Sneed-Reactivity/yara-Neo23x0/apt_telebots.yar
Sam Sneed 08e8d462fe OMG ISTG PLS WORK
RED PILL 🔴 💊
2024-07-25 12:43:35 -05:00

144 lines
6.3 KiB
Text

/*
Yara Rule Set
Author: Florian Roth
Date: 2016-12-14
Identifier: TeleBots
*/
/* Rule Set ----------------------------------------------------------------- */
rule TeleBots_IntercepterNG {
meta:
description = "Detects TeleBots malware - IntercepterNG"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/4if3HG"
date = "2016-12-14"
hash1 = "5f9fef7974d37922ac91365588fbe7b544e13abbbde7c262fe30bade7026e118"
id = "f4d48eb6-8235-534d-a32f-7f2711b96e9d"
strings:
$s1 = "Usage: %s iface_num\\dump [mode] [w] [-gw] [-t1 ip]" fullword ascii
$s2 = "Target%d found: %s - [%.2X-%.2X-%.2X-%.2X-%.2X-%.2X]" fullword ascii
$s3 = "3: passwords + files, no arp poison" fullword ascii
$s4 = "IRC Joining Keyed Channel intercepted" fullword ascii
$s5 = "-tX - set target ip" fullword ascii
$s6 = "w - save session to .pcap dump" fullword ascii
$s7 = "example: %s 1 1 -gw 192.168.1.1 -t1 192.168.1.3 -t2 192.168.1.5" fullword ascii
$s8 = "ORACLE8 DES Authorization intercepted" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 500KB and 1 of them ) or ( 4 of them )
}
rule TeleBots_KillDisk_1 {
meta:
description = "Detects TeleBots malware - KillDisk"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/4if3HG"
date = "2016-12-14"
hash1 = "8246f709efa922a485e1ca32d8b0d10dc752618e8b3fce4d3dd58d10e4a6a16d"
id = "111fc6bc-b790-51b9-81b7-a4716bb0aee9"
strings:
$s1 = "Plug-And-Play Support Service" fullword wide
$s2 = " /c \"echo Y|" fullword wide
$s3 = "-set=06.12.2016#09:30 -est=1410" fullword ascii
$s4 = "%d.%d.%d#%d:%d" fullword ascii
$s5 = " /T /C /G " fullword wide
$s6 = "[-] > %ls" fullword wide
$s7 = "[+] > %ls" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 500KB and 4 of them ) or ( 6 of them )
}
rule TeleBots_KillDisk_2 {
meta:
description = "Detects TeleBots malware - KillDisk"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/4if3HG"
date = "2016-12-14"
hash1 = "26173c9ec8fd1c4f9f18f89683b23267f6f9d116196ed15655e9cb453af2890e"
id = "7797187f-c94b-5323-ae43-2dc001f0b481"
strings:
$s1 = "Plug-And-Play Support Service" fullword wide
$s2 = " /c \"echo Y|" fullword wide
$s3 = "%d.%d.%d#%d:%d" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 500KB and all of them )
}
rule TeleBots_CredRaptor_Password_Stealer {
meta:
description = "Detects TeleBots malware - CredRaptor Password Stealer"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/4if3HG"
date = "2016-12-14"
modified = "2023-01-06"
hash1 = "50b990f6555055a265fde98324759dbc74619d6a7c49b9fd786775299bf77d26"
id = "f594a946-13b4-5179-9029-a0730634d55f"
strings:
$s1 = "C:\\Documents and Settings\\Administrator\\Desktop\\GetPAI\\Out\\IE.pdb" fullword ascii
$s2 = "SELECT encryptedUsername, encryptedPassword, hostname,httpRealm FROM moz_logins" fullword ascii
$s3 = "SELECT ORIGIN_URL,USERNAME_VALUE,PASSWORD_VALUE FROM LOGINS" fullword ascii
$s4 = ".\\PAI\\IEforXPpasswords.txt" ascii
$s5 = "\\Local\\Google\\Chrome\\User Data\\Default\\Login Data" ascii
$s6 = "Opera old version credentials" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 2000KB and 2 of them ) or ( 4 of them )
}
rule TeleBots_VBS_Backdoor_1 {
meta:
description = "Detects TeleBots malware - VBS Backdoor"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/4if3HG"
date = "2016-12-14"
hash1 = "eb31a918ccc1643d069cf08b7958e2760e8551ba3b88ea9e5d496e07437273b2"
id = "2b711f66-8ec5-5b9a-a762-7e6668c821c9"
strings:
$s1 = "cmd = \"cmd.exe /c \" + arg + \" >\" + outfile +\" 2>&1\"" fullword ascii
$s2 = "GetTemp = \"c:\\WINDOWS\\addins\"" fullword ascii
$s3 = "elseif (arg0 = \"-dump\") Then" fullword ascii
$s4 = "decode = \"certutil -decode \" + source + \" \" + dest " fullword ascii
condition:
( uint16(0) == 0x6553 and filesize < 8KB and 1 of them ) or ( all of them )
}
rule TeleBots_VBS_Backdoor_2 {
meta:
description = "Detects TeleBots malware - VBS Backdoor"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/4if3HG"
date = "2016-12-14"
hash1 = "1b2a5922b58c8060844b43e14dfa5b0c8b119f281f54a46f0f1c34accde71ddb"
id = "151849af-f1d0-529c-94f2-287312f6515e"
strings:
$s1 = "cmd = \"cmd.exe /c \" + arg + \" \" + arg2" fullword ascii
$s2 = "Dim WMI: Set WMI = GetObject(\"winmgmts:\\\\.\\root\\cimv2\")" fullword ascii
$s3 = "cmd = \"certutil -encode -f \" + source + \" \" + dest" fullword ascii
condition:
( uint16(0) == 0x6944 and filesize < 30KB and 1 of them ) or ( 2 of them )
}
rule TeleBots_Win64_Spy_KeyLogger_G {
meta:
description = "Detects TeleBots malware - Win64 Spy KeyLogger G"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://goo.gl/4if3HG"
date = "2016-12-14"
hash1 = "e3f134ae88f05463c4707a80f956a689fba7066bb5357f6d45cba312ad0db68e"
id = "fd16a198-1b28-532b-a1ba-70680469ec51"
strings:
$s1 = "C:\\WRK\\GHook\\gHook\\x64\\Debug\\gHookx64.pdb" fullword ascii
$s2 = "Install hooks error!" fullword wide
$s4 = "%ls%d.~tmp" fullword wide
$s5 = "[*]Window PID > %d: " fullword wide
$s6 = "Install hooks ok!" fullword wide
$s7 = "[!]Clipboard paste" fullword wide
$s9 = "[*] IMAGE : %ls" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 600KB and 1 of them ) or ( 3 of them )
}