Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
rules
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
rules
Commits
1b00995e
Commit
1b00995e
authored
Jan 23, 2017
by
Marc Rivero López
Committed by
GitHub
Jan 23, 2017
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update APT_Unit78020.yar
parent
b246887b
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
121 additions
and
111 deletions
+121
-111
APT_Unit78020.yar
malware/APT_Unit78020.yar
+121
-111
No files found.
malware/APT_Unit78020.yar
View file @
1b00995e
...
@@ -9,125 +9,135 @@
...
@@ -9,125 +9,135 @@
Identifier: Unit 78020 Malware
Identifier: Unit 78020 Malware
*/
*/
rule Unit78020_Malware_Gen1 {
rule Unit78020_Malware_Gen1
meta:
{
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
author = "Florian Roth"
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
date = "2015-09-24"
hash1 = "2b15e614fb54bca7031f64ab6caa1f77b4c07dac186826a6cd2e254090675d72"
hash2 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
hash3 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
hash4 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
hash5 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
hash6 = "88c5be84afe20c91e4024160303bafb044f98aa5fbf8c9f9997758a014238790"
strings:
$x1 = "greensky27.vicp.net" fullword wide
$x2 = "POST http://%s:%d/aspxabcdefg.asp?%s HTTP/1.1" fullword ascii
$x3 = "GET http://%s:%d/aspxabcdef.asp?%s HTTP/1.1" fullword ascii
/* additional strings based on PDF report - not found in samples */
$x4 = "serch.vicp.net" fullword wide
$x5 = "greensky27.vicp.net" fullword wide
$x6 = "greensky27.vicp.net.as" fullword wide
$x7 = "greensky27.vcip.net" fullword wide
$x8 = "pnoc-ec.vicp.net" fullword wide
$x9 = "aseanph.vicp.net" fullword wide
$x10 = "pnoc.vicp.net" fullword wide
$a1 = "dMozilla/4.0 (compatible; MSIE 6.0;Windows NT 5.0; .NET CLR 1.1.4322)" fullword wide /* typo */
meta:
$a2 = "User-Agent: Netscape" fullword ascii /* ;) */
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
$a3 = "Accept-Language:En-us/r/n" fullword wide /* typo */
author = "Florian Roth"
$a4 = "\\Office Start.lnk" fullword wide
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
$a5 = "\\MSN Talk Start.lnk" fullword wide
date = "2015-09-24"
hash1 = "2b15e614fb54bca7031f64ab6caa1f77b4c07dac186826a6cd2e254090675d72"
hash2 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
hash3 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
hash4 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
hash5 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
hash6 = "88c5be84afe20c91e4024160303bafb044f98aa5fbf8c9f9997758a014238790"
$s1 = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)" fullword wide
strings:
$s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii
$x1 = "greensky27.vicp.net" fullword wide
$s3 = "%USERPROFILE%\\Application Data\\Mozilla\\Firefox\\Profiles" fullword wide
$x2 = "POST http://%s:%d/aspxabcdefg.asp?%s HTTP/1.1" fullword ascii
$s4 = "Content-Type:application/x-www-form-urlencoded/r/n" fullword wide
$x3 = "GET http://%s:%d/aspxabcdef.asp?%s HTTP/1.1" fullword ascii
$s5 = "Hello World!" fullword wide
/* additional strings based on PDF report - not found in samples */
$s6 = "Accept-Encoding:gzip,deflate/r/n" fullword wide
$x4 = "serch.vicp.net" fullword wide
$s7 = "/%d%s%d" fullword ascii
$x5 = "greensky27.vicp.net" fullword wide
$s8 = "%02d-%02d-%02d %02d:%02d" fullword wide
$x6 = "greensky27.vicp.net.as" fullword wide
$s9 = "WininetMM Version 1.0" fullword wide
$x7 = "greensky27.vcip.net" fullword wide
$s10 = "WININETMM" fullword wide
$x8 = "pnoc-ec.vicp.net" fullword wide
$s11 = "GET %dHTTP/1.1" fullword ascii
$x9 = "aseanph.vicp.net" fullword wide
$s12 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
$x10 = "pnoc.vicp.net" fullword wide
$s13 = "PeekNamePipe" fullword ascii
$a1 = "dMozilla/4.0 (compatible; MSIE 6.0;Windows NT 5.0; .NET CLR 1.1.4322)" fullword wide /* typo */
$s14 = "Normal.dot" fullword ascii
$a2 = "User-Agent: Netscape" fullword ascii /* ;) */
$s15 = "R_eOR_eOR_eO)CiOS_eO" fullword ascii
$a3 = "Accept-Language:En-us/r/n" fullword wide /* typo */
$s16 = "DRIVE_RAMDISK" fullword wide
$a4 = "\\Office Start.lnk" fullword wide
$s17 = "%s %s %s %s %d %d %d %d " fullword ascii
$a5 = "\\MSN Talk Start.lnk" fullword wide
condition:
$s1 = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)" fullword wide
( uint16(0) == 0x5a4d and filesize < 250KB and 1 of ($x*) ) or
$s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii
2 of ($a*) or
$s3 = "%USERPROFILE%\\Application Data\\Mozilla\\Firefox\\Profiles" fullword wide
6 of ($s*)
$s4 = "Content-Type:application/x-www-form-urlencoded/r/n" fullword wide
$s5 = "Hello World!" fullword wide
$s6 = "Accept-Encoding:gzip,deflate/r/n" fullword wide
$s7 = "/%d%s%d" fullword ascii
$s8 = "%02d-%02d-%02d %02d:%02d" fullword wide
$s9 = "WininetMM Version 1.0" fullword wide
$s10 = "WININETMM" fullword wide
$s11 = "GET %dHTTP/1.1" fullword ascii
$s12 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
$s13 = "PeekNamePipe" fullword ascii
