08e8d462fe
RED PILL 🔴 💊
71 lines
2.8 KiB
Text
71 lines
2.8 KiB
Text
// For feedback or questions contact us at: github@eset.com
|
|
// https://github.com/eset/malware-ioc/
|
|
//
|
|
// These yara rules are provided to the community under the two-clause BSD
|
|
// license as follows:
|
|
//
|
|
// Copyright (c) 2017, ESET
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without
|
|
// modification, are permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this
|
|
// list of conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
// this list of conditions and the following disclaimer in the documentation
|
|
// and/or other materials provided with the distribution.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
// AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
// IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
// DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
|
// FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
// DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
// SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
// CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
// OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
import "pe"
|
|
|
|
rule generic_carbon
|
|
{
|
|
meta:
|
|
author = "ESET Research"
|
|
date = "2017-03-30"
|
|
description = "Turla Carbon malware"
|
|
reference = "https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/"
|
|
source = "https://github.com/eset/malware-ioc/"
|
|
contact = "github@eset.com"
|
|
license = "BSD 2-Clause"
|
|
|
|
id = "efdc0d16-a974-5c00-a401-391d60f3081e"
|
|
strings:
|
|
$s1 = "ModStart"
|
|
$t1 = "STOP|OK"
|
|
$t2 = "STOP|KILL"
|
|
|
|
condition:
|
|
(uint16(0) == 0x5a4d) and (1 of ($s*)) and (1 of ($t*))
|
|
}
|
|
|
|
rule carbon_metadata
|
|
{
|
|
meta:
|
|
author = "ESET Research"
|
|
date = "2017-03-30"
|
|
description = "Turla Carbon malware"
|
|
reference = "https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/"
|
|
source = "https://github.com/eset/malware-ioc/"
|
|
contact = "github@eset.com"
|
|
license = "BSD 2-Clause"
|
|
|
|
id = "976b6a7d-00bf-5d0f-baf9-84fc5dbd21a2"
|
|
condition:
|
|
(pe.version_info["InternalName"] contains "SERVICE.EXE" or
|
|
pe.version_info["InternalName"] contains "MSIMGHLP.DLL" or
|
|
pe.version_info["InternalName"] contains "MSXIML.DLL")
|
|
and pe.version_info["CompanyName"] contains "Microsoft Corporation"
|
|
}
|