08e8d462fe
RED PILL 🔴 💊
323 lines
12 KiB
Text
323 lines
12 KiB
Text
/*
|
|
Yara Rule Set
|
|
Author: Florian Roth
|
|
Date: 2015-08-06
|
|
Identifier: Threat Group 3390
|
|
*/
|
|
|
|
rule HttpBrowser_RAT_dropper_Gen1 {
|
|
meta:
|
|
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Dropper"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "http://snip.ly/giNB"
|
|
date = "2015-08-06"
|
|
score = 70
|
|
hash1 = "808de72f1eae29e3c1b2c32be1b84c5064865a235866edf5e790d2a7ba709907"
|
|
hash2 = "f6f966d605c5e79de462a65df437ddfca0ad4eb5faba94fc875aba51a4b894a7"
|
|
hash3 = "f424965a35477d822bbadb821125995616dc980d3d4f94a68c87d0cd9b291df9"
|
|
hash4 = "01441546fbd20487cb2525a0e34e635eff2abe5c3afc131c7182113220f02753"
|
|
hash5 = "8cd8159f6e4689f572e2087394452e80e62297af02ca55fe221fe5d7570ad47b"
|
|
hash6 = "10de38419c9a02b80ab7bf2f1f1f15f57dbb0fbc9df14b9171dc93879c5a0c53"
|
|
hash7 = "c2fa67e970d00279cec341f71577953d49e10fe497dae4f298c2e9abdd3a48cc"
|
|
id = "2e347024-ac5f-5e8c-a8b0-53eaa9a03979"
|
|
strings:
|
|
$x1 = "1001=cmd.exe" fullword ascii
|
|
$x2 = "1003=ShellExecuteA" fullword ascii
|
|
$x3 = "1002=/c del /q %s" fullword ascii
|
|
$x4 = "1004=SetThreadPriority" fullword ascii
|
|
|
|
/* $s1 = "pnipcn.dllUT" fullword ascii
|
|
$s2 = "ssonsvr.exeUT" fullword ascii
|
|
$s3 = "navlu.dllUT" fullword ascii
|
|
$s4 = "@CONOUT$" fullword wide
|
|
$s5 = "VPDN_LU.exeUT" fullword ascii
|
|
$s6 = "msi.dll.urlUT" fullword ascii
|
|
$s7 = "setup.exeUT" fullword ascii
|
|
$s8 = "pnipcn.dll.urlUT" fullword ascii
|
|
$s9 = "ldvpreg.exeUT" fullword ascii */
|
|
|
|
$op0 = { e8 71 11 00 00 83 c4 10 ff 4d e4 8b f0 78 07 8b } /* Opcode */
|
|
$op1 = { e8 85 34 00 00 59 59 8b 86 b4 } /* Opcode */
|
|
$op2 = { 8b 45 0c 83 38 00 0f 84 97 } /* Opcode */
|
|
$op3 = { 8b 45 0c 83 38 00 0f 84 98 } /* Opcode */
|
|
$op4 = { 89 7e 0c ff 15 a0 50 40 00 59 8b d8 6a 20 59 8d } /* Opcode */
|
|
$op5 = { 56 8d 85 cd fc ff ff 53 50 88 9d cc fc ff ff e8 } /* Opcode */
|
|
condition:
|
|
uint16(0) == 0x5a4d and filesize < 400KB and all of ($x*) and 1 of ($op*)
|
|
}
|
|
|
|
rule HttpBrowser_RAT_Sample1 {
|
|
meta:
|
|
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Sample update.hancominc.com"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "http://snip.ly/giNB"
|
|
date = "2015-08-06"
|
|
score = 80
|
|
hash1 = "be334d1f8fa65a723af65200a166c2bbdb06690c8b30fafe772600e4662fc68b"
|
|
hash2 = "1052ad7f4d49542e4da07fa8ea59c15c40bc09a4d726fad023daafdf05866ebb"
|
|
id = "8babf47f-006c-5001-9753-08ac08f5e861"
