Commit 532bb81b by Marc Rivero López Committed by GitHub

Update APT_WildNeutron.yar

parent d8954cce
......@@ -3,7 +3,9 @@
*/
rule WildNeutron_Sample_1 {
rule WildNeutron_Sample_1
{
meta:
description = "Wild Neutron APT Sample Rule - file 2b5065a3d0e0b8252a987ef5f29d9e1935c5863f5718b83440e68dc53c21fa94"
author = "Florian Roth"
......@@ -11,6 +13,7 @@ rule WildNeutron_Sample_1 {
date = "2015-07-10"
score = 60
hash = "2b5065a3d0e0b8252a987ef5f29d9e1935c5863f5718b83440e68dc53c21fa94"
strings:
$s0 = "LiveUpdater.exe" fullword wide /* PEStudio Blacklist: strings */ /* score: '25.00' */
$s1 = "id-at-postalAddress" fullword ascii /* PEStudio Blacklist: strings */ /* score: '18.00' */
......@@ -23,11 +26,14 @@ rule WildNeutron_Sample_1 {
$s38 = "2008R2" fullword wide /* PEStudio Blacklist: os */ /* score: '8.00' */
$s39 = "RSA-alt" fullword ascii /* PEStudio Blacklist: strings */ /* score: '8.00' */
$s40 = "%02d.%04d.%s" fullword wide /* score: '7.02' */
condition:
uint16(0) == 0x5a4d and filesize < 800KB and all of them
}
rule WildNeutron_Sample_2 {
rule WildNeutron_Sample_2
{
meta:
description = "Wild Neutron APT Sample Rule - file 8d80f9ef55324212759f4b6070cb8fce18a008ae9dd8b9598553206654d13a6f"
author = "Florian Roth"
......@@ -35,6 +41,7 @@ rule WildNeutron_Sample_2 {
date = "2015-07-10"
score = 60
hash = "8d80f9ef55324212759f4b6070cb8fce18a008ae9dd8b9598553206654d13a6f"
strings:
$s0 = "rundll32.exe \"%s\",#1" fullword wide /* PEStudio Blacklist: strings */ /* score: '33.00' */
$s1 = "IgfxUpt.exe" fullword wide /* score: '20.00' */
......@@ -44,11 +51,14 @@ rule WildNeutron_Sample_2 {
$s11 = "Key Usage" fullword ascii /* score: '12.00' */
$s12 = "Intel Integrated Graphics Updater" fullword wide /* PEStudio Blacklist: strings */ /* score: '12.00' */
$s13 = "%sexpires on : %04d-%02d-%02d %02d:%02d:%02d" fullword ascii /* PEStudio Blacklist: strings */ /* score: '11.00' */
condition:
uint16(0) == 0x5a4d and filesize < 600KB and all of them
}
rule WildNeutron_Sample_3 {
rule WildNeutron_Sample_3
{
meta:
description = "Wild Neutron APT Sample Rule - file c2c761cde3175f6e40ed934f2e82c76602c81e2128187bab61793ddb3bc686d0"
author = "Florian Roth"
......@@ -56,11 +66,11 @@ rule WildNeutron_Sample_3 {
date = "2015-07-10"
score = 60
hash = "c2c761cde3175f6e40ed934f2e82c76602c81e2128187bab61793ddb3bc686d0"
strings:
$x1 = "178.162.197.9" fullword ascii /* score: '9.00' */
$x2 = "\"http://fw.ddosprotected.eu:80 /opts resolv=drfx.chickenkiller.com\"" fullword wide /* PEStudio Blacklist: strings */ /* score: '33.00' */
$x3 = ".chickenkiller.com" ascii /* PEStudio Blacklist: strings */ /* score: '28.00' */
$s1 = "LiveUpdater.exe" fullword wide /* PEStudio Blacklist: strings */ /* score: '25.00' */
$s2 = "id-at-postalAddress" fullword ascii /* PEStudio Blacklist: strings */ /* score: '18.00' */
$s3 = "%d -> %d (default)" fullword wide /* PEStudio Blacklist: strings */ /* score: '17.00' */
......@@ -68,12 +78,15 @@ rule WildNeutron_Sample_3 {
$s5 = "id-at-serialNumber" fullword ascii /* PEStudio Blacklist: strings */ /* score: '10.00' */
$s6 = "ECDSA with SHA256" fullword ascii /* PEStudio Blacklist: strings */ /* score: '10.00' */
$s7 = "Acer LiveUpdater" fullword wide /* PEStudio Blacklist: strings */ /* score: '10.00' */
condition:
uint16(0) == 0x5a4d and filesize < 2020KB and
( 1 of ($x*) or all of ($s*) )
}
rule WildNeutron_Sample_4 {
rule WildNeutron_Sample_4
{
meta:
description = "Wild Neutron APT Sample Rule - file b4005530193bc523d3e0193c3c53e2737ae3bf9f76d12c827c0b5cd0dcbaae45"
author = "Florian Roth"
......@@ -81,9 +94,9 @@ rule WildNeutron_Sample_4 {
date = "2015-07-10"
score = 60
hash = "b4005530193bc523d3e0193c3c53e2737ae3bf9f76d12c827c0b5cd0dcbaae45"
strings:
$x1 = "WinRAT-Win32-Release.exe" fullword ascii /* score: '22.00' */
$s0 = "rundll32.exe \"%s\",#1" fullword wide /* PEStudio Blacklist: strings */ /* score: '33.00' */
$s1 = "RtlUpd.EXE" fullword wide /* score: '20.00' */
$s2 = "RtlUpd.exe" fullword wide /* score: '20.00' */
......@@ -92,11 +105,14 @@ rule WildNeutron_Sample_4 {
$s5 = "%s%s%s=%d,%s=%d,%s=%d," fullword wide /* score: '15.00' */
$s6 = "Key Usage" fullword ascii /* score: '12.00' */
$s7 = "id-at-serialNumber" fullword ascii /* PEStudio Blacklist: strings */ /* score: '10.00' */
condition:
uint16(0) == 0x5a4d and filesize < 1240KB and all of them
}
rule WildNeutron_Sample_5 {
rule WildNeutron_Sample_5
{
meta:
description = "Wild Neutron APT Sample Rule - file 1604e36ccef5fa221b101d7f043ad7f856b84bf1a80774aa33d91c2a9a226206"
author = "Florian Roth"
......@@ -104,6 +120,7 @@ rule WildNeutron_Sample_5 {
date = "2015-07-10"
score = 60
hash = "1604e36ccef5fa221b101d7f043ad7f856b84bf1a80774aa33d91c2a9a226206"
strings:
$s0 = "LiveUpdater.exe" fullword wide /* PEStudio Blacklist: strings */ /* score: '25.00' */
$s1 = "id-at-postalAddress" fullword ascii /* PEStudio Blacklist: strings */ /* score: '18.00' */
......@@ -115,11 +132,14 @@ rule WildNeutron_Sample_5 {
$s7 = "Key Usage" fullword ascii /* score: '12.00' */
$s8 = "TLS-RSA-WITH-3DES-EDE-CBC-SHA" fullword ascii /* PEStudio Blacklist: strings */ /* score: '11.00' */
$s9 = "%02d.%04d.%s" fullword wide /* score: '7.02' */
condition:
uint16(0) == 0x5a4d and filesize < 1000KB and all of them
}
rule WildNeutron_Sample_6 {
rule WildNeutron_Sample_6
{
meta:
description = "Wild Neutron APT Sample Rule - file 4bd548fe07b19178281edb1ee81c9711525dab03dc0b6676963019c44cc75865"
author = "Florian Roth"
......@@ -127,13 +147,17 @@ rule WildNeutron_Sample_6 {
date = "2015-07-10"
score = 60
hash = "4bd548fe07b19178281edb1ee81c9711525dab03dc0b6676963019c44cc75865"
strings:
$s0 = "mshtaex.exe" fullword wide /* score: '20.00' */
condition:
uint16(0) == 0x5a4d and filesize < 310KB and all of them
}
rule WildNeutron_Sample_7 {
rule WildNeutron_Sample_7
{
meta:
description = "Wild Neutron APT Sample Rule - file a14d31eb965ea8a37ebcc3b5635099f2ca08365646437c770212d534d504ff3c"
author = "Florian Roth"
......@@ -141,6 +165,7 @@ rule WildNeutron_Sample_7 {
date = "2015-07-10"
score = 60
hash = "a14d31eb965ea8a37ebcc3b5635099f2ca08365646437c770212d534d504ff3c"
strings:
$s0 = "checking match for '%s' user %s host %s addr %s" fullword ascii /* PEStudio Blacklist: strings */ /* score: '24.00' */
$s1 = "PEM_read_bio_PrivateKey failed" fullword ascii /* PEStudio Blacklist: strings */ /* score: '23.00' */
......@@ -154,11 +179,14 @@ rule WildNeutron_Sample_7 {
$s9 = "/bin/sh /usr/etc/sshrc" fullword ascii /* score: '12.42' */
$s10 = "kexecdhs.c" fullword ascii /* score: '12.00' */
$s11 = "%s: setrlimit(RLIMIT_FSIZE, { 0, 0 }): %s" fullword ascii /* score: '11.00' */
condition:
uint16(0) == 0x5a4d and filesize < 5000KB and all of them
}
rule WildNeutron_Sample_8 {
rule WildNeutron_Sample_8
{
meta:
description = "Wild Neutron APT Sample Rule - file 758e6b519f6c0931ff93542b767524fc1eab589feb5cfc3854c77842f9785c92"
author = "Florian Roth"
......@@ -166,13 +194,13 @@ rule WildNeutron_Sample_8 {
date = "2015-07-10"
score = 60
hash = "758e6b519f6c0931ff93542b767524fc1eab589feb5cfc3854c77842f9785c92"
strings:
$x1 = "RunFile: couldn't load SHELL32.DLL!" fullword ascii /* PEStudio Blacklist: strings */ /* score: '27.00' */
$x2 = "RunFile: couldn't find ShellExecuteExA/W in SHELL32.DLL!" fullword ascii /* PEStudio Blacklist: strings */ /* score: '35.00' */
$x3 = "Error executing CreateProcess()!!" fullword wide /* PEStudio Blacklist: strings */ /* score: '31.00' */
$x4 = "cmdcmdline" fullword wide /* score: '11.00' */
$x5 = "Invalid input handle!!!" fullword ascii /* PEStudio Blacklist: strings */ /* score: '10.00' */
$s1 = "Process %d terminated" fullword wide /* PEStudio Blacklist: strings */ /* score: '24.00' */
$s2 = "Process is not running any more" fullword wide /* PEStudio Blacklist: strings */ /* score: '22.00' */
$s3 = "javacpl.exe" fullword wide /* score: '3.00' */ /* Goodware String - occured 2 times */
......@@ -189,11 +217,14 @@ rule WildNeutron_Sample_8 {
$s14 = "DEBUG: Cannot allocate memory for ptrFileArray!" fullword ascii /* PEStudio Blacklist: strings */ /* score: '9.00' */
$s15 = "%-8s %-3s %*s %s %s" fullword wide /* score: '8.00' */
$s16 = " %%%c in (%s) do " fullword wide /* score: '8.00' */
condition:
uint16(0) == 0x5a4d and filesize < 1677KB and 2 of ($x*) and 6 of ($s*)
}
rule WildNeutron_Sample_9 {
rule WildNeutron_Sample_9
{
meta:
description = "Wild Neutron APT Sample Rule - file 781eb1e17349009fbae46aea5c59d8e5b68ae0b42335cb035742f6b0f4e4087e"
author = "Florian Roth"
......@@ -201,6 +232,7 @@ rule WildNeutron_Sample_9 {
date = "2015-07-10"
score = 60
hash = "781eb1e17349009fbae46aea5c59d8e5b68ae0b42335cb035742f6b0f4e4087e"
strings:
$s0 = "http://get.adobe.com/flashplayer/" fullword wide /* PEStudio Blacklist: strings */ /* score: '30.00' */
$s1 = "xxxxxxxxxxxxxxxxxxxx" fullword wide /* reversed goodware string 'xxxxxxxxxxxxxxxxxxxx' */ /* score: '19.00' */
......@@ -210,11 +242,14 @@ rule WildNeutron_Sample_9 {
$s11 = "2008R2" fullword wide /* PEStudio Blacklist: os */ /* score: '8.00' */
$s12 = "%02d.%04d.%s" fullword wide /* score: '7.02' */
$s13 = "%d -> %d" fullword wide /* score: '7.00' */
condition:
uint16(0) == 0x5a4d and filesize < 500KB and all of them
}
rule WildNeutron_Sample_10 {
rule WildNeutron_Sample_10
{
meta:
description = "Wild Neutron APT Sample Rule - file 1d3bdabb350ba5a821849893dabe5d6056bf7ba1ed6042d93174ceeaa5d6dad7"
author = "Florian Roth"
......@@ -222,9 +257,9 @@ rule WildNeutron_Sample_10 {
date = "2015-07-10"
score = 60
hash = "1d3bdabb350ba5a821849893dabe5d6056bf7ba1ed6042d93174ceeaa5d6dad7"
strings:
$n1 = "/c for /L %%i in (1,1,2) DO ping 127.0.0.1 -n 3 & type %%windir%%\\notepad.exe > %s & del /f %s" fullword ascii /* PEStudio Blacklist: strings */ /* score: '46.00' */
$s1 = "%SYSTEMROOT%\\temp\\_dbg.tmp" fullword ascii /* PEStudio Blacklist: strings */ /* score: '37.00' */
$s2 = "%SYSTEMROOT%\\SysWOW64\\mspool.dll" fullword ascii /* PEStudio Blacklist: strings */ /* score: '36.17' */
$s3 = "%SYSTEMROOT%\\System32\\dpcore16t.dll" fullword ascii /* PEStudio Blacklist: strings */ /* score: '36.17' */
......@@ -236,29 +271,28 @@ rule WildNeutron_Sample_10 {
$s9 = "%SYSTEMROOT%\\System32\\mshtaex.exe" fullword ascii /* PEStudio Blacklist: strings */ /* score: '31.17' */
$s10 = "%SYSTEMROOT%\\System32\\iastor32.exe" fullword ascii /* PEStudio Blacklist: strings */ /* score: '31.17' */
$s11 = "%SYSTEMROOT%\\SysWOW64\\mshtaex.exe" fullword ascii /* PEStudio Blacklist: strings */ /* score: '31.17' */
$x1 = "wdigestEx.dll" fullword ascii /* PEStudio Blacklist: strings */ /* score: '26.00' */
$x2 = "dpcore16t.dll" fullword ascii /* score: '21.00' */
$x3 = "mspool.dll" fullword ascii /* score: '21.00' */
$x4 = "msvcse.exe" fullword ascii /* score: '20.00' */
$x5 = "mshtaex.exe" fullword wide /* score: '20.00' */
$x6 = "iastor32.exe" fullword ascii /* score: '20.00' */
$y1 = "Installer.exe" fullword ascii /* PEStudio Blacklist: strings */ /* score: '25.00' */
$y2 = "Info: Process %s" fullword ascii /* PEStudio Blacklist: strings */ /* score: '21.00' */
$y3 = "Error: GetFileTime %s 0x%x" fullword ascii /* score: '17.00' */
$y4 = "Install succeeded" fullword ascii /* PEStudio Blacklist: strings */ /* score: '10.00' */
$y5 = "Error: RegSetValueExA 0x%x" fullword ascii /* score: '9.00' */
condition:
uint16(0) == 0x5a4d and filesize < 400KB and
(
$n1 or ( 1 of ($s*) and 1 of ($x*) and 3 of ($y*) )
uint16(0) == 0x5a4d and filesize < 400KB and ( $n1 or ( 1 of ($s*) and 1 of ($x*) and 3 of ($y*) )
)
}
/* Super Rules ------------------------------------------------------------- */
rule WildNeutron_javacpl {
rule WildNeutron_javacpl
{
meta:
description = "Wild Neutron APT Sample Rule - from files 683f5b476f8ffe87ec22b8bab57f74da4a13ecc3a5c2cbf951999953c2064fc9, 758e6b519f6c0931ff93542b767524fc1eab589feb5cfc3854c77842f9785c92, 8ca7ed720babb32a6f381769ea00e16082a563704f8b672cb21cf11843f4da7a"
author = "Florian Roth"
......@@ -269,9 +303,9 @@ rule WildNeutron_javacpl {
hash1 = "683f5b476f8ffe87ec22b8bab57f74da4a13ecc3a5c2cbf951999953c2064fc9"
hash2 = "758e6b519f6c0931ff93542b767524fc1eab589feb5cfc3854c77842f9785c92"
hash3 = "8ca7ed720babb32a6f381769ea00e16082a563704f8b672cb21cf11843f4da7a"
strings:
$x1 = "javacpl.exe" fullword wide /* score: '3.00' */ /* Goodware String - occured 2 times */
$s0 = "RunFile: couldn't find ShellExecuteExA/W in SHELL32.DLL!" fullword ascii /* PEStudio Blacklist: strings */ /* score: '35.00' */
$s1 = "Error executing CreateProcess()!!" fullword wide /* PEStudio Blacklist: strings */ /* score: '31.00' */
$s2 = "http://www.java.com/en/download/installed.jsp?detect=jre" fullword ascii /* PEStudio Blacklist: strings */ /* score: '28.00' */
......@@ -288,6 +322,7 @@ rule WildNeutron_javacpl {
$s14 = "Error setting %s (%s)" fullword wide /* score: '11.00' */
$s16 = "cmdcmdline" fullword wide /* score: '11.00' */
$s39 = "2008R2" fullword ascii /* PEStudio Blacklist: os */ /* score: '8.00' */
condition:
uint16(0) == 0x5a4d and filesize < 1677KB and all of them
}
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment