From c585393a51788ca8308de1c244b1967ecdfb4fff Mon Sep 17 00:00:00 2001 From: FrenkyDema <67586090+FrenkyDema@users.noreply.github.com> Date: Fri, 7 Oct 2022 09:16:01 +0200 Subject: [PATCH 1/5] Create yara.yml --- .github/workflows/yara.yml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 .github/workflows/yara.yml diff --git a/.github/workflows/yara.yml b/.github/workflows/yara.yml new file mode 100644 index 0000000..4c41a5a --- /dev/null +++ b/.github/workflows/yara.yml @@ -0,0 +1,23 @@ +name: Package Yara Rules + +on: [push] +# Credit @ 0xThiebaut +jobs: + package: + runs-on: ubuntu-latest + + steps: + # Checks-out the repository under $GITHUB_WORKSPACE + - name: Check-out the repository + uses: actions/checkout@v2 + + # Assemble all *.yar files + - name: Assemble all Yara files + run: "for f in $GITHUB_WORKSPACE/rules/**/*.yar; do cat $f >> rules.yar; done" + + # Upload the assembled Yara artifact + - name: Upload the resulting Yara artifact + uses: actions/upload-artifact@v2 + with: + name: rules.yar + path: rules.yar From 3de4d2929a8b91b4354f955e2bbf94828266bd7b Mon Sep 17 00:00:00 2001 From: FrenkyDema <67586090+FrenkyDema@users.noreply.github.com> Date: Fri, 7 Oct 2022 09:35:23 +0200 Subject: [PATCH 2/5] Add rules file Yara all rules file --- .github/workflows/rules.yar | 3293 +++++++++++++++++++++++++++++++++++ 1 file changed, 3293 insertions(+) create mode 100644 .github/workflows/rules.yar diff --git a/.github/workflows/rules.yar b/.github/workflows/rules.yar new file mode 100644 index 0000000..115e040 --- /dev/null +++ b/.github/workflows/rules.yar @@ -0,0 +1,3293 @@ +rule Confucius_B +{ + meta: + id = "3AaavteplEPTLc29oIVtzm" + fingerprint = "f7a7224bfdbb79208776c856eb05a59ed75112376d0d3b28776305efc94c0414" + version = "1.0" + creation_date = "2020-04-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Confucius malware." + category = "MALWARE" + malware = "CONFUCIUS" + malware_type = "BACKDOOR" + reference = "https://unit42.paloaltonetworks.com/unit42-confucius-says-malware-families-get-further-by-abusing-legitimate-websites/" + + + strings: + $ = "----BONE-79A8DE0E314C50503FF2378aEB126363-" ascii wide + $ = "----MUETA-%.08x%.04x%.04x%.02x%.02x%.02x%.02x%.02x%.02x%.02x%.02x-" ascii wide + $ = "C:\\Users\\DMITRY-PC\\Documents\\JKE-Agent-Win32\\JKE_Agent_DataCollectorPlugin\\output\\Debug\\JKE_Agent_DumbTestPlugin.dll" ascii wide + + condition: + any of them +}import "pe" + +rule Cotx_RAT +{ + meta: + id = "44kYl6i8SEYFPSxi2Q3Lz3" + fingerprint = "47f671933c49fabc22117ef5e877efb33ba7fc0c437f6be3750ecca7cd27816a" + version = "1.0" + creation_date = "2019-07-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Cotx RAT." + category = "MALWARE" + malware = "COTX" + malware_type = "RAT" + reference = "https://www.proofpoint.com/us/threat-insight/post/chinese-apt-operation-lagtime-it-targets-government-information-technology" + + strings: + $ = "%4d-%02d-%02d %02d:%02d:%02d" ascii wide + $ = "%hs|%hs|%hs|%hs|%hs|%hs|%hs" ascii wide + $ = "%hs|%s|%hs|%s|%s|%s|%s|%s|%s|%s|%hs" ascii wide + $ = "%s;%s;%s;%.2f GB;%.2f GB|" ascii wide + $ = "Cmd shell is not running,or your cmd is error!" ascii wide + $ = "Domain: [%s]" ascii wide + $ = "Error:Cmd file not exists!" ascii wide + $ = "Error:Create read pipe error!" ascii wide + $ = "Error:No user is logoned!" ascii wide + $ = "Error:You have in a shell,please exit first!" ascii wide + $ = "Error:You have in a shell,please exit it first!" ascii wide + $ = "Error:cmd.exe not exist!" ascii wide + $ = "LogonUser: [%s]" ascii wide + $ = "WriteFile session error!" ascii wide + $ = "You have no permission to write on" ascii wide + $ = "cannot delete directory:" ascii wide + $ = "cannot delete file:" ascii wide + $ = "cannot upload file to %s" ascii wide + $ = "copy failed:" ascii wide + $ = "exec failed:" ascii wide + $ = "exec ok:" ascii wide + $ = "explorer.exe" ascii wide + $ = "file list error:open path [%s] error." ascii wide + $ = "is already exist!" ascii wide + $ = "is not exist!" ascii wide + $ = "not exe:" ascii wide + $ = "open file error:" ascii wide + $ = "read file error:" ascii wide + $ = "set config items error." ascii wide + $ = "set config ok." ascii wide + + condition: + 15 of them or ( for any i in (0..pe.number_of_sections-1) : (pe.sections[i].name==".cotx")) +}rule RoyalRoad_RTF +{ + meta: + id = "p1XW7z3B1sdN89zXF7Nel" + fingerprint = "52be45a991322fa96f4e806cf6fa7a77886f63799c1f67723484bc3796363a4e" + version = "1.0" + creation_date = "2020-01-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies RoyalRoad RTF, used by multiple Chinese APT groups." + category = "MALWARE" + malware = "ROYALROAD" + malware_type = "EXPLOITKIT" + reference = "https://nao-sec.org/2020/01/an-overhead-view-of-the-royal-road.html" + + + strings: + $rtf = "{\\rt" + $RR1 = "5C746D705C382E74" ascii wide nocase + $RR2 = "5C417070446174615C4C6F63616C5C54656D705C382E74" ascii wide nocase + + condition: + $rtf at 0 and any of ($RR*) +}rule Andromeda +{ + meta: + id = "66EiRJfwdRpNnHru6KDjKX" + fingerprint = "45a5315e4ffe5156ce4a7dc8e2d6e27d6152cd1d5ce327bfa576bf0c4a4767d8" + version = "1.0" + creation_date = "2021-03-01" + first_imported = "2022-01-24" + last_modified = "2022-01-24" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Andromeda aka Gamarue botnet." + category = "MALWARE" + malware = "ANDROMEDA" + malware_type = "WORM" + + + + strings: + //IndexerVolumeGuid + $ = { 8d ?? dc fd ff ff 50 8d ?? d8 fd ff ff 50 e8 ?? ?? ?? ?? 