|
|
strings:
|
|
$s0 = "update.hancominc.com" fullword wide
|
|
condition:
|
|
uint16(0) == 0x5a4d and filesize < 100KB and $s0
|
|
}
|
|
|
|
rule HttpBrowser_RAT_Sample2 {
|
|
meta:
|
|
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Sample"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "http://snip.ly/giNB"
|
|
date = "2015-08-06"
|
|
score = 80
|
|
hash1 = "c57c5a2c322af2835ae136b75283eaaeeaa6aa911340470182a9983ae47b8992"
|
|
id = "693d381f-50b0-5f06-b725-78243b67092c"
|
|
strings:
|
|
$s0 = "nKERNEL32.DLL" fullword wide
|
|
$s1 = "WUSER32.DLL" fullword wide
|
|
$s2 = "mscoree.dll" fullword wide
|
|
$s3 = "VPDN_LU.exeUT" fullword ascii
|
|
condition:
|
|
uint16(0) == 0x5a4d and filesize < 250KB and all of them
|
|
}
|
|
|
|
rule HttpBrowser_RAT_Gen {
|
|
meta:
|
|
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Generic"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "http://snip.ly/giNB"
|
|
date = "2015-08-06"
|
|
score = 90
|
|
hash1 = "0299493ccb175d452866f5e21d023d3e92cd8d28452517d1d19c0f05f2c5ca27"
|
|
hash2 = "065d055a90da59b4bdc88b97e537d6489602cb5dc894c5c16aff94d05c09abc7"
|
|
hash3 = "05c7291db880f94c675eea336ecd66338bd0b1d49ad239cc17f9df08106e6684"
|
|
hash4 = "07133f291fe022cd14346cd1f0a649aa2704ec9ccadfab809ca9c48b91a7d81b"
|
|
hash5 = "0f8893e87ddec3d98e39a57f7cd530c28e36d596ea0a1d9d1e993dc2cae0a64d"
|
|
hash6 = "108e6633744da6efe773eb78bd0ac804920add81c3dde4b26e953056ac1b26c5"
|
|
hash7 = "1052ad7f4d49542e4da07fa8ea59c15c40bc09a4d726fad023daafdf05866ebb"
|
|
hash8 = "1277ede988438d4168bb5b135135dd3b9ae7d9badcdf1421132ca4692dd18386"
|
|
hash9 = "19be90c152f7a174835fd05a0b6f722e29c648969579ed7587ae036679e66a7b"
|
|
hash10 = "1e7133bf5a9fe5e462321aafc2b7770b8e4183a66c7fef14364a0c3f698a29af"
|
|
hash11 = "2264e5e8fcbdcb29027798b200939ecd8d1d3ad1ef0aef2b8ce7687103a3c113"
|
|
hash12 = "2a1bdeb0a021fb0bdbb328bd4b65167d1f954c871fc33359cb5ea472bad6e13e"
|
|
hash13 = "259a2e0508832d0cf3f4f5d9e9e1adde17102d2804541a9587a9a4b6f6f86669"
|
|
hash14 = "240d9ce148091e72d8f501dbfbc7963997d5c2e881b4da59a62975ddcbb77ca2"
|
|
hash15 = "211a1b195cf2cc70a2caf8f1aafb8426eb0e4bae955e85266490b12b5322aa16"
|
|
hash16 = "2d25c6868c16085c77c58829d538b8f3dbec67485f79a059f24e0dce1e804438"
|
|
hash17 = "2d932d764dd9b91166361d8c023d64a4480b5b587a6087b0ce3d2ac92ead8a7d"
|
|
hash18 = "3556722d9aa37beadfa6ba248a66576f767e04b09b239d3fb0479fa93e0ba3fd"
|
|
hash19 = "365e1d4180e93d7b87ba28ce4369312cbae191151ac23ff4a35f45440cb9be48"
|
|
hash20 = "36c49f18ce3c205152eef82887eb3070e9b111d35a42b534b2fb2ee535b543c0"
|
|
hash21 = "3eeb1fd1f0d8ab33f34183893c7346ddbbf3c19b94ba3602d377fa2e84aaad81"
|
|
hash22 = "3fa8d13b337671323e7fe8b882763ec29b6786c528fa37da773d95a057a69d9a"
|
|
id = "0ba9facb-7385-56ce-9e20-d86261a39cd1"
|
|
strings:
|
|
$s0 = "%d|%s|%04d/%02d/%02d %02d:%02d:%02d|%ld|%d" fullword wide
|
|
$s1 = "HttpBrowser/1.0" fullword wide
|
|
$s2 = "set cmd : %s" ascii fullword
|
|
$s3 = "\\config.ini" wide fullword
|
|
condition:
|
|
uint16(0) == 0x5a4d and filesize < 45KB and filesize > 20KB and all of them
|
|
}
|
|
|
|
rule PlugX_NvSmartMax_Gen {
|
|
meta:
|
|
description = "Threat Group 3390 APT Sample - PlugX NvSmartMax Generic"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "http://snip.ly/giNB"
|
|
date = "2015-08-06"
|
|
score = 70
|
|
hash1 = "718fc72942b9b706488575c0296017971170463f6f40fa19b08fc84b79bf0cef"
|
|
hash2 = "1c0379481d17fc80b3330f148f1b87ff613cfd2a6601d97920a0bcd808c718d0"
|
|
hash3 = "555952aa5bcca4fa5ad5a7269fece99b1a04816d104ecd8aefabaa1435f65fa5"
|
|
hash4 = "71f7a9da99b5e3c9520bc2cc73e520598d469be6539b3c243fb435fe02e44338"
|
|
hash5 = "65bbf0bd8c6e1ccdb60cf646d7084e1452cb111d97d21d6e8117b1944f3dc71e"
|
|
id = "5ecd25a8-9717-527f-bb6e-3259b9a60458"
|
|
strings:
|
|
$s0 = "NvSmartMax.dll" fullword ascii
|
|
$s1 = "NvSmartMax.dll.url" fullword ascii
|
|
$s2 = "Nv.exe" fullword ascii
|
|
$s4 = "CryptProtectMemory failed" fullword ascii
|
|
$s5 = "CryptUnprotectMemory failed" fullword ascii
|
|
$s7 = "r%.*s(%d)%s" fullword wide
|
|
$s8 = " %s CRC " fullword wide
|
|
|
|
$op0 = { c6 05 26 49 42 00 01 eb 4a 8d 85 00 f8 ff ff 50 } /* Opcode */
|
|
$op1 = { 8d 85 c8 fe ff ff 50 8d 45 c8 50 c6 45 47 00 e8 } /* Opcode */
|
|
$op2 = { e8 e6 65 00 00 50 68 10 43 41 00 e8 56 84 00 00 } /* Opcode */
|
|
condition:
|
|
uint16(0) == 0x5a4d and filesize < 800KB and all of ($s*) and 1 of ($op*)
|
|
}
|
|
|
|
rule HttpBrowser_RAT_dropper_Gen2 {
|
|
meta:
|
|
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Dropper"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "http://snip.ly/giNB"
|
|
date = "2015-08-06"
|
|
score = 70
|
|
hash1 = "c57c5a2c322af2835ae136b75283eaaeeaa6aa911340470182a9983ae47b8992"
|
|
hash2 = "dfa984174268a9f364d856fd47cfaca75804640f849624d69d81fcaca2b57166"
|
|
id = "cd559642-a102-5946-8a7f-16c10e7f746d"
|
|
strings:
|
|
$s1 = "navlu.dll.urlUT" fullword ascii
|
|
$s2 = "VPDN_LU.exeUT" fullword ascii
|
|
$s3 = "pnipcn.dllUT" fullword ascii
|
|
$s4 = "\\ssonsvr.exe" ascii
|
|
$s5 = "/c del /q %s" fullword ascii
|
|
$s6 = "\\setup.exe" ascii
|
|
$s7 = "msi.dllUT" fullword ascii
|
|
|
|
$op0 = { 8b 45 0c 83 38 00 0f 84 98 } /* Opcode */
|
|
$op1 = { e8 dd 07 00 00 ff 35 d8 fb 40 00 8b 35 7c a0 40 } /* Opcode */
|
|
$op2 = { 83 fb 08 75 2c 8b 0d f8 af 40 00 89 4d dc 8b 0d } /* Opcode */
|
|
$op3 = { c7 43 18 8c 69 40 00 e9 da 01 00 00 83 7d f0 00 } /* Opcode */
|
|
$op4 = { 6a 01 e9 7c f8 ff ff bf 1a 40 00 96 1b 40 00 01 } /* Opcode */
|
|
condition:
|
|
uint16(0) == 0x5a4d and filesize < 400KB and 3 of ($s*) and 1 of ($op*)
|
|
}
|
|
|
|
rule ThreatGroup3390_Strings {
|
|
meta:
|
|
description = "Threat Group 3390 APT - Strings"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "http://snip.ly/giNB"
|
|
date = "2015-08-06"
|
|
score = 60
|
|
id = "9a44393b-5220-5376-ba18-2330f4623cd6"
|
|
strings:
|
|
$s1 = "\"cmd\" /c cd /d \"c:\\Windows\\Temp\\\"©" ascii
|
|
$s2 = "svchost.exe a -k -r -s -m5 -v1024000 -padmin-windows2014"
|
|
$s3 = "ren *.rar *.zip" fullword ascii
|
|
$s4 = "c:\\temp\\ipcan.exe" fullword ascii
|
|
$s5 = "<%eval(Request.Item(\"admin-na-google123!@#" ascii
|
|
condition:
|
|
1 of them and filesize < 30KB
|
|
}
|
|
|
|
rule ThreatGroup3390_C2 {
|
|
meta:
|
|
description = "Threat Group 3390 APT - C2 Server"
|
|
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
|
|
author = "Florian Roth (Nextron Systems)"
|
|
reference = "http://snip.ly/giNB"
|
|
date = "2015-08-06"
|
|
score = 60
|
|
id = "232b5052-e349-55f1-bd7e-1afc5d35abe4"
|
|
strings:
|
|
$s1 = "api.apigmail.com"
|
|
$s2 = "apigmail.com"
|
|
$s3 = "backup.darkhero.org"
|
|
$s4 = "bel.updatawindows.com"
|
|
$s5 = "binary.update-onlines.org"
|
|
$s6 = "blackcmd.com"
|
|
$s7 = "castle.blackcmd.com"
|
|
$s8 = "ctcb.blackcmd.com"
|
|
$s9 = "darkhero.org"
|
|
$s10 = "dav.local-test.com"
|
|
$s11 = "test.local-test.com"
|
|
$s12 = "dev.local-test.com"
|
|
$s13 = "ocean.local-test.com"
|
|
$s14 = "ga.blackcmd.com"
|
|
$s15 = "helpdesk.blackcmd.com"
|
|
$s16 = "helpdesk.csc-na.com"
|
|
$s17 = "helpdesk.hotmail-onlines.com"
|
|
$s18 = "helpdesk.lnip.org"
|
|
$s19 = "hotmail-onlines.com"
|
|
$s20 = "jobs.hotmail-onlines.com"
|
|
$s21 = "justufogame.com"
|
|
$s22 = "lnip.org"
|
|
$s23 = "local-test.com"
|
|
$s24 = "login.hansoftupdate.com"
|
|
$s25 = "long.update-onlines.org"
|
|
$s26 = "longlong.update-onlines.org"
|
|
$s27 = "longshadow.dyndns.org"
|
|
$s28 = "longshadow.update-onlines.org"
|
|
$s29 = "longykcai.update-onlines.org"
|
|
$s30 = "lostself.update-onlines.org"
|
|
$s31 = "mac.navydocument.com"
|
|
$s32 = "mail.csc-na.com"
|
|
$s33 = "mantech.updatawindows.com"
|
|
$s34 = "micr0soft.org"
|
|
$s35 = "microsoft-outlook.org"
|
|
$s36 = "mtc.navydocument.com"
|
|
$s37 = "navydocument.com"
|
|
$s38 = "mtc.update-onlines.org"
|
|
$s39 = "news.hotmail-onlines.com"
|
|
$s40 = "oac.3322.org"
|
|
$s41 = "ocean.apigmail.com"
|
|
$s42 = "pchomeserver.com"
|
|
$s43 = "registre.organiccrap.com"
|
|
$s44 = "security.pomsys.org"
|
|
$s45 = "services.darkhero.org"
|
|
$s46 = "sgl.updatawindows.com"
|
|
$s47 = "shadow.update-onlines.org"
|
|
$s48 = "sonoco.blackcmd.com"
|
|
$s49 = "test.logmastre.com"
|
|
$s50 = "up.gtalklite.com"
|
|
$s51 = "updatawindows.com"
|
|
$s52 = "update-onlines.org"
|
|
$s53 = "update.deepsoftupdate.com"
|
|
$s54 = "update.hancominc.com"
|
|
$s55 = "update.micr0soft.org"
|
|
$s56 = "update.pchomeserver.com"
|
|
$s57 = "urs.blackcmd.com"
|
|
$s58 = "wang.darkhero.org"
|
|
$s59 = "webs.local-test.com"
|
|
$s60 = "word.apigmail.com"
|
|
$s61 = "wordpress.blackcmd.com"
|
|
$s62 = "working.blackcmd.com"
|
|
$s63 = "working.darkhero.org"
|
|
$s64 = "working.hotmail-onlines.com"
|
|
$s65 = "www.trendmicro-update.org"
|
|
$s66 = "www.update-onlines.org"
|
|
$s67 = "x.apigmail.com"
|
|
$s68 = "ykcai.update-onlines.org"
|
|
$s69 = "ykcailostself.dyndns-free.com"
|
|
$s70 = "ykcainobody.dyndns.org"
|
|
$s71 = "zj.blackcmd.com"
|
|
$s72 = "laxness-lab.com"
|
|
$s73 = "google-ana1ytics.com"
|
|
$s74 = "www.google-ana1ytics.com"
|
|
$s75 = "ftp.google-ana1ytics.com"
|
|
$s76 = "hotmailcontact.net"
|
|
$s77 = "208.115.242.36"
|
|
$s78 = "208.115.242.37"
|
|
$s79 = "208.115.242.38"
|
|
$s80 = "66.63.178.142"
|
|
$s81 = "72.11.148.220"
|
|
$s82 = "72.11.141.133"
|
|
$s83 = "74.63.195.236"
|
|
$s84 = "74.63.195.236"
|
|
$s85 = "74.63.195.237"
|
|
$s86 = "74.63.195.238"
|
|
$s87 = "103.24.0.142"
|
|
$s88 = "103.24.1.54"
|
|
$s89 = "106.187.45.162"
|
|
$s90 = "192.151.236.138"
|
|
$s91 = "192.161.61.19"
|
|
$s92 = "192.161.61.20"
|
|
$s93 = "192.161.61.22"
|
|
$s94 = "103.24.1.54"
|
|
$s95 = "67.215.232.179"
|
|
$s96 = "96.44.177.195"
|
|
$s97 = "49.143.192.221"
|
|
$s98 = "67.215.232.181"
|
|
$s99 = "67.215.232.182"
|
|
$s100 = "96.44.182.243"
|
|
$s101 = "96.44.182.245"
|
|
$s102 = "96.44.182.246"
|
|
$s103 = "49.143.205.30"
|
|
$s104 = "working_success@163.com"
|
|
$s105 = "ykcaihyl@163.com"
|
|
$s106 = "working_success@163.com"
|
|
$s107 = "yuming@yinsibaohu.aliyun.com"
|
|
condition:
|
|
uint16(0) == 0x5a4d and 1 of them
|
|
}
|