Sneed-Reactivity/yara-Neo23x0/exploit_cve_2015_2426.yar
Sam Sneed 08e8d462fe OMG ISTG PLS WORK
RED PILL 🔴 💊
2024-07-25 12:43:35 -05:00

57 lines
2.5 KiB
Text

/*
Yara Rule Set
Author: Florian Roth
Date: 2015-07-21
Identifier: MS15-077 MS15-078
*/
/* Rule Set ----------------------------------------------------------------- */
rule Exploit_MS15_077_078 {
meta:
description = "MS15-078 / MS15-077 exploit - generic signature"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
reference = "https://code.google.com/p/google-security-research/issues/detail?id=473&can=1&start=200"
date = "2015-07-21"
hash1 = "18e3e840a5e5b75747d6b961fca66a670e3faef252aaa416a88488967b47ac1c"
hash2 = "0b5dc030e73074b18b1959d1cf7177ff510dbc2a0ec2b8bb927936f59eb3d14d"
hash3 = "fc609adef44b5c64de029b2b2cff22a6f36b6bdf9463c1bd320a522ed39de5d9"
hash4 = "ad6bb982a1ecfe080baf0a2b27950f989c107949b1cf02b6e0907f1a568ece15"
id = "57f6db11-9d93-53fd-ab68-c6c3eadae2da"
strings:
$s1 = "GDI32.DLL" fullword ascii
$s2 = "atmfd.dll" fullword wide
$s3 = "AddFontMemResourceEx" fullword ascii
$s4 = "NamedEscape" fullword ascii
$s5 = "CreateBitmap" fullword ascii
$s6 = "DeleteObject" fullword ascii
$op0 = { 83 45 e8 01 eb 07 c7 45 e8 } /* Opcode */
$op1 = { 8d 85 24 42 fb ff 89 04 24 e8 80 22 00 00 c7 45 } /* Opcode */
$op2 = { eb 54 8b 15 6c 00 4c 00 8d 85 24 42 fb ff 89 44 } /* Opcode */
$op3 = { 64 00 88 ff 84 03 70 03 }
condition:
uint16(0) == 0x5a4d and filesize < 2000KB and 5 of ($s*) or 3 of ($op*)
}
rule Exploit_MS15_077_078_HackingTeam {
meta:
description = "MS15-078 / MS15-077 exploit - Hacking Team code"
license = "Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE"
author = "Florian Roth (Nextron Systems)"
date = "2015-07-21"
super_rule = 1
hash1 = "ad6bb982a1ecfe080baf0a2b27950f989c107949b1cf02b6e0907f1a568ece15"
hash2 = "fc609adef44b5c64de029b2b2cff22a6f36b6bdf9463c1bd320a522ed39de5d9"
id = "3bf40dec-c46e-5054-a98e-602049cb1824"
strings:
$s1 = "\\SystemRoot\\system32\\CI.dll" ascii /* PEStudio Blacklist: strings */
$s2 = "\\sysnative\\CI.dll" ascii /* PEStudio Blacklist: strings */
$s3 = "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36" fullword ascii /* PEStudio Blacklist: strings */
$s4 = "CRTDLL.DLL" fullword ascii
$s5 = "\\sysnative" ascii /* PEStudio Blacklist: strings */
$s6 = "InternetOpenA coolio, trying open %s" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 2500KB and 5 of them
}