08e8d462fe
RED PILL 🔴 💊
78 lines
3.5 KiB
Text
78 lines
3.5 KiB
Text
/*
|
|
Yara Rule Set
|
|
Author: Florian Roth
|
|
Date: 2018-01-29
|
|
Identifier: TopHat
|
|
Reference: https://researchcenter.paloaltonetworks.com/2018/01/unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-services/#appendix
|
|
*/
|
|
|
|
/* Rule Set ----------------------------------------------------------------- */
|
|
|
|
import "pe"
|
|
|
|
rule TopHat_Malware_Jan18_1 {
|
|
meta:
|
|
description = "Detects malware from TopHat campaign"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "https://researchcenter.paloaltonetworks.com/2018/01/unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-services/#appendix"
|
|
date = "2018-01-29"
|
|
hash1 = "5c0b253966befd57f4d22548f01116ffa367d027f162514c1b043a747bead596"
|
|
hash2 = "1f9bca1d5ce5d14d478d32f105b3ab5d15e1c520bde5dfca22324262e84d4eaf"
|
|
id = "ec290eee-a21e-548d-b7cc-3e25e7c39d22"
|
|
strings:
|
|
$s1 = "WINMGMTS:\\\\.\\ROOT\\CIMV2" fullword ascii
|
|
$s2 = "UENCRYPTION" fullword ascii
|
|
$s3 = "TEXPORTAPIS" fullword ascii
|
|
$s4 = "tcustommemorystream" fullword ascii
|
|
$s5 = "tmemorystream" fullword ascii
|
|
$s6 = "ExtrasNoteCONSOLEemb" fullword ascii
|
|
$s7 = "DIALOG INCLUDE" fullword ascii
|
|
condition:
|
|
uint16(0) == 0x5a4d and filesize < 400KB and (
|
|
pe.imphash() == "c221006b240b1c993217bd61e5ee31b6" or
|
|
6 of them
|
|
)
|
|
}
|
|
|
|
rule TopHat_Malware_Jan18_2 {
|
|
meta:
|
|
description = "Auto-generated rule - file e.exe"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "https://researchcenter.paloaltonetworks.com/2018/01/unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-services/#appendix"
|
|
date = "2018-01-29"
|
|
modified = "2023-01-06"
|
|
hash1 = "9580d15a06cd59c01c59bca81fa0ca8229f410b264a38538453f7d97bfb315e7"
|
|
id = "a1b8e477-df8a-5ff4-9108-541a0f082f77"
|
|
strings:
|
|
$s1 = "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\FontSubstitutes" fullword ascii
|
|
$s2 = "\\SYSTEM\\CurrentControlSet\\Control\\Keyboard Layouts\\" ascii
|
|
$s3 = "LError loading dock zone from the stream. Expecting version %d, but found %d." fullword wide
|
|
$s4 = "WINMGMTS:\\\\.\\ROOT\\CIMV2" fullword ascii
|
|
$s5 = "UENCRYPTION" fullword ascii
|
|
$s6 = "TEXPORTAPIS" fullword ascii
|
|
condition:
|
|
uint16(0) == 0x5a4d and filesize < 1000KB and (
|
|
pe.imphash() == "f98cebcae832abc3c46e6e296aecfc03" and
|
|
5 of them
|
|
)
|
|
}
|
|
|
|
rule TopHat_BAT {
|
|
meta:
|
|
description = "Auto-generated rule - file cgen.bat"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "https://researchcenter.paloaltonetworks.com/2018/01/unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-services/#appendix"
|
|
date = "2018-01-29"
|
|
hash1 = "f998271c4140caad13f0674a192093092e2a9f7794a7fbbdaa73ae8f2496c387"
|
|
hash2 = "0fbc6fd653b971c8677aa17ecd2749200a4a563f9dd5409cfb26d320618db3e2"
|
|
id = "81e84f1b-0ee7-530d-91ea-645c0994e68f"
|
|
strings:
|
|
$s1 = "= New-Object IO.MemoryStream(,[Convert]::FromBase64String(\"" ascii
|
|
$s2 = "goto Start" fullword ascii
|
|
$s3 = ":Start" fullword ascii
|
|
condition:
|
|
filesize < 5KB and all of them
|
|
}
|