Commit 0b49008c by Marc Rivero López Committed by GitHub

Update APT_Terracota.yar

parent 9a4841e3
...@@ -12,102 +12,124 @@ ...@@ -12,102 +12,124 @@
Identifier: Terracotta APT Identifier: Terracotta APT
Comment: Reduced Rule Set Comment: Reduced Rule Set
*/ */
rule Apolmy_Privesc_Trojan {
meta: rule Apolmy_Privesc_Trojan
description = "Apolmy Privilege Escalation Trojan used in APT Terracotta" {
author = "Florian Roth"
reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/" meta:
date = "2015-08-04" description = "Apolmy Privilege Escalation Trojan used in APT Terracotta"
score = 80 author = "Florian Roth"
hash = "d7bd289e6cee228eb46a1be1fcdc3a2bd5251bc1eafb59f8111756777d8f373d" reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/"
strings: date = "2015-08-04"
$s1 = "[%d] Failed, %08X" fullword ascii score = 80
$s2 = "[%d] Offset can not fetched." fullword ascii hash = "d7bd289e6cee228eb46a1be1fcdc3a2bd5251bc1eafb59f8111756777d8f373d"
$s3 = "PowerShadow2011" fullword wide
condition: strings:
uint16(0) == 0x5a4d and filesize < 300KB and all of them $s1 = "[%d] Failed, %08X" fullword ascii
$s2 = "[%d] Offset can not fetched." fullword ascii
$s3 = "PowerShadow2011" fullword wide
condition:
uint16(0) == 0x5a4d and filesize < 300KB and all of them
} }
rule Mithozhan_Trojan { rule Mithozhan_Trojan
meta: {
description = "Mitozhan Trojan used in APT Terracotta"
author = "Florian Roth" meta:
reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/" description = "Mitozhan Trojan used in APT Terracotta"
date = "2015-08-04" author = "Florian Roth"
score = 70 reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/"
hash = "8553b945e2d4b9f45c438797d6b5e73cfe2899af1f9fd87593af4fd7fb51794a" date = "2015-08-04"
strings: score = 70
$s1 = "adbrowser" fullword wide hash = "8553b945e2d4b9f45c438797d6b5e73cfe2899af1f9fd87593af4fd7fb51794a"
$s2 = "IJKLlGdmaWhram0vn36BgIOChYR3L45xcHNydXQvhmloa2ptbH8voYCDTw==" fullword ascii
$s3 = "EFGHlGdmaWhrL41sf36BgIOCL6R3dk8=" fullword ascii strings:
condition: $s1 = "adbrowser" fullword wide
uint16(0) == 0x5a4d and filesize < 300KB and all of them $s2 = "IJKLlGdmaWhram0vn36BgIOChYR3L45xcHNydXQvhmloa2ptbH8voYCDTw==" fullword ascii
$s3 = "EFGHlGdmaWhrL41sf36BgIOCL6R3dk8=" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 300KB and all of them
} }
rule RemoteExec_Tool { rule RemoteExec_Tool
meta: {
description = "Remote Access Tool used in APT Terracotta"
author = "Florian Roth" meta:
reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/" description = "Remote Access Tool used in APT Terracotta"
date = "2015-08-04" author = "Florian Roth"
hash = "a550131e106ff3c703666f15d55d9bc8c816d1cb9ac1b73c2e29f8aa01e53b78" reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/"
strings: date = "2015-08-04"
$s0 = "cmd.exe /q /c \"%s\"" fullword ascii hash = "a550131e106ff3c703666f15d55d9bc8c816d1cb9ac1b73c2e29f8aa01e53b78"
$s1 = "\\\\.\\pipe\\%s%s%d" fullword ascii
$s2 = "This is a service executable! Couldn't start directly." fullword ascii strings:
$s3 = "\\\\.\\pipe\\TermHlp_communicaton" fullword ascii $s0 = "cmd.exe /q /c \"%s\"" fullword ascii
$s4 = "TermHlp_stdout" fullword ascii $s1 = "\\\\.\\pipe\\%s%s%d" fullword ascii
$s5 = "TermHlp_stdin" fullword ascii $s2 = "This is a service executable! Couldn't start directly." fullword ascii
condition: $s3 = "\\\\.\\pipe\\TermHlp_communicaton" fullword ascii
uint16(0) == 0x5a4d and filesize < 75KB and 4 of ($s*) $s4 = "TermHlp_stdout" fullword ascii
$s5 = "TermHlp_stdin" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 75KB and 4 of ($s*)
} }
/* Super Rules ------------------------------------------------------------- */ /* Super Rules ------------------------------------------------------------- */
rule LiuDoor_Malware_1 { rule LiuDoor_Malware_1
meta: {
description = "Liudoor Trojan used in Terracotta APT"
author = "Florian Roth" meta:
reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/" description = "Liudoor Trojan used in Terracotta APT"
date = "2015-08-04" author = "Florian Roth"
score = 70 reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/"
super_rule = 1 date = "2015-08-04"
hash1 = "deed6e2a31349253143d4069613905e1dfc3ad4589f6987388de13e33ac187fc" score = 70
hash2 = "4575e7fc8f156d1d499aab5064a4832953cd43795574b4c7b9165cdc92993ce5" super_rule = 1
hash3 = "ad1a507709c75fe93708ce9ca1227c5fefa812997ed9104ff9adfec62a3ec2bb" hash1 = "deed6e2a31349253143d4069613905e1dfc3ad4589f6987388de13e33ac187fc"
strings: hash2 = "4575e7fc8f156d1d499aab5064a4832953cd43795574b4c7b9165cdc92993ce5"
$s1 = "svchostdllserver.dll" fullword ascii hash3 = "ad1a507709c75fe93708ce9ca1227c5fefa812997ed9104ff9adfec62a3ec2bb"
$s2 = "SvcHostDLL: RegisterServiceCtrlHandler %S failed" fullword ascii
$s3 = "\\nbtstat.exe" fullword ascii strings:
$s4 = "DataVersionEx" fullword ascii $s1 = "svchostdllserver.dll" fullword ascii
condition: $s2 = "SvcHostDLL: RegisterServiceCtrlHandler %S failed" fullword ascii
uint16(0) == 0x5a4d and filesize < 150KB and all of them $s3 = "\\nbtstat.exe" fullword ascii
$s4 = "DataVersionEx" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 150KB and all of them
} }
rule LiuDoor_Malware_2 { rule LiuDoor_Malware_2
meta: {
description = "Liudoor Trojan used in Terracotta APT"
author = "Florian Roth" meta:
reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/" description = "Liudoor Trojan used in Terracotta APT"
date = "2015-08-04" author = "Florian Roth"
score = 70 reference = "https://blogs.rsa.com/terracotta-vpn-enabler-of-advanced-threat-anonymity/"
super_rule = 1 date = "2015-08-04"
hash1 = "f3fb68b21490ded2ae7327271d3412fbbf9d705c8003a195a705c47c98b43800" score = 70
hash2 = "e42b8385e1aecd89a94a740a2c7cd5ef157b091fabd52cd6f86e47534ca2863e" super_rule = 1
strings: hash1 = "f3fb68b21490ded2ae7327271d3412fbbf9d705c8003a195a705c47c98b43800"
$s0 = "svchostdllserver.dll" fullword ascii hash2 = "e42b8385e1aecd89a94a740a2c7cd5ef157b091fabd52cd6f86e47534ca2863e"
$s1 = "Lpykh~mzCCRv|mplpykCCHvq{phlCC\\jmmzqkIzmlvpqCC" fullword ascii
condition: strings:
uint16(0) == 0x5a4d and filesize < 100KB and all of them $s0 = "svchostdllserver.dll" fullword ascii
$s1 = "Lpykh~mzCCRv|mplpykCCHvq{phlCC\\jmmzqkIzmlvpqCC" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 100KB and all of them
} }
/* /*
This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license. This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license.
*/ */
rule liudoor : Backdoor rule liudoor
{ {
meta:
meta:
author = "RSA FirstWatch" author = "RSA FirstWatch"
date = "2015-07-23" date = "2015-07-23"
description = "Detects Liudoor daemon backdoor" description = "Detects Liudoor daemon backdoor"
...@@ -118,7 +140,7 @@ meta: ...@@ -118,7 +140,7 @@ meta:
hash4 = "6093505c7f7ec25b1934d3657649ef07" hash4 = "6093505c7f7ec25b1934d3657649ef07"
type = "Win32 DLL" type = "Win32 DLL"
strings: strings:
$string0 = "Succ" $string0 = "Succ"
$string1 = "Fail" $string1 = "Fail"
$string2 = "pass" $string2 = "pass"
...@@ -128,6 +150,6 @@ strings: ...@@ -128,6 +150,6 @@ strings:
$string6 = "0/0B0H0Q0W0k0" $string6 = "0/0B0H0Q0W0k0"
$string7 = "QSUVWh" $string7 = "QSUVWh"
$string8 = "Ht Hu[" $string8 = "Ht Hu["
condition: condition:
all of them all of them
} }
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment