08e8d462fe
RED PILL 🔴 💊
34 lines
1.4 KiB
Text
34 lines
1.4 KiB
Text
/*
|
|
Yara Rule Set
|
|
Author: Florian Roth
|
|
Date: 2017-02-07
|
|
Identifier: Rotten Potato
|
|
*/
|
|
|
|
/* Rule Set ----------------------------------------------------------------- */
|
|
|
|
rule RottenPotato_Potato {
|
|
meta:
|
|
description = "Detects a component of privilege escalation tool Rotten Potato - file Potato.exe"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "https://github.com/foxglovesec/RottenPotato"
|
|
date = "2017-02-07"
|
|
modified = "2022-12-21"
|
|
score = 90
|
|
hash1 = "59cdbb21d9e487ca82748168682f1f7af3c5f2b8daee3a09544dd58cbf51b0d5"
|
|
id = "4a12783c-f58a-518b-a80a-f09f146304cc"
|
|
strings:
|
|
$x1 = "Potato.exe -ip <ip>" fullword wide
|
|
$x2 = "-enable_httpserver true -enable_spoof true" fullword wide
|
|
$x3 = "/C schtasks.exe /Create /TN omg /TR" fullword wide
|
|
$x4 = "-enable_token true -enable_dce true" fullword wide
|
|
$x5 = "DNS lookup succeeds - UDP Exhaustion failed!" fullword wide
|
|
$x6 = "DNS lookup fails - UDP Exhaustion worked!" fullword wide
|
|
$x7 = "\\obj\\Release\\Potato.pdb" ascii
|
|
$x8 = "function FindProxyForURL(url,host){if (dnsDomainIs(host, \"localhost\")) return \"DIRECT\";" fullword wide
|
|
|
|
$s1 = "\"C:\\Windows\\System32\\cmd.exe\" /K start" fullword wide
|
|
condition:
|
|
( uint16(0) == 0x5a4d and filesize < 200KB and 1 of ($x*) ) or ( 2 of them )
|
|
}
|