8a 00 53 68 ?? ?? ?? ?? 56 + ff b? ?? ?? ?? ?? a2 ?? ?? ?? ?? e8 ?? ?? ?? ?? 83 c4 18 53 ff 15 ?? ?? ?? ?? 68 ?? ?? ?? ?? 53 + 53 ff 15 ?? ?? ?? ?? ff b? ?? ?? ?? ?? ff 15 ?? ?? ?? ?? ff 15 ?? ?? ?? ?? a3 ?? ?? ?? ?? 83 f8 + ff 74 ?? 6a 01 50 ff 15 ?? ?? ?? ?? } + $ = { 83 c4 10 ff b? ?? ?? ?? ?? ff 15 ?? ?? ?? ?? 68 ?? ?? ?? ?? ff b? ?? ?? ?? ?? ff b? + ?? ?? ?? ?? ff 15 ?? ?? ?? ?? 68 ?? ?? ?? ?? } + + + /* + MOV DL ,byte ptr SS :[EAX + EBP *0x1 + 0xffffff00 ] + MOV DH ,byte ptr SS :[EBX + EBP *0x1 + 0xffffff00 ] + MOV byte ptr SS :[EAX + EBP *0x1 + 0xffffff00 ],DH + MOV byte ptr SS :[EBX + EBP *0x1 + 0xffffff00 ],DL + */ + $ = { 36 8a 94 28 00 ff ff ff 02 da 36 8a b4 2b 00 ff ff ff 36 88 b4 28 00 ff ff ff 36 88 94 2b 00 ff ff ff } + + condition: + any of them +} +rule ArechClient +{ + meta: + id = "1POsZzKWdklwDRUysnEJ9J" + fingerprint = "949f1c6596fffe0aca581e61bcc522e70775ad16c651875539c32d6de6801729" + version = "1.0" + creation_date = "2021-07-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies ArechClient, infostealer." + category = "MALWARE" + malware = "ARECHCLIENT" + malware_type = "INFOSTEALER" + + + strings: + $ = "is_secure" ascii wide + $ = "encrypted_value" ascii wide + $ = "host_keyexpires_utc" ascii wide + + condition: + all of them +}import "dotnet" + +rule ArechClient_Campaign_July2021 +{ + meta: + id = "16N9HHtspErd7pE2A261Mh" + fingerprint = "971fcef8b604c185c14af001633a3f83297d183f47620a9c4fc014815b26a28f" + version = "1.0" + creation_date = "2021-07-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies ArechClient stealer's July 2021 campaign." + category = "MALWARE" + malware = "ARECHCLIENT" + malware_type = "INFOSTEALER" + reference = "https://twitter.com/bcrypt/status/1420471176137113601" + + + condition: + dotnet.guids[0]=="10867a7d-8f80-4d52-8c58-47f5626e7d52" or dotnet.guids[0]=="7596afea-18b9-41f9-91dd-bee131501b08" +}rule AveMaria +{ + meta: + id = "7kTjKOPEjKKZRVTPh5LCPf" + fingerprint = "6cf820532d1616bf7e0a16d2ccf0fb4c31df30e775fd9de1622ac840f55b2fee" + version = "1.0" + creation_date = "2020-11-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies AveMaria aka WarZone RAT." + category = "MALWARE" + malware = "WARZONERAT" + malware_type = "RAT" + mitre_att = "S0534" + + + strings: + $ = "AVE_MARIA" ascii wide + $ = "Ave_Maria Stealer OpenSource" ascii wide + $ = "Hey I'm Admin" ascii wide + $ = "WM_DISP" ascii wide fullword + $ = "WM_DSP" ascii wide fullword + $ = "warzone160" ascii wide + + condition: + 3 of them +}rule BazarBackdoor +{ + meta: + id = "457CJ7xNoBZJ2ChWuy0zgq" + fingerprint = "b16f9a0651d90b68dced444c7921fd594b36f7672c29daf9fcbdb050f7655519" + version = "1.0" + creation_date = "2020-04-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Bazar backdoor." + category = "MALWARE" + malware = "BAZAR BACKDOOR" + malware_type = "BACKDOOR" + mitre_att = "S0534" + reference = "https://www.bleepingcomputer.com/news/security/bazarbackdoor-trickbot-gang-s-new-stealthy-network-hacking-malware/" + + + strings: + $ = { c7 44 ?? ?? 6d 73 67 3d c7 44 ?? ?? 6e 6f 20 66 c7 44 ?? ?? 69 6c 65 00 } + $ = { c7 44 ?? ?? 43 4e 20 3d 4? 8b f1 4? 89 b? ?? ?? ?? ?? 33 d2 4? 89 b? ?? ?? ?? ?? 4? 8d ?? ?4 60 4? 89 b? ?? ?? ?? ?? 4? 8d 7f 10 c7 44 ?? ?? 20 6c 6f 63 4? 8b c7 c7 44 ?? ?? 61 6c 68 6f 4? 8b df 66 c7 44 ?? ?? 73 74 } + + condition: + any of them +}rule BazarLoader +{ + meta: + id = "71rkxLlpnZn1Wd8IRiqeno" + fingerprint = "3bf045c85aedaf5e7ddaba5c8d8d0054615d1e24ab40bb9ba295b04693a95b69" + version = "1.0" + creation_date = "2020-04-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies BazarLoader." + category = "MALWARE" + malware_type = "LOADER" + malware = "BAZARLOADER" + reference = "https://www.bleepingcomputer.com/news/security/bazarbackdoor-trickbot-gang-s-new-stealthy-network-hacking-malware/" + + + strings: + $code = { 4? 89 05 69 8f 03 00 4? 85 c0 0f 84 e3 fe ff ff 4? 8b 05 01 e3 02 00 4? 89 85 e0 00 00 00 4? 8b 05 fb + e2 02 00 4? 89 85 e8 00 00 00 4? c7 85 d0 00 00 00 0f 00 00 00 4? 89 a5 c8 00 00 00 4? 88 a5 b8 00 00 00 4? 8d + 44 ?4 40 4? 8d 15 77 e2 02 00 4? 8d 8d b8 00 00 00 e8 ca df ff ff 90 4? c7 45 58 0f 00 00 00 4? 89 65 50 4? 88 + 65 40 4? 8d 44 ?4 07 4? 8d 15 36 e2 02 00 4? 8d 4d 40 e8 a4 df ff ff 90 4? c7 45 08 0f 00 00 00 4? 89 65 00 4? + 88 65 f0 4? 8d 44 ?4 0b 4? 