Commit 1b00995e by Marc Rivero López Committed by GitHub

Update APT_Unit78020.yar

parent b246887b
...@@ -9,125 +9,135 @@ ...@@ -9,125 +9,135 @@
Identifier: Unit 78020 Malware Identifier: Unit 78020 Malware
*/ */
rule Unit78020_Malware_Gen1 { rule Unit78020_Malware_Gen1
meta: {
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
author = "Florian Roth"
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
date = "2015-09-24"
hash1 = "2b15e614fb54bca7031f64ab6caa1f77b4c07dac186826a6cd2e254090675d72"
hash2 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
hash3 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
hash4 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
hash5 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
hash6 = "88c5be84afe20c91e4024160303bafb044f98aa5fbf8c9f9997758a014238790"
strings:
$x1 = "greensky27.vicp.net" fullword wide
$x2 = "POST http://%s:%d/aspxabcdefg.asp?%s HTTP/1.1" fullword ascii
$x3 = "GET http://%s:%d/aspxabcdef.asp?%s HTTP/1.1" fullword ascii
/* additional strings based on PDF report - not found in samples */
$x4 = "serch.vicp.net" fullword wide
$x5 = "greensky27.vicp.net" fullword wide
$x6 = "greensky27.vicp.net.as" fullword wide
$x7 = "greensky27.vcip.net" fullword wide
$x8 = "pnoc-ec.vicp.net" fullword wide
$x9 = "aseanph.vicp.net" fullword wide
$x10 = "pnoc.vicp.net" fullword wide
$a1 = "dMozilla/4.0 (compatible; MSIE 6.0;Windows NT 5.0; .NET CLR 1.1.4322)" fullword wide /* typo */ meta:
$a2 = "User-Agent: Netscape" fullword ascii /* ;) */ description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
$a3 = "Accept-Language:En-us/r/n" fullword wide /* typo */ author = "Florian Roth"
$a4 = "\\Office Start.lnk" fullword wide reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
$a5 = "\\MSN Talk Start.lnk" fullword wide date = "2015-09-24"
hash1 = "2b15e614fb54bca7031f64ab6caa1f77b4c07dac186826a6cd2e254090675d72"
hash2 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
hash3 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
hash4 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
hash5 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
hash6 = "88c5be84afe20c91e4024160303bafb044f98aa5fbf8c9f9997758a014238790"
$s1 = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)" fullword wide strings:
$s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii $x1 = "greensky27.vicp.net" fullword wide
$s3 = "%USERPROFILE%\\Application Data\\Mozilla\\Firefox\\Profiles" fullword wide $x2 = "POST http://%s:%d/aspxabcdefg.asp?%s HTTP/1.1" fullword ascii
$s4 = "Content-Type:application/x-www-form-urlencoded/r/n" fullword wide $x3 = "GET http://%s:%d/aspxabcdef.asp?%s HTTP/1.1" fullword ascii
$s5 = "Hello World!" fullword wide /* additional strings based on PDF report - not found in samples */
$s6 = "Accept-Encoding:gzip,deflate/r/n" fullword wide $x4 = "serch.vicp.net" fullword wide
$s7 = "/%d%s%d" fullword ascii $x5 = "greensky27.vicp.net" fullword wide
$s8 = "%02d-%02d-%02d %02d:%02d" fullword wide $x6 = "greensky27.vicp.net.as" fullword wide
$s9 = "WininetMM Version 1.0" fullword wide $x7 = "greensky27.vcip.net" fullword wide
$s10 = "WININETMM" fullword wide $x8 = "pnoc-ec.vicp.net" fullword wide
$s11 = "GET %dHTTP/1.1" fullword ascii $x9 = "aseanph.vicp.net" fullword wide
