Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
rules
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
rules
Commits
a2f7d48f
Commit
a2f7d48f
authored
8 years ago
by
Marc Rivero López
Committed by
GitHub
8 years ago
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update APT_FVEY_ShadowBrokers_Jan17_Screen_Strings.yar
Fixed style rule
parent
6ddb9952
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
7 additions
and
13 deletions
+7
-13
APT_FVEY_ShadowBrokers_Jan17_Screen_Strings.yar
malware/APT_FVEY_ShadowBrokers_Jan17_Screen_Strings.yar
+7
-13
No files found.
malware/APT_FVEY_ShadowBrokers_Jan17_Screen_Strings.yar
View file @
a2f7d48f
...
...
@@ -11,41 +11,35 @@
/* Rule Set ----------------------------------------------------------------- */
rule FVEY_ShadowBrokers_Jan17_Screen_Strings {
rule FVEY_ShadowBrokers_Jan17_Screen_Strings
{
meta:
description = "Detects strings derived from the ShadowBroker's leak of Windows tools/exploits"
author = "Florian Roth"
reference = "https://bit.no.com:43110/theshadowbrokers.bit/post/message7/"
date = "2017-01-08"
strings:
$x1 = "Danderspritz" ascii wide fullword
$x2 = "DanderSpritz" ascii wide fullword
$x3 = "PeddleCheap" ascii wide fullword
$x4 = "ChimneyPool Addres" ascii wide fullword
$a1 = "Getting remote time" fullword ascii
$a2 = "RETRIEVED" fullword ascii
$b1 = "Added Ops library to Python search path" fullword ascii
$b2 = "target: z0.0.0.1" fullword ascii
$c1 = "Psp_Avoidance" fullword ascii
$c2 = "PasswordDump" fullword ascii
$c3 = "InjectDll" fullword ascii
$c4 = "EventLogEdit" fullword ascii
$c5 = "ProcessModify" fullword ascii
$d1 = "Mcl_NtElevation" fullword ascii wide
$d2 = "Mcl_NtNativeApi" fullword ascii wide
$d3 = "Mcl_ThreatInject" fullword ascii wide
$d4 = "Mcl_NtMemory" fullword ascii wide
condition:
filesize < 2000KB and (
1 of ($x*) or
all of ($a*) or
1 of ($b*) or
( uint16(0) == 0x5a4d and 1 of ($c*) ) or
3 of ($c*) or
( uint16(0) == 0x5a4d and 3 of ($d*) )
)
filesize < 2000KB and (1 of ($x*) or all of ($a*) or 1 of ($b*) or ( uint16(0) == 0x5a4d and 1 of ($c*) ) or 3 of ($c*) or ( uint16(0) == 0x5a4d and 3 of ($d*) ))
}
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment