08e8d462fe
RED PILL 🔴 💊
141 lines
No EOL
3 KiB
Text
141 lines
No EOL
3 KiB
Text
rule APT_DeputyDog_Strings
|
|
{
|
|
|
|
meta:
|
|
|
|
author = "FireEye Labs"
|
|
version = "1.0"
|
|
description = "detects string seen in samples used in 2013-3893 0day attacks"
|
|
reference = "8aba4b5184072f2a50cbc5ecfe326701"
|
|
|
|
strings:
|
|
|
|
$mz = {4d 5a}
|
|
$a = "DGGYDSYRL"
|
|
|
|
condition:
|
|
|
|
($mz at 0) and $a
|
|
|
|
}
|
|
|
|
rule callTogether_certificate
|
|
{
|
|
|
|
meta:
|
|
|
|
author = "Fireeye Labs"
|
|
|
|
version = "1.0"
|
|
|
|
reference_hash = "d08e038d318b94764d199d7a85047637"
|
|
|
|
reference = "https://www.fireeye.com/blog/threat-research/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html"
|
|
|
|
description = "detects binaries signed with the CallTogether certificate"
|
|
|
|
strings:
|
|
|
|
$serial = {452156C3B3FB0176365BDB5B7715BC4C}
|
|
|
|
$o = "CallTogether, Inc."
|
|
|
|
condition:
|
|
|
|
$serial and $o
|
|
|
|
}
|
|
|
|
rule FE_APT_9002_rat
|
|
|
|
{
|
|
|
|
meta:
|
|
author = "FireEye Labs"
|
|
reference = "https://www.fireeye.com/blog/threat-research/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html"
|
|
|
|
strings:
|
|
|
|
$mz = {4d 5a}
|
|
|
|
$a = "rat_UnInstall" wide ascii
|
|
|
|
condition:
|
|
|
|
($mz at 0) and $a
|
|
|
|
}
|
|
|
|
rule MACROCHECK
|
|
{
|
|
meta:
|
|
description = "Identify office documents with the MACROCHECK credential stealer in them. It can be run against .doc files or VBA macros extraced from .docx files (vbaProject.bin files)."
|
|
author = "Fireeye Labs"
|
|
version = "1.0"
|
|
|
|
strings:
|
|
$PARAMpword = "pword=" ascii wide
|
|
$PARAMmsg = "msg=" ascii wide
|
|
$PARAMuname = "uname=" ascii
|
|
$userform = "UserForm" ascii wide
|
|
$userloginform = "UserLoginForm" ascii wide
|
|
$invalid = "Invalid username or password" ascii wide
|
|
$up1 = "uploadPOST" ascii wide
|
|
$up2 = "postUpload" ascii wide
|
|
|
|
condition:
|
|
all of ($PARAM*) or (($invalid or $userloginform or $userform) and ($up1 or $up2))
|
|
}
|
|
|
|
|
|
rule Molerats_certs
|
|
|
|
{
|
|
|
|
meta:
|
|
|
|
author = "FireEye Labs"
|
|
|
|
description = "this rule detections code signed with certificates used by the Molerats actor"
|
|
|
|
reference = "https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html"
|
|
|
|
strings:
|
|
|
|
$cert1 = {06 50 11 A5 BC BF 83 C0 93 28 16 5E 7E 85 27 75}
|
|
$cert2 = {03 e1 e1 aa a5 bc a1 9f ba 8c 42 05 8b 4a bf 28}
|
|
$cert3 = {0c c0 35 9c 9c 3c da 00 d7 e9 da 2d c6 ba 7b 6d}
|
|
|
|
|
|
|
|
condition:
|
|
|
|
1 of ($cert*)
|
|
|
|
}
|
|
|
|
rule qti_certificate
|
|
|
|
{
|
|
|
|
meta:
|
|
|
|
author = "Fireeye Labs"
|
|
|
|
reference_hash = "cfa3e3471430a0096a4e7ea2e3da6195"
|
|
|
|
reference = "https://www.fireeye.com/blog/threat-research/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html"
|
|
|
|
description = "detects binaries signed with the QTI International Inc certificate"
|
|
|
|
strings:
|
|
|
|
$cn = "QTI International Inc"
|
|
|
|
$serial = { 2e df b9 fd cf a0 0c cb 5a b0 09 ee 3a db 97 b9 }
|
|
|
|
condition:
|
|
|
|
$cn and $serial
|
|
|
|
} |