$s14 = "Normal.dot" fullword ascii
$s15 = "R_eOR_eOR_eO)CiOS_eO" fullword ascii
$s16 = "DRIVE_RAMDISK" fullword wide
$s17 = "%s %s %s %s %d %d %d %d " fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 250KB and 1 of ($x*) ) or 2 of ($a*) or 6 of ($s*)
}
}
rule Unit78020_Malware_1 : APT {
rule Unit78020_Malware_1
meta:
{
description = "Detects malware by Chinese APT PLA Unit 78020 - Specific Rule - msictl.exe"
author = "Florian Roth"
meta:
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
description = "Detects malware by Chinese APT PLA Unit 78020 - Specific Rule - msictl.exe"
date = "2015-09-24"
author = "Florian Roth"
hash = "a93d01f1cc2d18ced2f3b2b78319aadc112f611ab8911ae9e55e13557c1c791a"
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
strings:
date = "2015-09-24"
$s1 = "%ProgramFiles%\\Internet Explorer\\iexplore.exe" fullword ascii
hash = "a93d01f1cc2d18ced2f3b2b78319aadc112f611ab8911ae9e55e13557c1c791a"
$s2 = "msictl.exe" fullword ascii
$s3 = "127.0.0.1:8080" fullword ascii
strings:
$s4 = "mshtml.dat" fullword ascii
$s1 = "%ProgramFiles%\\Internet Explorer\\iexplore.exe" fullword ascii
$s5 = "msisvc" fullword ascii
$s2 = "msictl.exe" fullword ascii
$s6 = "NOKIAN95/WEB" fullword ascii
$s3 = "127.0.0.1:8080" fullword ascii
condition:
$s4 = "mshtml.dat" fullword ascii
uint16(0) == 0x5a4d and filesize < 160KB and 4 of them
$s5 = "msisvc" fullword ascii
$s6 = "NOKIAN95/WEB" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 160KB and 4 of them
}
}
rule Unit78020_Malware_Gen2 {
rule Unit78020_Malware_Gen2
meta:
{
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
author = "Florian Roth"
meta:
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
date = "2015-09-24"
author = "Florian Roth"
super_rule = 1
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
hash1 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
date = "2015-09-24"
hash2 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
super_rule = 1
hash3 = "981e2fa1ae4145359036b46e8b53cc5da37dd2311204859761bd91572f025e8a"
hash1 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
strings:
hash2 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
$s0 = "-GetModuleFileNameExW" fullword ascii
hash3 = "981e2fa1ae4145359036b46e8b53cc5da37dd2311204859761bd91572f025e8a"
$s1 = "\\MSN Talk Start.lnk" fullword wide
$s2 = ":SeDebugPrivilege" fullword wide
strings:
$s3 = "WinMM Version 1.0" fullword wide
$s0 = "-GetModuleFileNameExW" fullword ascii
$s4 = "dwError1 = %d" fullword ascii
$s1 = "\\MSN Talk Start.lnk" fullword wide
$s5 = "*Can't Get" fullword wide
$s2 = ":SeDebugPrivilege" fullword wide
condition:
$s3 = "WinMM Version 1.0" fullword wide
uint16(0) == 0x5a4d and filesize < 1000KB and all of them
$s4 = "dwError1 = %d" fullword ascii
$s5 = "*Can't Get" fullword wide
condition:
uint16(0) == 0x5a4d and filesize < 1000KB and all of them
}
}
rule Unit78020_Malware_Gen3 {
rule Unit78020_Malware_Gen3
meta:
{
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule - Chong"
author = "Florian Roth"
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
date = "2015-09-24"
super_rule = 1
hash1 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
hash2 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
strings:
$x1 = "GET http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
$x2 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
$x3 = "J:\\chong\\" ascii
$s1 = "User-Agent: Netscape" fullword ascii
meta:
$s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule - Chong"
$s3 = "Software\\Microsoft\\Windows\\CurrentVersion\\explorer\\User Shell Folders" fullword wide
author = "Florian Roth"
$s4 = "J:\\chong\\nod\\Release\\SslMM.exe" fullword ascii
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
$s5 = "MM.exe" fullword ascii
date = "2015-09-24"
$s6 = "network.proxy.ssl" fullword wide
super_rule = 1
$s7 = "PeekNamePipe" fullword ascii
hash1 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
$s8 = "Host: %ws:%d" fullword ascii
hash2 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
$s9 = "GET %dHTTP/1.1" fullword ascii
$s10 = "SCHANNEL.DLL" fullword ascii /* Goodware String - occured 6 times */
strings:
condition:
$x1 = "GET http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
( uint16(0) == 0x5a4d and filesize < 300KB and 1 of ($x*) ) or
$x2 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
4 of ($s*)
$x3 = "J:\\chong\\" ascii
$s1 = "User-Agent: Netscape" fullword ascii
$s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii
$s3 = "Software\\Microsoft\\Windows\\CurrentVersion\\explorer\\User Shell Folders" fullword wide
$s4 = "J:\\chong\\nod\\Release\\SslMM.exe" fullword ascii
$s5 = "MM.exe" fullword ascii
$s6 = "network.proxy.ssl" fullword wide
$s7 = "PeekNamePipe" fullword ascii
$s8 = "Host: %ws:%d" fullword ascii
$s9 = "GET %dHTTP/1.1" fullword ascii
$s10 = "SCHANNEL.DLL" fullword ascii /* Goodware String - occured 6 times */
condition:
( uint16(0) == 0x5a4d and filesize < 300KB and 1 of ($x*) ) or 4 of ($s*)
}
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment