Sneed-Reactivity/yara-mikesxrs/Trend Micro/FighterPOS.yar
Sam Sneed 08e8d462fe OMG ISTG PLS WORK
RED PILL 🔴 💊
2024-07-25 12:43:35 -05:00

92 lines
3 KiB
Text

rule PoS_Malware_ActiveComponent : FighterPOS
{
meta:
description = "RAM scrapper component used by FighterPOS"
author = "Trend Micro, Inc"
reference = "https://blog.trendmicro.com/trendlabs-security-intelligence/files/2016/02/fighterpos-gets-worm-routine-appendix.pdf"
strings:
$pdb = /:\\users\\tom\\.{20,200}scan\.pdb/ nocase
condition:
$pdb
}
rule PoS_Malware_MainBinary : FighterPOS
{
meta:
description = "Main FighterPOS infector, with ActiveComponent asresource"
author = "Trend Micro, Inc"
reference = "https://blog.trendmicro.com/trendlabs-security-intelligence/files/2016/02/fighterpos-gets-worm-routine-appendix.pdf"
strings:
$string1 = "BrFighter"
$string2 = "bot/dumper.php?id="
$string3 = "bot/keylogger.php?id="
$string4 = "\\Users\\avanni\\"
condition:
(any of ($string*)) and PoS_Malware_ActiveComponent
}
rule PoS_Malware_MainBinary1 : FighterPOS
{
meta:
description = "Main FighterPOS infector, without ActiveComponent as resource"
author = "Trend Micro, Inc"
reference = "https://blog.trendmicro.com/trendlabs-security-intelligence/files/2016/02/fighterpos-gets-worm-routine-appendix.pdf"
strings:
$string1 = "BrFighter"
$string2 = "bot/dumper.php?id="
$string3 = "bot/keylogger.php?id="
$string4 = "\\Users\\avanni\\"
condition:
(any of ($string*)) and not PoS_Malware_ActiveComponent
}
rule PoS_Malware_FlokiIntruder : FighterPOS
{
meta:
description = "Main FighterPOS infector, with ActiveComponent as resource. FlokiIntruder release."
author = "Trend Micro, Inc"
reference = "https://blog.trendmicro.com/trendlabs-security-intelligence/files/2016/02/fighterpos-gets-worm-routine-appendix.pdf"
strings:
$string1 = "FlokiIntruder"
$string2 = "bot/dumper.php" wide
$string3 = "bot/key.php" wide
$users1 = "\\Users\\UserPC\\" wide
$users2 = "\\Users\\root\\" wide
condition:
(all of ($string*)) and (any of ($users*)) and PoS_Malware_ActiveComponent
}
rule PoS_Malware_ TSPY_POSFIGHT.F: FighterPOS
{
meta:
author = "Trend Micro, Inc"
description = "FighterPOS modification, using TSPY_POSFIGHT.B OR TSPY_POSLOGR.SMY for scraping"
reference = "https://blog.trendmicro.com/trendlabs-security-intelligence/files/2016/02/fighterpos-gets-worm-routine-appendix.pdf"
strings:
$string0 = "Software\\Borland\\Locales"
$string1 = "SOFTWARE\\Borland\\Delphi\\RTL"
$string2 = "Software\\Microsoft\\Windows\\CurrentVersion\\Run"
$string3 = "JavaWT"
$string4 = "%s.Seek not implemented$Operation not allowed on sorted list" wide
$string5 = "Toolhelp32ReadProcessMemory"
$string6 = "VBWYT-BBWKV-P86YX-G642C-3C3D3"
$string7 = "svchost.exe"
condition:
all of them
}
rule PoS_Malware_EMVDataRecorder : FighterPOS
{
meta:
description = "MSR 2006 EMV recorder by FighterPOS actor"
author = "Trend Micro, Inc"
reference = "https://blog.trendmicro.com/trendlabs-security-intelligence/files/2016/02/fighterpos-gets-worm-routine-appendix.pdf"
strings:
$a = "send_apdu -sc 0" wide
$ = "C:\\GPShell\\data.dat" wide nocase
$ = "MSVBVM60.DLL" ascii
$ = "MSR 2006"
condition:
#a > 10 and all of them
}