Reg" fullword ascii $s10 = "82BD0E67-9FEA-4748-8672-D5EFE5B779B0" fullword ascii $s11 = "IE:Password-Protected sites" fullword ascii $s12 = "\\his.sys" ascii $s13 = "HTTP Password" fullword ascii $s14 = "\\data.sys" ascii $s15 = "EL$_RasDefaultCredentials#0" fullword wide $s17 = "Office Outlook HTTP" fullword ascii $s20 = "Hist : %ws :%s

" fullword ascii condition: all of them and uint16(0) == 0x5A4D } rule Explosion_Sample_2 { meta: description = "Explosion/Explosive Malware - Volatile Cedar APT" license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE" author = "Florian Roth (Nextron Systems)" reference = "http://goo.gl/5vYaNb" date = "2015/04/03" score = 70 hash = "62fe6e9e395f70dd632c70d5d154a16ff38dcd29" id = "8be7ed50-0bfc-5302-b4fa-8817bf1750d7" strings: $s0 = "serverhelp.dll" fullword wide $s1 = "Windows Help DLL" fullword wide $s5 = "SetWinHoK" fullword ascii condition: all of them and uint16(0) == 0x5A4D } rule Explosion_Generic_1 { meta: description = "Generic Rule for Explosion/Explosive Malware - Volatile Cedar APT" license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE" author = "Florian Roth (Nextron Systems)" reference = "not set" date = "2015/04/03" score = 70 super_rule = 1 hash0 = "d0f059ba21f06021579835a55220d1e822d1233f95879ea6f7cb9d301408c821" hash1 = "1952fa94b582e9af9dca596b5e51c585a78b8b1610639e3b878bbfa365e8e908" hash2 = "d8fdcdaad652c19f4f4676cd2f89ae834dbc19e2759a206044b18601875f2726" hash3 = "e2e6ed82703de21eb4c5885730ba3db42f3ddda8b94beb2ee0c3af61bc435747" hash4 = "03641e5632673615f23b2a8325d7355c4499a40f47b6ae094606a73c56e24ad0" id = "dc3721b6-c19e-5449-9962-2a6f844e49b4" strings: $s0 = "autorun.exe" fullword $s1 = "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; MSIE 6.0; Windows NT 5.1; .NET CL" $s2 = "%drp.exe" fullword $s3 = "%s_%s%d.exe" fullword $s4 = "open=autorun.exe" fullword $s5 = "http://www.microsoft.com/en-us/default.aspx" fullword $s10 = "error.renamefile" fullword $s12 = "insufficient lookahead" fullword $s13 = "%s %s|" fullword $s16 = ":\\autorun.exe" fullword condition: 7 of them and uint16(0) == 0x5A4D } rule Explosive_UA { meta: description = "Explosive Malware Embedded User Agent - Volatile Cedar APT http://goo.gl/HQRCdw" license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE" author = "Florian Roth (Nextron Systems)" reference = "http://goo.gl/HQRCdw" date = "2015/04/03" score = 60 id = "d88d5fd6-adf9-5ced-8b79-e47e3ffbde50" strings: $x1 = "Mozilla/4.0 (compatible; MSIE 7.0; MSIE 6.0; Windows NT 5.1; .NET CLR 2.0.50727)" fullword condition: $x1 and uint16(0) == 0x5A4D } rule Webshell_Caterpillar_ASPX { meta: description = "Volatile Cedar Webshell - from file caterpillar.aspx" license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE" author = "Florian Roth (Nextron Systems)" reference = "http://goo.gl/emons5" date = "2015/04/03" super_rule = 1 hash0 = "af4c99208fb92dc42bc98c4f96c3536ec8f3fe56" id = "9af48c64-3768-5765-8245-38df000598a7" strings: $s0 = "Dim objNewRequest As WebRequest = HttpWebRequest.Create(sURL)" fullword $s1 = "command = \"ipconfig /all\"" fullword $s3 = "For Each xfile In mydir.GetFiles()" fullword $s6 = "Dim oScriptNet = Server.CreateObject(\"WSCRIPT.NETWORK\")" fullword $s10 = "recResult = adoConn.Execute(strQuery)" fullword $s12 = "b = Request.QueryString(\"src\")" fullword $s13 = "rw(\"\" + title + \"\")" fullword condition: all of them }