8d 15 00 e2 02 00 } + $pdb1 = "C:\\Users\\User\\Desktop\\2010\\14.4.20\\Test_64\\SEED\\Release\\SEED.pdb" ascii wide + $pdb2 = "D:\\projects\\source\\repos\\7\\bd7 v2\\Bin\\x64\\Release_nologs\\bd7_x64_release_nologs.pdb" ascii wide + + condition: + $code or any of ($pdb*) +}rule CrunchyRoll +{ + meta: + id = "6MWD1MRYK1S03fFM5QvlHP" + fingerprint = "2e0d0a32f42c7c8b800c373a229af29185a2a8c59eb7067de4acc0bcda232f23" + version = "1.0" + creation_date = "2019-11-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies malware used in CrunchyRoll website hack." + category = "MALWARE" + reference = "https://bartblaze.blogspot.com/2017/11/crunchyroll-hack-delivers-malware.html" + + + strings: + $ = "C:\\Users\\Ben\\Desktop\\taiga-develop\\bin\\Debug\\Taiga.pdb" ascii wide + $ = "c:\\users\\ben\\source\\repos\\svchost\\Release\\svchost.pdb" ascii wide + + condition: + any of them +}rule Ganelp +{ + meta: + id = "5F6Z2reWdIRSLeXi6gf4RQ" + fingerprint = "500d37e54fb6ba61cdfa9345db18e452d13288a8a42f24e1a55f3d24fbcf5bd0" + version = "1.0" + creation_date = "2021-06-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Ganelp, a worm that also spreads via USB." + category = "MALWARE" + malware = "GANELP" + malware_type = "WORM" + + + strings: + $ = "regardez cette photo :D %s" ascii wide + $ = "to fotografiu :D %s" ascii wide + $ = "vejte se na mou fotku :D %s" ascii wide + $ = "bekijk deze foto :D %s" ascii wide + $ = "spojrzec na to zdjecie :D %s" ascii wide + $ = "bu resmi bakmak :D %s" ascii wide + $ = "dette bildet :D %s" ascii wide + $ = "seen this?? :D %s" ascii wide + $ = "guardare quest'immagine :D %s" ascii wide + $ = "denna bild :D %s" ascii wide + $ = "olhar para esta foto :D %s" ascii wide + $ = "uita-te la aceasta fotografie :D %s" ascii wide + $ = "pogledaj to slike :D %s" ascii wide + $ = "poglej to fotografijo :D %s" ascii wide + $ = "dette billede :D %s" ascii wide + + condition: + 3 of them +}rule IcedID_init_loader +{ + meta: + id = "1GXBmGKG0zu5DhEKiZK0Kx" + fingerprint = "b86460e97101c23cf11ff9fb43f6fcdce444fcfa301b1308c2f4d6aa2f01986a" + version = "1.0" + creation_date = "2021-01-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies IcedID (stage 1 and 2, initial loaders)." + category = "MALWARE" + malware = "ICEDID" + malware_type = "LOADER" + mitre_att = "S0483" + + strings: + $s1 = "{%0.8X-%0.4X-%0.4X-%0.4X-%0.4X%0.8X}" ascii wide + $s2 = "%0.2X%0.2X%0.2X%0.2X%0.2X%0.2X%0.8X" ascii wide + $s3 = "/image/?id=%0.2X%0.8X%0.8X%s" ascii wide + $x1 = "; _gat=" ascii wide + $x2 = "; _ga=" ascii wide + $x3 = "; _u=" ascii wide + $x4 = "; __io=" ascii wide + $x5 = "; _gid=" ascii wide + $x6 = "Cookie: __gads=" ascii wide + + condition: + 2 of ($s*) or 3 of ($x*) +} + +rule IcedID_core_loader +{ + meta: + id = "682uTswieW7dk3i644FZ9F" + fingerprint = "ffcfe3a1d5f0aad41892faf41c986a9601596d14f43985708f9bf4eb7d63a6b9" + version = "1.0" + creation_date = "2021-07-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies IcedID core loader." + category = "MALWARE" + malware = "ICEDID" + malware_type = "LOADER" + mitre_att = "S0483" + + strings: + $code = { 4? 33 d2 4? 85 f6 0f 84 ?? ?? ?? ?? 4? 83 fe 04 0f + 82 ?? ?? ?? ?? 4? 83 c6 fc 4? 89 74 ?? ?? 4? 85 db 75 ?? 4? + 85 f6 0f 84 ?? ?? ?? ?? ff 15 ?? ?? ?? ?? 4? 8b c8 4? 8d 46 + 01 8d 53 08 ff 15 ?? ?? ?? ?? 4? 89 44 ?? ?? 4? 8b d8 4? 85 + c0 0f 84 ?? ?? ?? ?? 4? 8b b? ?? ?? ?? ?? 4? ba 01 00 00 00 } + + condition: + $code +}rule JSSLoader +{ + meta: + id = "4kX6atSwDdjKnsiSNAVeZ2" + fingerprint = "6c73b4052e8493cd64cae3794c3ebb92cb95f64dd5224326b1ca45aecd7cb6da" + version = "1.0" + creation_date = "2021-06-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies FIN7's JSSLoader." + category = "MALWARE" + malware = "JSSLOADER" + malware_type = "LOADER" + mitre_att = "S0648" + + strings: + $s1 = "host" ascii wide fullword + $s2 = "domain" ascii wide fullword + $s3 = "user" ascii wide fullword + $s4 = "processes" ascii wide fullword + $s5 = "name" ascii wide fullword + $s6 = "pid" ascii wide fullword + $s7 = "desktop_file_list" ascii wide fullword + $s8 = "file" ascii wide fullword + $s9 = "size" ascii wide fullword + $s10 = "adinfo" ascii wide fullword + $s11 = "no_ad" ascii wide fullword + $s12 = "adinformation" ascii wide fullword + $s13 = "part_of_domain" ascii wide fullword + $s14 = "pc_domain" ascii wide fullword + $s15 = "pc_dns_host_name" ascii wide fullword + $s16 = "pc_model" ascii wide fullword + $x1 = "/?id=" ascii wide + $x2 = "failed start exe" ascii wide + $x3 = "Sending timer request failed, error code" ascii wide + $x4 = "Internet connection failed, error code" ascii wide + $x5 = "Sending initial request failed, error code" ascii wide + + condition: + 14 of ($s*) or 3 of ($x*) +}rule Jupyter +{ + meta: + id = "5yGlzHFZQ1qvusLOwAt8UQ" + fingerprint = "0c7ba0956c611a1e56ce972b4362f7f0f56bd2bd61ce78bee4adeb0a69e548c4" + version = "1.0" + creation_date = "2021-06-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Jupyter aka SolarMarker, backdoor." + category = "MALWARE" + malware = "SOLARMARKER" + malware_type = "BACKDOOR" + + strings: + $ = "var __addr__=" ascii wide + $ = "var __hwid__=" ascii wide + $ = "var __xkey__=" ascii wide + $ = "solarmarker.dat" ascii wide + + condition: + 3 of them +}rule KeyBase +{ + meta: + id = "5cV9wZM0UzNuIyF7OK1Tpk" + fingerprint = "d959211abb79a5b0e4e1e2e8c30bc6963876dcbe929e9099085dd2cc75dce730" + version = "1.0" + creation_date = "2019-02-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies KeyBase aka Kibex." + category = "MALWARE" + malware = "KEYBASE" + hash = "cafe2d12fb9252925fbd1acb9b7648d6" + + strings: + $s1 = " End:]" ascii wide + $s2 = "Keystrokes typed:" ascii wide + $s3 = "Machine Time:" ascii wide + $s4 = "Text:" ascii wide + $s5 = "Time:" ascii wide + $s6 = "Window title:" ascii wide + $x1 = "&application=" ascii wide + $x2 = "&clipboardtext=" ascii wide + $x3 = "&keystrokestyped=" ascii wide + $x4 = "&link=" ascii wide + $x5 = "&username=" ascii wide + $x6 = "&windowtitle=" ascii wide + $x7 = "=drowssap&" ascii wide + $x8 = "=emitenihcam&" ascii wide + + condition: + uint16(0)==0x5a4d and (5 of ($s*) or 6 of ($x*) or (3 of ($s*) and 3 of ($x*))) +}rule LNKR_JS_a +{ + meta: + id = "2ptjcpBqa9yDFmKpt0AW5C" + fingerprint = "371d54a77d89c53acc9135095361279f9ecd479ec403f6a14bc393ec0032901b" + version = "1.0" + creation_date = "2021-04-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies LNKR, an aggressive adware that also performs clickjacking." + category = "MALWARE" + malware_type = "ADWARE" + + strings: + $ = "AMZN_SEARCH" ascii wide + $ = "BANNER_LOAD" ascii wide + $ = "CB_FSI_ANSWER" ascii wide + $ = "CB_FSI_BLIND_NO_URL" ascii wide + $ = "CB_FSI_BREAK" ascii wide + $ = "CB_FSI_DISPLAY" ascii wide + $ = "CB_FSI_DO_BLIND" ascii wide + $ = "CB_FSI_ERROR_EXCEPTION" ascii wide + $ = "CB_FSI_ERROR_PARSERESULT" ascii wide + $ = "CB_FSI_ERROR_TIMEOUT" ascii wide + $ = "CB_FSI_ERR_INVRELINDEX" ascii wide + $ = "CB_FSI_ERR_INV_BLIND_POS" ascii wide + $ = "CB_FSI_FUSEARCH" ascii wide + $ = "CB_FSI_FUSEARCH_ORGANIC" ascii wide + $ = "CB_FSI_INJECT_EMPTY" ascii wide + $ = "CB_FSI_OPEN" ascii wide + $ = "CB_FSI_OPTOUTED" ascii wide + $ = "CB_FSI_OPTOUT_DO" ascii wide + $ = "CB_FSI_ORGANIC_RESULT" ascii wide + $ = "CB_FSI_ORGANIC_SHOW" ascii wide + $ = "CB_FSI_ORGREDIR" ascii wide + $ = "CB_FSI_SKIP" ascii wide + $ = "MNTZ_INJECT" ascii wide + $ = "MNTZ_LOADED" ascii wide + $ = "OPTOUT_SHOW" ascii wide + $ = "PROMO_ANLZ" ascii wide + $ = "URL_IGNOREDOMAIN" ascii wide + $ = "URL_STATICFILE" ascii wide + + condition: + 5 of them +} + +rule LNKR_JS_b +{ + meta: + id = "FooEUkiF1qekRyatQeewJ" + fingerprint = "bcc81d81472d21d4fdbd10f7713c77e7246b07644abf5c2a0c8e26bf3a2d2865" + version = "1.0" + creation_date = "2021-04-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies LNKR, an aggressive adware that also performs clickjacking." + category = "MALWARE" + malware_type = "ADWARE" + + strings: + $ = "StartAll ok" ascii wide + $ = "dexscriptid" ascii wide + $ = "dexscriptpopup" ascii wide + $ = "rid=LAUNCHED" ascii wide + + condition: + 3 of them +} + +rule LNKR_JS_c +{ + meta: + id = "1QAyO1czEHnDRAk825ZUFn" + fingerprint = "9c839a66b2212d9ae94cd4ccd0150ff1c9c34d3fa797f015afa742407a7f4d4b" + version = "1.0" + creation_date = "2021-04-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies LNKR, an aggressive adware that also performs clickjacking." + category = "MALWARE" + malware_type = "ADWARE" + + strings: + $ = "var affid" ascii wide + $ = "var alsotry_enabled" ascii wide + $ = "var boot_time" ascii wide + $ = "var checkinc" ascii wide + $ = "var dom" ascii wide + $ = "var fsgroup" ascii wide + $ = "var gcheckrunning" ascii wide + $ = "var kodom" ascii wide + $ = "var last_keywords" ascii wide + $ = "var trkid" ascii wide + $ = "var uid" ascii wide + $ = "var wcleared" ascii wide + + condition: + 3 of them +} + +rule LNKR_JS_d +{ + meta: + id = "ixfWYGMOBADN6j1c4HrnP" + fingerprint = "ea7abac4ced554a26930c025a84bc5188eb195f2b3488628063f0be35c937a59" + version = "1.0" + creation_date = "2021-04-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies LNKR, an aggressive adware that also performs clickjacking." + category = "MALWARE" + malware_type = "ADWARE" + + strings: + $ = "adTrack" ascii wide + $ = "addFSBeacon" ascii wide + $ = "addYBeacon" ascii wide + $ = "algopopunder" ascii wide + $ = "applyAdDesign" ascii wide + $ = "applyGoogleDesign" ascii wide + $ = "deleteElement" ascii wide + $ = "fixmargin" ascii wide + $ = "galgpop" ascii wide + $ = "getCurrentKw" ascii wide + $ = "getGoogleListing" ascii wide + $ = "getParameterByName" ascii wide + $ = "getXDomainRequest" ascii wide + $ = "googlecheck" ascii wide + $ = "hasGoogleListing" ascii wide + $ = "insertAfter" ascii wide + $ = "insertNext" ascii wide + $ = "insertinto" ascii wide + $ = "isGoogleNewDesign" ascii wide + $ = "moreReq" ascii wide + $ = "openInNewTab" ascii wide + $ = "pagesurf" ascii wide + $ = "replaceRel" ascii wide + $ = "sendData" ascii wide + $ = "sizeinc" ascii wide + $ = "streamAds" ascii wide + $ = "urlcleanup" ascii wide + + condition: + 10 of them +}rule Monero_Compromise +{ + meta: + id = "2oIDqilozjDoCoilh0uEV2" + fingerprint = "749f8aa9e70217387a3491e3e050d37e85fee65e50ae476e58a1dc77198fc017" + version = "1.0" + creation_date = "2019-11-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies compromised Monero binaries." + category = "MALWARE" + reference = "https://bartblaze.blogspot.com/2019/11/monero-project-compromised.html" + + + strings: + $ = "ZN10cryptonote13simple_wallet9send_seedERKN4epee15wipeable_stringE" ascii wide + $ = "ZN10cryptonote13simple_wallet10send_to_ccENSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEES6_i" ascii wide + $ = "node.xmrsupport.co" ascii wide + $ = "node.hashmonero.com" ascii wide + + condition: + any of them +}rule OfflRouter +{ + meta: + id = "2I5ccrcSBA9kdy7i0OPcb7" + fingerprint = "6b633ac8b42943fd5868a2632518c3c30104010478c0fc42ee3613e3581b876e" + version = "1.0" + creation_date = "2022-01-01" + first_imported = "2022-01-24" + last_modified = "2022-01-24" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies OfflRouter, malware which spreads to Office documents and removable drives." + category = "MALWARE" + reference = "https://www.csirt.gov.sk/wp-content/uploads/2021/08/analysis_offlrouter.pdf" + + strings: + /* + Dim num As Long = 0L + Dim num2 As Long = CLng((Bytes.Length - 1)) + For num3 As Long = num To num2 + Bytes(CInt(num3)) = (Bytes(CInt(num3)) Xor CByte(((num3 + CLng(Bytes.Length) + 1L) Mod &H100L))) + */ + $ = { 16 6A 02 50 8E B7 17 59 6A 0B 0A 2B 22 02 50 06 69 02 50 06 69 91 06 02 50 8E B7 6A 58 17 6A 58 20 00 01 00 00 6A 5D D2 61 9C 06 17 6A 58 0A 06 07 } + + condition: + all of them +} +rule Parallax +{ + meta: + id = "7AHV77y7ZoCjGyFbljjWV6" + fingerprint = "3ae9c820e411829619984c5e5311e8940248a771cfde3f22d2789ccb3c099be8" + version = "1.0" + creation_date = "2020-09-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Parallax RAT." + category = "MALWARE" + malware = "PARALLAX" + malware_type = "RAT" + + strings: + $ = ".DeleteFile(Wscript.ScriptFullName)" ascii wide + $ = ".DeleteFolder" ascii wide fullword + $ = ".FileExists" ascii wide fullword + $ = "= CreateObject" ascii wide fullword + $ = "Clipboard Start" ascii wide fullword + $ = "UN.vbs" ascii wide fullword + $ = "[Alt +" ascii wide fullword + $ = "[Clipboard End]" ascii wide fullword + $ = "[Ctrl +" ascii wide fullword + + condition: + 3 of them +}rule PurpleFox_a +{ + meta: + id = "oxM5h0sJv3kfrf6E6rDMZ" + fingerprint = "fef41f58521abd9a60ad6c35f7b0fe466e132f0e592bea1439b9f42799a50eb4" + version = "1.0" + creation_date = "2021-11-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies PurpleFox aka DirtyMoe botnet." + category = "MALWARE" + malware = "PURPLEFOX" + malware_type = "BOT" + + strings: + $movetmp = { 4? 8d 4d 38 4? 8b 95 88 01 00 00 4? 8d 05 1f 01 00 00 e8 9a c8 fd ff 4? 8b 4d 38 e8 51 cc fd ff 4? 89 c1 4? 8d 55 48 e8 55 07 fe ff 4? 89 c3 4? 83 fb ff 74 74 8b 45 48 83 e0 10 83 f8 10 74 50 4? 8d 4d 30 4? 8d 55 74 4? c7 c0 04 01 00 00 4? 33 c9 e8 9a c6 fd ff 4? 8d 4d 40 4? 8b 95 88 01 00 00 4? 8b 45 30 e8 46 c8 fd ff 4? 8b 4d 40 e8 fd cb fd ff 4? 89 c1 4? 33 d2 e8 c2 09 fe ff 4? 8b 4d 40 e8 e9 cb fd ff 4? 89 c1 e8 a1 06 fe ff 4? 89 d9 4? 8d 55 48 e8 f5 06 fe ff 85 c0 75 95 4? 89 d9 e8 19 3d fe ff } + + condition: + all of them +} + +rule PurpleFox_b +{ + meta: + id = "5dC5laJvjwww0AfMejPBAT" + fingerprint = "84ade7b1f157b33b53d04b84689ad6ea4309abe40c2dad360825eb2f0e6a373b" + version = "1.0" + creation_date = "2021-11-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies PurpleFox aka DirtyMoe botnet." + category = "MALWARE" + + strings: + $ = /dump_[A-Z0-9]{8}/ ascii wide + $ = "cscdll.dll" ascii wide + $ = "sens.dll" ascii wide + + condition: + all of them +} + +rule PurpleFox_c +{ + meta: + id = "5ImXAdrniKP1eF4xcQJpmC" + fingerprint = "078423ceb734b361b95537288f5d8b96d6c5d91b10fa5728c253131b35f0c201" + version = "1.0" + creation_date = "2021-11-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies PurpleFox aka DirtyMoe botnet." + category = "MALWARE" + + strings: + $ = "UpProxyRandom" ascii wide + $ = "SetServiceName" ascii wide + $ = "DrvServiceName" ascii wide + $ = "DriverOpenName" ascii wide + $ = "DirLogFilePath" ascii wide + $ = "RunPeShellPath" ascii wide + $ = "DriverFileName" ascii wide + + condition: + all of them +} + +rule PurpleFox_Dropper +{ + meta: + id = "27j3DK8uiYjKigXCaoPUEK" + fingerprint = "53c2af74e917254858409ea37d32e250656aa741800516020bdfff37732a3f51" + version = "1.0" + creation_date = "2021-11-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies PurpleFox aka DirtyMoe botnet, dropper CAB or MSI package." + category = "MALWARE" + malware_type = "DROPPER" + + strings: + $doc = {D0 CF 11 E0} + $cab = {4D 53 43 46} + $s1 = "sysupdate.log" ascii wide + $s2 = "winupdate32.log" ascii wide + $s3 = "winupdate64.log" ascii wide + + condition: + ($doc at 0 and all of ($s*)) or ($cab at 0 and all of ($s*)) +} +rule RedLine_a +{ + meta: + id = "4Eeg9my5Llk67wiTDuBhLS" + fingerprint = "8ba3c33d3affea6488b4fc056ad672922e243c790f16695bcf27c6dfab4ec611" + version = "1.0" + creation_date = "2021-06-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies RedLine stealer." + category = "MALWARE" + malware = "REDLINE" + malware = "INFOSTEALER" + + strings: + $ = "Account" ascii wide + $ = "AllWalletsRule" ascii wide + $ = "ArmoryRule" ascii wide + $ = "AtomicRule" ascii wide + $ = "Autofill" ascii wide + $ = "BrowserExtensionsRule" ascii wide + $ = "BrowserVersion" ascii wide + $ = "Chrome" ascii wide + $ = "CoinomiRule" ascii wide + $ = "CommandLineUpdate" ascii wide + $ = "CryptoHelper" ascii wide + $ = "CryptoProvider" ascii wide + $ = "DataBaseConnection" ascii wide + $ = "DesktopMessangerRule" ascii wide + $ = "DiscordRule" ascii wide + $ = "DisplayHelper" ascii wide + $ = "DownloadAndExecuteUpdate" ascii wide + $ = "DownloadUpdate" ascii wide + $ = "ElectrumRule" ascii wide + $ = "EndpointConnection" ascii wide + $ = "EthRule" ascii wide + $ = "ExodusRule" ascii wide + $ = "Extensions" ascii wide + $ = "FileCopier" ascii wide + $ = "FileScanner" ascii wide + $ = "FileScannerArg" ascii wide + $ = "FileScannerRule" ascii wide + $ = "FileZilla" ascii wide + $ = "GameLauncherRule" ascii wide + $ = "Gecko" ascii wide + $ = "GeoHelper" ascii wide + $ = "GeoInfo" ascii wide + $ = "GeoPlugin" ascii wide + $ = "GuardaRule" ascii wide + $ = "HardwareType" ascii wide + $ = "IpSb" ascii wide + $ = "IRemoteEndpoint" ascii wide + $ = "ITaskProcessor" ascii wide + $ = "JaxxRule" ascii wide + $ = "NordApp" ascii wide + $ = "OpenUpdate" ascii wide + $ = "OpenVPNRule" ascii wide + $ = "OsCrypt" ascii wide + $ = "Program" ascii wide + $ = "ProgramMain" ascii wide + $ = "ProtonVPNRule" ascii wide + $ = "RecordHeaderField" ascii wide + $ = "RecoursiveFileGrabber" ascii wide + $ = "ResultFactory" ascii wide + $ = "ScanDetails" ascii wide + $ = "ScannedBrowser" ascii wide + $ = "ScannedCookie" ascii wide + $ = "ScannedFile" ascii wide + $ = "ScanningArgs" ascii wide + $ = "ScanResult" ascii wide + $ = "SqliteMasterEntry" ascii wide + $ = "StringDecrypt" ascii wide + $ = "SystemHardware" ascii wide + $ = "SystemInfoHelper" ascii wide + $ = "TableEntry" ascii wide + $ = "TaskResolver" ascii wide + $ = "UpdateAction" ascii wide + $ = "UpdateTask" ascii wide + $ = "XMRRule" ascii wide + + condition: + 45 of them +} + +rule RedLine_b +{ + meta: + id = "6Ds02SHJ9xqDC5ehVb5PEZ" + fingerprint = "5ecb15004061205cdea7bcbb6f28455b6801d82395506fd43769d591476c539e" + version = "1.0" + creation_date = "2021-10-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies RedLine stealer." + category = "MALWARE" + + strings: + $ = "Account" ascii wide + $ = "AllWallets" ascii wide + $ = "Autofill" ascii wide + $ = "Browser" ascii wide + $ = "BrowserVersion" ascii wide + $ = "Chr_0_M_e" ascii wide + $ = "CommandLineUpdate" ascii wide + $ = "ConfigReader" ascii wide + $ = "DesktopMessanger" ascii wide + $ = "Discord" ascii wide + $ = "DownloadAndExecuteUpdate" ascii wide + $ = "DownloadUpdate" ascii wide + $ = "EndpointConnection" ascii wide + $ = "Extensions" ascii wide + $ = "FileCopier" ascii wide + $ = "FileScanner" ascii wide + $ = "FileScannerArg" ascii wide + $ = "FileScanning" ascii wide + $ = "FileSearcher" ascii wide + $ = "FileZilla" ascii wide + $ = "FullInfoSender" ascii wide + $ = "GameLauncher" ascii wide + $ = "GdiHelper" ascii wide + $ = "GeoInfo" ascii wide + $ = "GeoPlugin" ascii wide + $ = "HardwareType" ascii wide + $ = "IContract" ascii wide + $ = "ITaskProcessor" ascii wide + $ = "IdentitySenderBase" ascii wide + $ = "LocalState" ascii wide + $ = "LocatorAPI" ascii wide + $ = "NativeHelper" ascii wide + $ = "NordApp" ascii wide + $ = "OpenUpdate" ascii wide + $ = "OpenVPN" ascii wide + $ = "OsCrypt" ascii wide + $ = "ParsSt" ascii wide + $ = "PartsSender" ascii wide + $ = "RecordHeaderField" ascii wide + $ = "ScanDetails" ascii wide + $ = "ScanResult" ascii wide + $ = "ScannedCookie" ascii wide + $ = "ScannedFile" ascii wide + $ = "ScanningArgs" ascii wide + $ = "SenderFactory" ascii wide + $ = "SqliteMasterEntry" ascii wide + $ = "StringDecrypt" ascii wide + $ = "SystemHardware" ascii wide + $ = "SystemInfoHelper" ascii wide + $ = "TableEntry" ascii wide + $ = "TaskResolver" ascii wide + $ = "UpdateAction" ascii wide + $ = "UpdateTask" ascii wide + $ = "WalletConfig" ascii wide + + condition: + 45 of them +} + +import "dotnet" + +rule RedLine_Campaign_June2021 +{ + meta: + id = "6obnDftS8HPC8ATVxov3ol" + fingerprint = "4f389cf9f0343eb0e526c25f0beea9a0b284e96029dc064e85557ae2fe8bdf9d" + version = "1.0" + creation_date = "2021-06-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies RedLine stealer's June 2021 campaign." + category = "MALWARE" + reference = "https://bartblaze.blogspot.com/2021/06/digital-artists-targeted-in-redline.html" + + + condition: + dotnet.guids[0]=="a862cb90-79c7-41a9-847b-4ce4276feaeb" or dotnet.guids[0]=="a955bdf8-f5ac-4383-8f5d-a4111125a40e" or dotnet.guids[0]=="018ca516-2128-434a-b7c6-8f9a75dfc06e" or dotnet.guids[0]=="829c9056-6c93-42c2-a9c8-19822ccac0a4" or dotnet.guids[0]=="e1a702b0-dee1-463a-86d3-e6a9aa86348e" or dotnet.guids[0]=="6152d28b-1775-47e6-902f-8bdc9e2cb7ca" or dotnet.guids[0]=="111ab36c-09ad-4a3e-92b3-a01076ce68e0" or dotnet.guids[0]=="ea7dfb6d-f951-48e6-9e25-41c31080fd42" or dotnet.guids[0]=="34bca13d-abb5-49ce-8333-052ec690e01e" or dotnet.guids[0]=="1422b4dd-c4c1-4885-b204-200e83267597" or dotnet.guids[0]=="d0570d65-3998-4954-ab42-13b122f7dde5" +}import "dotnet" + +rule RedLine_Campaign_June2021 +{ + meta: + id = "6obnDftS8HPC8ATVxov3ol" + fingerprint = "4f389cf9f0343eb0e526c25f0beea9a0b284e96029dc064e85557ae2fe8bdf9d" + version = "1.0" + creation_date = "2021-06-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies RedLine stealer's June 2021 campaign." + category = "MALWARE" + malware = "REDLINE" + malware_type = "INFOSTEALER" + reference = "https://bartblaze.blogspot.com/2021/06/digital-artists-targeted-in-redline.html" + + + condition: + dotnet.guids[0]=="a862cb90-79c7-41a9-847b-4ce4276feaeb" or dotnet.guids[0]=="a955bdf8-f5ac-4383-8f5d-a4111125a40e" or dotnet.guids[0]=="018ca516-2128-434a-b7c6-8f9a75dfc06e" or dotnet.guids[0]=="829c9056-6c93-42c2-a9c8-19822ccac0a4" or dotnet.guids[0]=="e1a702b0-dee1-463a-86d3-e6a9aa86348e" or dotnet.guids[0]=="6152d28b-1775-47e6-902f-8bdc9e2cb7ca" or dotnet.guids[0]=="111ab36c-09ad-4a3e-92b3-a01076ce68e0" or dotnet.guids[0]=="ea7dfb6d-f951-48e6-9e25-41c31080fd42" or dotnet.guids[0]=="34bca13d-abb5-49ce-8333-052ec690e01e" or dotnet.guids[0]=="1422b4dd-c4c1-4885-b204-200e83267597" or dotnet.guids[0]=="d0570d65-3998-4954-ab42-13b122f7dde5" +}rule SaintBot +{ + meta: + id = "5zQ5DvA1lpgHKfGgGgFvvp" + fingerprint = "f8ed9e3cdd5411e2bda7495c8b00b8e69e8f495db97cf542f6a1f3b790bef7a5" + version = "1.0" + creation_date = "2022-07-29" + first_imported = "2022-07-29" + last_modified = "2022-07-29" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Saint Bot malware downloader." + category = "MALWARE" + malware = "SAINTBOT" + malware_type = "DOWNLOADER" + + strings: + $ = "de:regsvr32" ascii wide + $ = "de:LoadMemory" ascii wide + $ = "de:LL" ascii wide + $ = "/gate.php" ascii wide + + condition: + all of them +} +rule SystemBC_Socks +{ + meta: + id = "6zIY8rmud3SM6CWLPwxaky" + fingerprint = "09472e26edd142cd68a602f1b6e31abbd4c8ec90c36d355a01692d44ef02a14f" + version = "1.0" + creation_date = "2021-07-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies SystemBC RAT, Socks proxy version." + category = "MALWARE" + malware = "SYSTEMBC" + malware_type = "RAT" + + strings: + $code1 = { 68 10 27 00 00 e8 ?? ?? ?? ?? 8d ?? 72 fe ff ff 50 68 02 02 00 00 e8 ?? ?? + ?? ?? 85 c0 75 ?? c7 8? ?? ?? ?? ?? ?? ?? ?? ?? 8d ?? 60 fe ff ff 50 6a ff 68 ?? ?? + ?? ?? e8 ?? ?? ?? ?? 8d ?? 60 fe ff ff 50 e8 ?? ?? ?? ?? 89 8? ?? ?? ?? ?? ff b? ?? + ?? ?? ?? ff b? ?? ?? ?? ?? e8 ?? ?? ?? ?? 85 c0 75 ?? 81 b? ?? ?? ?? ?? ?? ?? ?? ?? + 75 ?? c7 8? ?? ?? ?? ?? ?? ?? ?? ?? eb ?? } + $code2 = { 55 8b ec 81 c4 d0 fe ff ff 53 57 56 8d ?? f4 2b cc 51 8d ?? ?4 10 50 e8 + ?? ?? ?? ?? 6a 06 6a 01 6a 02 e8 ?? ?? ?? ?? 89 4? ?? 6a 04 ff 7? ?? 8d ?? fc 50 e8 + ?? ?? ?? ?? c7 8? ?? ?? ?? ?? 01 00 00 00 6a 04 8d ?? d4 fe ff ff 50 6a 01 6a 06 ff + 7? ?? e8 ?? ?? ?? ?? 8d ?? d8 fe ff ff 50 6a ff ff 7? ?? e8 ?? ?? ?? ?? 6a 02 8d ?? + d8 fe ff ff 50 e8 ?? ?? ?? ?? 89 4? ?? 8b 4? ?? 3d 00 00 01 00 76 ?? 50 e8 ?? ?? ?? ?? } + + condition: + any of them +} + +rule SystemBC_Config +{ + meta: + id = "70WDDM1D5xtPBqsUdBiPTK" + fingerprint = "8de029e2f4fc81742a3e04976a58360e403ce5737098c14e0a007c306a1e0f01" + version = "1.0" + creation_date = "2021-07-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies SystemBC RAT, decrypted config." + category = "MALWARE" + malware_type = "RAT" + + strings: + $ = "BEGINDATA" ascii wide fullword + $ = "HOST1:" ascii wide fullword + $ = "HOST2:" ascii wide fullword + $ = "PORT1:" ascii wide fullword + $ = "TOR:" ascii wide fullword + $ = "-WindowStyle Hidden -ep bypass -file" ascii wide + + condition: + 3 of them +}rule Unk_BR_Banker +{ + meta: + id = "5IYTPDXywF5zMWuDcnVYFz" + fingerprint = "188bfe548c195449556fa093144b8bd7ed2eb6d506b1fd251ee6c131a34dc59b" + version = "1.0" + creation_date = "2021-06-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies an unknown Brazilian banking trojan." + category = "MALWARE" + malware_type = "BANKER" + + strings: + $ = "" ascii wide + $ = "" ascii wide + $ = "" ascii wide + $ = "<|LULUZDC|>" ascii wide + $ = "<|LULUZLD|>" ascii wide + $ = "<|LULUZLU|>" ascii wide + $ = "<|LULUZPos|>" ascii wide + $ = "<|LULUZRD|>" ascii wide + $ = "<|LULUZRU|>" ascii wide + $ = ">CRIAR_ALARME_AZUL<" ascii wide + $ = ">ESCREVER_BOTAO_DIREITO<" ascii wide + $ = ">REMOVER_ALARME_GRAY<" ascii wide + $ = ">WIN_SETA_ACIMA<" ascii wide + $ = ">WIN_SETA_BAIXO<" ascii wide + $ = ">WIN_SETA_ESQUERDA<" ascii wide + $ = "BOTAO_DIREITO" ascii wide + + condition: + 5 of them +}import "pe" + +rule Unk_Crime_Downloader_1 +{ + meta: + id = "5T0oYPMEQOSKnlIWNqI5y" + fingerprint = "826ce149c9b9f2aa04176213db1a8e8c8a57f0c2bcaeceb532a8282b80c31f7b" + version = "1.0" + creation_date = "2020-10-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Unknown downloader DLL, likely used by Emotet and/or TrickBot." + category = "MALWARE" + malware = "EMOTET" + malware_type = "DOWNLOADER" + mitre_att = "S0367" + hash = "3d2ca7dc3d7c0aa120ed70632f9f0a15" + + strings: + $ = "LDR.dll" ascii wide fullword + $ = "URLDownloadToFileA" ascii wide + + condition: + all of them or pe.imphash()=="4f8a708f1b809b780e4243486a40a465" +}rule Unk_DesktopLoader +{ + meta: + id = "5XutaPgnKyd7zIb41Eqna1" + fingerprint = "1c8def2957471e3fc4b17be9fd65466b23b8cf997f0df74fb6103f8421751a2e" + version = "1.0" + creation_date = "2021-08-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies implant that will decrypt and load shellcode from a blob file. Calling it DesktopLoader for now, based on the filename it seeks." + category = "MALWARE" + reference = "https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lockfile-ransomware-new-petitpotam-windows" + + + strings: + $ = { 68 00 08 00 00 68 ?? ?? ?? ?? 6a 00 ff 15 ?? ?? ?? ?? 33 + c9 85 c0 7e ?? ba 5c 00 00 00 8d 49 00 66 39 14 ?? ?? ?? ?? ?? + 75 ?? 85 c9 74 ?? 49 48 85 c0 7f ?? eb ?? 33 c9 66 89 0c ?? ?? + ?? ?? ?? 68 ?? ?? ?? ?? 68 ?? ?? ?? ?? ff 15 ?? ?? ?? ?? 6a 00 + 68 80 00 00 00 6a 03 6a 00 6a 02 68 00 00 00 80 68 ?? ?? ?? ?? + ff 15 ?? ?? ?? ?? 83 f8 ff 75 ?? 6a 00 ff 15 ?? ?? ?? ?? } + + condition: + any of them +}rule ZLoader +{ + meta: + id = "2JUpH4J7F9VVLnQm59k5t9" + fingerprint = "b6cc36932d196457ad66df7815f1eb3a5e8561686d9184286a375bc78a209db0" + version = "1.0" + creation_date = "2020-04-01" + first_imported = "2021-12-30" + last_modified = "2022-02-03" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies ZLoader in memory or unpacked." + category = "MALWARE" + malware = "ZLOADER" + malware_type = "LOADER" + + + strings: + /* + 00104bc0 89 f8 MOV EAX,EDI + 00104bc2 8b 0d 00 MOV ECX,dword ptr [PTR_s_#Irb4utunQPhJZjSn_0010b000] = 0010a4d0 + b0 10 00 + 00104bc8 99 CDQ + 00104bc9 f7 7d f0 IDIV dword ptr [EBP + local_14] + 00104bcc 8b 45 08 MOV EAX,dword ptr [EBP + param_1] + 00104bcf 0f b6 1c 11 MOVZX EBX,byte ptr [ECX + EDX*0x1]=>s_#Irb4utunQPhJZ = "#Irb4utunQPhJZjSn" + 00104bd3 32 1c 38 XOR BL,byte ptr [EAX + EDI*0x1] + 00104bd6 88 1c 3e MOV byte ptr [ESI + EDI*0x1],BL + 00104bd9 8d 7f 01 LEA EDI,[EDI + 0x1] + */ + $code = { 89 f8 8b 0d ?? ?? ?? ?? 99 f7 7? ?? 8b 4? ?? 0f b6 1c ?? 32 + 1c 38 88 1c 3e 8d 7f 01 74 ?? e8 ?? ?? ?? ?? 80 fb 7f 74 ?? 38 c3 7d + ?? 80 fb 0d 77 ?? 0f b6 c3 b9 00 26 00 00 0f a3 c1 72 ?? } + $dll = "antiemule-loader-bot32.dll" ascii wide fullword + $s1 = "/post.php" ascii wide + $s2 = "BOT-INFO" ascii wide + $s3 = "Connection: close" ascii wide + $s4 = "It's a debug version." ascii wide + $s5 = "Proxifier is a conflict program, form-grabber and web-injects will not works. Terminate proxifier for solve this problem." ascii wide + $s6 = "rhnbeqcuwzbsjwfsynex" ascii wide fullword + + condition: + $code or $dll or (4 of ($s*)) +} +rule AutoIT_Compiled +{ + meta: + id = "1HD8y9jsBZi1HDN82XCpZx" + fingerprint = "7d7623207492860e4196e8c8a493b874bb3042c83f19e61e1d958e79a09bc8f8" + version = "1.0" + creation_date = "2020-09-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies compiled AutoIT script (as EXE)." + category = "MALWARE" + + strings: + $ = "#OnAutoItStartRegister" ascii wide + $ = "#pragma compile" ascii wide + $ = "/AutoIt3ExecuteLine" ascii wide + $ = "/AutoIt3ExecuteScript" ascii wide + $ = "/AutoIt3OutputDebug" ascii wide + $ = ">>>AUTOIT NO CMDEXECUTE<<<" ascii wide + $ = ">>>AUTOIT SCRIPT<<<" ascii wide + $ = "This is a third-party compiled AutoIt script." ascii wide + + condition: + uint16(0)==0x5A4D and any of them +} + +rule AutoIT_Script +{ + meta: + id = "vpilwARgwZCuMLJPuubYB" + fingerprint = "87dfe76f69bd344860faf3dc46f16b56a2c86a0a3f3763edf8f51860346a16c2" + version = "1.0" + creation_date = "2020-09-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies AutoIT script." + category = "MALWARE" + + strings: + $ = "#OnAutoItStartRegister" ascii wide + $ = "#pragma compile" ascii wide + $ = "/AutoIt3ExecuteLine" ascii wide + $ = "/AutoIt3ExecuteScript" ascii wide + $ = "/AutoIt3OutputDebug" ascii wide + $ = ">>>AUTOIT NO CMDEXECUTE<<<" ascii wide + $ = ">>>AUTOIT SCRIPT<<<" ascii wide + $ = "This is a third-party compiled AutoIt script." ascii wide + + condition: + uint16(0)!=0x5A4D and any of them +}rule EnigmaStub +{ + meta: + id = "nqfVjSZe90wUTGsVBo1SU" + fingerprint = "7cc425b53393fbe7b1f4ad16d1fcb37f941199ff12341c74103c4cda14dd5e2c" + version = "1.0" + creation_date = "2020-03-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies Enigma packer stub." + category = "MALWARE" + + strings: + $ = "Enigma anti-emulators plugin - GetProcAddress" ascii wide + $ = "Enigma anti-debugger plugin - CheckRemoteDebuggerPresent" ascii wide + $ = "Enigma anti-debugger plugin - IsDebuggerPresent" ascii wide + $ = "Enigma Sandboxie Detect plugin" ascii wide + $ = "Enigma_Plugin_Description" ascii wide + $ = "Enigma_Plugin_About" ascii wide + $ = "Enigma_Plugin_OnFinal" ascii wide + $ = "EnigmaProtector" ascii wide + $ = "Enigma_Plugin_OnInit" ascii wide + + condition: + any of them +}rule Generic_Phishing_PDF +{ + meta: + id = "6iE0XEqqhVGNED6Z8xIMr1" + fingerprint = "f3f31ec9651ee41552d41dbd6650899d7a33beea46ed1c3329c3bbd023fe128e" + version = "1.0" + creation_date = "2019-03-01" + first_imported = "2021-12-30" + last_modified = "2021-12-30" + status = "RELEASED" + sharing = "TLP:WHITE" + source = "BARTBLAZE" + author = "@bartblaze" + description = "Identifies generic phishing PDFs." + category = "MALWARE" + reference = "https://bartblaze.blogspot.com/2019/03/analysing-massive-office-365-phishing.html" + + + strings: + $pdf = {25504446} + $s1 = "RAD PDF" + $s2 = "