Sneed-Reactivity/yara-Neo23x0/gen_pirpi.yar
Sam Sneed 08e8d462fe OMG ISTG PLS WORK
RED PILL 🔴 💊
2024-07-25 12:43:35 -05:00

65 lines
2.5 KiB
Text

/*
Yara Rule Set
Author: Florian Roth
Date: 2016-09-08
Identifier: Pirpi
*/
/* Rule Set ----------------------------------------------------------------- */
rule Pirpi_1609_A {
meta:
description = "Detects Pirpi Backdoor - and other malware (generic rule)"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "http://goo.gl/igxLyF"
date = "2016-09-08"
hash1 = "2a5a0bc350e774bd784fc25090518626b65a3ce10c7401f44a1616ea2ae32f4c"
hash2 = "8caa179ec20b6e3938d17132980e0b9fe8ef753a70052f7e857b339427eb0f78"
id = "72b996e2-56cf-5a8d-8d8b-97eda7105d26"
strings:
$x1 = "expand.exe1.gif" fullword ascii
$c1 = "expand.exe" fullword ascii
$c2 = "ctf.exe" fullword ascii
$s1 = "flvUpdate.exe" fullword wide
$s2 = "www.ThinkWorking.com" fullword wide
$s3 = "ctfnon.exe" fullword ascii
$s4 = "flv%d.exe" fullword ascii
$s5 = "HARDWARE\\DESCRIPTION\\System\\BIOS" fullword ascii
$s6 = "12811[%d].gif" fullword ascii
$s7 = "GetApp03" fullword wide
$s8 = "flvUpdate" fullword wide
$s9 = "%d-%4.4d%d" fullword ascii
$s10 = "http://%s/%5.5d.html" fullword ascii
$s11 = "flvbho.exe" fullword wide
$op1 = { 74 08 c1 cb 0d 03 da 40 eb }
$op2 = { 03 f5 56 8b 76 20 03 f5 33 c9 49 }
$op3 = { 03 dd 66 8b 0c 4b 8b 5e 1c 03 dd 8b 04 8b 03 c5 }
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and ( $x1 or all of ($c*) or all of ($op*) ) ) or ( 8 of them )
}
rule Pirpi_1609_B {
meta:
description = "Detects Pirpi Backdoor"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "http://goo.gl/igxLyF"
date = "2016-09-08"
hash1 = "498b98c02e19f4b03dc6a3a8b6ff8761ef2c0fedda846ced4b6f1c87b52468e7"
id = "caf63b97-efd7-5cd4-8954-b86db4d93cf5"
strings:
$s1 = "tconn <ip> <port> //set temp connect value, and disconnect." fullword ascii
$s2 = "E* ListenCheckSsl SslRecv fd(%d) Error ret:%d %d" fullword ascii
$s3 = "%s %s L* ListenCheckSsl fd(%d) SslV(-%d-)" fullword ascii
$s4 = "S:%d.%d-%d.%d V(%d.%d) Listen On %d Ok." fullword ascii
$s5 = "E* ListenCheckSsl fd(%d) SslAccept Err %d" fullword ascii
$s6 = "%s-%s N110 Ssl Connect Ok(%s:%d)." fullword ascii
$s7 = "%s-%s N110 Basic Connect Ok(%s:%d)." fullword ascii
$s8 = "tconn <ip> <port>" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 1000KB and 2 of them ) or ( 4 of them )
}