$s12 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii $x10 = "pnoc.vicp.net" fullword wide
$s13 = "PeekNamePipe" fullword ascii $a1 = "dMozilla/4.0 (compatible; MSIE 6.0;Windows NT 5.0; .NET CLR 1.1.4322)" fullword wide /* typo */
$s14 = "Normal.dot" fullword ascii $a2 = "User-Agent: Netscape" fullword ascii /* ;) */
$s15 = "R_eOR_eOR_eO)CiOS_eO" fullword ascii $a3 = "Accept-Language:En-us/r/n" fullword wide /* typo */
$s16 = "DRIVE_RAMDISK" fullword wide $a4 = "\\Office Start.lnk" fullword wide
$s17 = "%s %s %s %s %d %d %d %d " fullword ascii $a5 = "\\MSN Talk Start.lnk" fullword wide
condition: $s1 = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)" fullword wide
( uint16(0) == 0x5a4d and filesize < 250KB and 1 of ($x*) ) or $s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii
2 of ($a*) or $s3 = "%USERPROFILE%\\Application Data\\Mozilla\\Firefox\\Profiles" fullword wide
6 of ($s*) $s4 = "Content-Type:application/x-www-form-urlencoded/r/n" fullword wide
$s5 = "Hello World!" fullword wide
$s6 = "Accept-Encoding:gzip,deflate/r/n" fullword wide
$s7 = "/%d%s%d" fullword ascii
$s8 = "%02d-%02d-%02d %02d:%02d" fullword wide
$s9 = "WininetMM Version 1.0" fullword wide
$s10 = "WININETMM" fullword wide
$s11 = "GET %dHTTP/1.1" fullword ascii
$s12 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
$s13 = "PeekNamePipe" fullword ascii
$s14 = "Normal.dot" fullword ascii
$s15 = "R_eOR_eOR_eO)CiOS_eO" fullword ascii
$s16 = "DRIVE_RAMDISK" fullword wide
$s17 = "%s %s %s %s %d %d %d %d " fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 250KB and 1 of ($x*) ) or 2 of ($a*) or 6 of ($s*)
} }
rule Unit78020_Malware_1 : APT { rule Unit78020_Malware_1
meta: {
description = "Detects malware by Chinese APT PLA Unit 78020 - Specific Rule - msictl.exe"
author = "Florian Roth" meta:
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy" description = "Detects malware by Chinese APT PLA Unit 78020 - Specific Rule - msictl.exe"
date = "2015-09-24" author = "Florian Roth"
hash = "a93d01f1cc2d18ced2f3b2b78319aadc112f611ab8911ae9e55e13557c1c791a" reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
strings: date = "2015-09-24"
$s1 = "%ProgramFiles%\\Internet Explorer\\iexplore.exe" fullword ascii hash = "a93d01f1cc2d18ced2f3b2b78319aadc112f611ab8911ae9e55e13557c1c791a"
$s2 = "msictl.exe" fullword ascii
$s3 = "127.0.0.1:8080" fullword ascii strings:
$s4 = "mshtml.dat" fullword ascii $s1 = "%ProgramFiles%\\Internet Explorer\\iexplore.exe" fullword ascii
$s5 = "msisvc" fullword ascii $s2 = "msictl.exe" fullword ascii
$s6 = "NOKIAN95/WEB" fullword ascii $s3 = "127.0.0.1:8080" fullword ascii
condition: $s4 = "mshtml.dat" fullword ascii
uint16(0) == 0x5a4d and filesize < 160KB and 4 of them $s5 = "msisvc" fullword ascii
$s6 = "NOKIAN95/WEB" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 160KB and 4 of them
} }
rule Unit78020_Malware_Gen2 { rule Unit78020_Malware_Gen2
meta: {
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
author = "Florian Roth" meta:
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy" description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule"
date = "2015-09-24" author = "Florian Roth"
super_rule = 1 reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
hash1 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd" date = "2015-09-24"
hash2 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af" super_rule = 1
hash3 = "981e2fa1ae4145359036b46e8b53cc5da37dd2311204859761bd91572f025e8a" hash1 = "76c586e89c30a97e583c40ebe3f4ba75d5e02e52959184c4ce0a46b3aac54edd"
strings: hash2 = "7b73bf2d80a03eb477242967628da79924fbe06cc67c4dcdd2bdefccd6e0e1af"
$s0 = "-GetModuleFileNameExW" fullword ascii hash3 = "981e2fa1ae4145359036b46e8b53cc5da37dd2311204859761bd91572f025e8a"
$s1 = "\\MSN Talk Start.lnk" fullword wide
$s2 = ":SeDebugPrivilege" fullword wide strings:
$s3 = "WinMM Version 1.0" fullword wide $s0 = "-GetModuleFileNameExW" fullword ascii
$s4 = "dwError1 = %d" fullword ascii $s1 = "\\MSN Talk Start.lnk" fullword wide
$s5 = "*Can't Get" fullword wide $s2 = ":SeDebugPrivilege" fullword wide
condition: $s3 = "WinMM Version 1.0" fullword wide
uint16(0) == 0x5a4d and filesize < 1000KB and all of them $s4 = "dwError1 = %d" fullword ascii
$s5 = "*Can't Get" fullword wide
condition:
uint16(0) == 0x5a4d and filesize < 1000KB and all of them
} }
rule Unit78020_Malware_Gen3 { rule Unit78020_Malware_Gen3
meta: {
description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule - Chong"
author = "Florian Roth"
reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
date = "2015-09-24"
super_rule = 1
hash1 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
hash2 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
strings:
$x1 = "GET http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
$x2 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
$x3 = "J:\\chong\\" ascii
$s1 = "User-Agent: Netscape" fullword ascii meta:
$s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii description = "Detects malware by Chinese APT PLA Unit 78020 - Generic Rule - Chong"
$s3 = "Software\\Microsoft\\Windows\\CurrentVersion\\explorer\\User Shell Folders" fullword wide author = "Florian Roth"
$s4 = "J:\\chong\\nod\\Release\\SslMM.exe" fullword ascii reference = "http://threatconnect.com/camerashy/?utm_campaign=CameraShy"
$s5 = "MM.exe" fullword ascii date = "2015-09-24"
$s6 = "network.proxy.ssl" fullword wide super_rule = 1
$s7 = "PeekNamePipe" fullword ascii hash1 = "2625a0d91d3cdbbc7c4a450c91e028e3609ff96c4f2a5a310ae20f73e1bc32ac"
$s8 = "Host: %ws:%d" fullword ascii hash2 = "5c62b1d16e6180f22a0cb59c99a7743f44cb4a41e4e090b9733d1fb687c8efa2"
$s9 = "GET %dHTTP/1.1" fullword ascii
$s10 = "SCHANNEL.DLL" fullword ascii /* Goodware String - occured 6 times */ strings:
condition: $x1 = "GET http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
( uint16(0) == 0x5a4d and filesize < 300KB and 1 of ($x*) ) or $x2 = "POST http://%ws:%d/%d%s%dHTTP/1.1" fullword ascii
4 of ($s*) $x3 = "J:\\chong\\" ascii
$s1 = "User-Agent: Netscape" fullword ascii
$s2 = "User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7" fullword ascii
$s3 = "Software\\Microsoft\\Windows\\CurrentVersion\\explorer\\User Shell Folders" fullword wide
$s4 = "J:\\chong\\nod\\Release\\SslMM.exe" fullword ascii
$s5 = "MM.exe" fullword ascii
$s6 = "network.proxy.ssl" fullword wide
$s7 = "PeekNamePipe" fullword ascii
$s8 = "Host: %ws:%d" fullword ascii
$s9 = "GET %dHTTP/1.1" fullword ascii
$s10 = "SCHANNEL.DLL" fullword ascii /* Goodware String - occured 6 times */
condition:
( uint16(0) == 0x5a4d and filesize < 300KB and 1 of ($x*) ) or 4 of ($s*)
} }
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment