Sneed-Reactivity/yara-Neo23x0/apt_golddragon.yar
Sam Sneed 08e8d462fe OMG ISTG PLS WORK
RED PILL 🔴 💊
2024-07-25 12:43:35 -05:00

154 lines
6.7 KiB
Text

/*
Yara Rule Set
Author: Florian Roth
Date: 2018-02-03
Identifier: Gold Dragon
Reference: https://goo.gl/rW1yvZ
*/
import "pe"
/* Rule Set ----------------------------------------------------------------- */
rule GoldDragon_malware_Feb18_1 {
meta:
description = "Detects malware from Gold Dragon report"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/"
date = "2018-02-03"
score = 90
id = "1da29f0f-4e83-56a0-b843-3b19d9b9a1b7"
condition:
uint16(0) == 0x5a4d and filesize < 300KB and (
pe.imphash() == "168c2f7752511dfd263a83d5d08a90db" or
pe.imphash() == "0606858bdeb129de33a2b095d7806e74" or
pe.imphash() == "51d992f5b9e01533eb1356323ed1cb0f" or
pe.imphash() == "bb801224abd8562f9ee8fb261b75e32a"
)
}
rule GoldDragon_Aux_File {
meta:
description = "Detects export from Gold Dragon - February 2018"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://securingtomorrow.mcafee.com/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/"
date = "2018-02-03"
score = 90
id = "8f23dec4-e369-500f-a036-32df13e5543e"
strings:
$x1 = "/////////////////////regkeyenum////////////" ascii
condition:
filesize < 500KB and 1 of them
}
rule GoldDragon_Ghost419_RAT {
meta:
description = "Detects Ghost419 RAT from Gold Dragon report"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/rW1yvZ"
date = "2018-02-03"
modified = "2023-01-06"
hash1 = "45bfa1327c2c0118c152c7192ada429c6d4ae03b8164ebe36ab5ba9a84f5d7aa"
hash2 = "ee7a9a7589cbbcac8b6bf1a3d9c5d1c1ada98e68ac2f43ff93f768661b7e4a85"
hash3 = "dee482e5f461a8e531a6a7ea4728535aafdc4941a8939bc3c55f6cb28c46ad3d"
hash4 = "2df9e274ce0e71964aca4183cec01fb63566a907981a9e7384c0d73f86578fe4"
hash5 = "111ab6aa14ef1f8359c59b43778b76c7be5ca72dc1372a3603cd5814bfb2850d"
hash6 = "0ca12b78644f7e4141083dbb850acbacbebfd3cfa17a4849db844e3f7ef1bee5"
hash7 = "ae1b32aac4d8a35e2c62e334b794373c7457ebfaaab5e5e8e46f3928af07cde4"
hash8 = "c54837d0b856205bd4ae01887aae9178f55f16e0e1a1e1ff59bd18dbc8a3dd82"
hash9 = "db350bb43179f2a43a1330d82f3afeb900db5ff5094c2364d0767a3e6b97c854"
id = "8ac951d5-4a18-50c5-8ded-8a0a6b585fd6"
strings:
$x2 = "WebKitFormBoundarywhpFxMBe19cSjFnG" ascii
$x3 = "\\Microsoft\\HNC\\" ascii
$x4 = "\\anternet abplorer" ascii
$x5 = "%s\\abxplore.exe" fullword ascii
$x6 = "GHOST419" fullword ascii
$x7 = "I,m Online. %04d - %02d - %02d - %02d - %02d" fullword ascii
$x8 = "//////////////////////////regkeyenum//////////////" ascii
$s0 = "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; .NET CLR 1.1.4322)" fullword ascii
$s1 = "www.GoldDragon.com" fullword ascii
$s2 = "/c systeminfo >> %s" fullword ascii
$s3 = "/c dir %s\\ >> %s" fullword ascii
$s4 = "DownLoading %02x, %02x, %02x" fullword ascii
$s5 = "Tran_dll.dll" fullword ascii
$s6 = "MpCmdRunkr.dll" fullword ascii
$s7 = "MpCmdRun.dll" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 600KB and (
( pe.exports("ExportFunction") and pe.number_of_exports == 1 ) or
( 1 of ($x*) and 1 of ($s*) ) or
3 of them
)
}
rule GoldDragon_RunningRAT {
meta:
description = "Detects Running RAT from Gold Dragon report"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/rW1yvZ"
date = "2018-02-03"
hash1 = "0852f2c5741997d8899a34bb95c349d7a9fb7277cd0910656c3ce37a6f11cb88"
hash2 = "2981e1a1b3c395cee6e4b9e6c46d062cf6130546b04401d724750e4c8382c863"
hash3 = "7aa99ebc49a130f07304ed25655862a04cc20cb59d129e1416a7dfa04f7d3e51"
id = "7de93103-46a5-5aba-90cf-26735a6a580e"
strings:
$x1 = "C:\\USERS\\WIN7_x64\\result.log" fullword wide
$x2 = "rundll32.exe %s RunningRat" fullword ascii
$x3 = "SystemRat.dll" fullword ascii
$x4 = "rundll32.exe %s ExportFunction" fullword ascii
$x5 = "rundll32.exe \"%s\" RunningRat" fullword ascii
$x6 = "ixeorat.bin" fullword ascii
$x7 = "C:\\USERS\\Public\\result.log" fullword ascii
$a1 = "emanybtsohteg" fullword ascii /* reversed goodware string 'gethostbyname' */
$a2 = "tekcosesolc" fullword ascii /* reversed goodware string 'closesocket' */
$a3 = "emankcosteg" fullword ascii /* reversed goodware string 'getsockname' */
$a4 = "emantsohteg" fullword ascii /* reversed goodware string 'gethostname' */
$a5 = "tpokcostes" fullword ascii /* reversed goodware string 'setsockopt' */
$a6 = "putratSASW" fullword ascii /* reversed goodware string 'WSAStartup' */
$s1 = "ParentDll.dll" fullword ascii
$s2 = "MR - Already Existed" fullword ascii
$s3 = "MR First Started, Registed OK!" fullword ascii
$s4 = "RM-M : LoadResource OK!" fullword ascii
$s5 = "D:\\result.log" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 300KB and (
pe.imphash() == "c78ccc8f02286648c4373d3bf03efc43" or
pe.exports("RunningRat") or
1 of ($x*) or
5 of ($a*) or
3 of ($s*)
)
}
rule GoldDragon_RunnignRAT {
meta:
description = "Detects Running RAT malware from Gold Dragon report"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/rW1yvZ"
date = "2018-02-03"
modified = "2023-01-07"
hash1 = "94aa827a514d7aa70c404ec326edaaad4b2b738ffaea5a66c0c9f246738df579"
hash2 = "5cbc07895d099ce39a3142025c557b7fac41d79914535ab7ffc2094809f12a4b"
hash3 = "98ccf3a463b81a47fdf4275e228a8f2266e613e08baae8bdcd098e49851ed49a"
id = "b99b89a4-a764-5d72-8360-8e53461267d9"
strings:
$s1 = "cmd.exe /c systeminfo " fullword ascii
$s2 = "ieproxy.dll" fullword ascii
$s3 = "taskkill /f /im daumcleaner.exe" fullword ascii
$s4 = "cmd.exe /c tasklist " fullword ascii
$s5 = "rundll32.exe \"%s\" Run" fullword ascii
$s6 = "Mozilla/5.0 (Windows NT 5.2; rv:12.0) Gecko/20100101 Firefox/12.0" fullword ascii
$s7 = "%s\\%s_%03d" fullword wide
$s8 = "\\PI_001.dat" ascii
condition:
uint16(0) == 0x5a4d and filesize < 3000KB and (
3 of them
)
}