Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
rules
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
rules
Commits
c47b4d51
Commit
c47b4d51
authored
Jan 23, 2017
by
Marc Rivero López
Committed by
GitHub
Jan 23, 2017
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Update APT_ThreatGroup3390.yar
parent
0b49008c
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
312 additions
and
281 deletions
+312
-281
APT_ThreatGroup3390.yar
malware/APT_ThreatGroup3390.yar
+312
-281
No files found.
malware/APT_ThreatGroup3390.yar
View file @
c47b4d51
...
@@ -9,303 +9,334 @@
...
@@ -9,303 +9,334 @@
Identifier: Threat Group 3390
Identifier: Threat Group 3390
*/
*/
rule HttpBrowser_RAT_dropper_Gen1 : RAT Dropper APT {
rule HttpBrowser_RAT_dropper_Gen1
meta:
{
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Dropper"
author = "Florian Roth"
reference = "http://snip.ly/giNB"
date = "2015-08-06"
score = 70
hash1 = "808de72f1eae29e3c1b2c32be1b84c5064865a235866edf5e790d2a7ba709907"
hash2 = "f6f966d605c5e79de462a65df437ddfca0ad4eb5faba94fc875aba51a4b894a7"
hash3 = "f424965a35477d822bbadb821125995616dc980d3d4f94a68c87d0cd9b291df9"
hash4 = "01441546fbd20487cb2525a0e34e635eff2abe5c3afc131c7182113220f02753"
hash5 = "8cd8159f6e4689f572e2087394452e80e62297af02ca55fe221fe5d7570ad47b"
hash6 = "10de38419c9a02b80ab7bf2f1f1f15f57dbb0fbc9df14b9171dc93879c5a0c53"
hash7 = "c2fa67e970d00279cec341f71577953d49e10fe497dae4f298c2e9abdd3a48cc"
strings:
$x1 = "1001=cmd.exe" fullword ascii
$x2 = "1003=ShellExecuteA" fullword ascii
$x3 = "1002=/c del /q %s" fullword ascii
$x4 = "1004=SetThreadPriority" fullword ascii
/* $s1 = "pnipcn.dllUT" fullword ascii
meta:
$s2 = "ssonsvr.exeUT" fullword ascii
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Dropper"
$s3 = "navlu.dllUT" fullword ascii
author = "Florian Roth"
$s4 = "@CONOUT$" fullword wide
reference = "http://snip.ly/giNB"
$s5 = "VPDN_LU.exeUT" fullword ascii
date = "2015-08-06"
$s6 = "msi.dll.urlUT" fullword ascii
score = 70
$s7 = "setup.exeUT" fullword ascii
hash1 = "808de72f1eae29e3c1b2c32be1b84c5064865a235866edf5e790d2a7ba709907"
$s8 = "pnipcn.dll.urlUT" fullword ascii
hash2 = "f6f966d605c5e79de462a65df437ddfca0ad4eb5faba94fc875aba51a4b894a7"
$s9 = "ldvpreg.exeUT" fullword ascii */
hash3 = "f424965a35477d822bbadb821125995616dc980d3d4f94a68c87d0cd9b291df9"
hash4 = "01441546fbd20487cb2525a0e34e635eff2abe5c3afc131c7182113220f02753"
hash5 = "8cd8159f6e4689f572e2087394452e80e62297af02ca55fe221fe5d7570ad47b"
hash6 = "10de38419c9a02b80ab7bf2f1f1f15f57dbb0fbc9df14b9171dc93879c5a0c53"
hash7 = "c2fa67e970d00279cec341f71577953d49e10fe497dae4f298c2e9abdd3a48cc"
strings:
$x1 = "1001=cmd.exe" fullword ascii
$x2 = "1003=ShellExecuteA" fullword ascii
$x3 = "1002=/c del /q %s" fullword ascii
$x4 = "1004=SetThreadPriority" fullword ascii
$op0 = { e8 71 11 00 00 83 c4 10 ff 4d e4 8b f0 78 07 8b } /* Opcode */
/* $s1 = "pnipcn.dllUT" fullword ascii
$op1 = { e8 85 34 00 00 59 59 8b 86 b4 } /* Opcode */
$s2 = "ssonsvr.exeUT" fullword ascii
$op2 = { 8b 45 0c 83 38 00 0f 84 97 } /* Opcode */
$s3 = "navlu.dllUT" fullword ascii
$op3 = { 8b 45 0c 83 38 00 0f 84 98 } /* Opcode */
$s4 = "@CONOUT$" fullword wide
$op4 = { 89 7e 0c ff 15 a0 50 40 00 59 8b d8 6a 20 59 8d } /* Opcode */
$s5 = "VPDN_LU.exeUT" fullword ascii
$op5 = { 56 8d 85 cd fc ff ff 53 50 88 9d cc fc ff ff e8 } /* Opcode */
$s6 = "msi.dll.urlUT" fullword ascii
condition:
$s7 = "setup.exeUT" fullword ascii
uint16(0) == 0x5a4d and filesize < 400KB and all of ($x*) and 1 of ($op*)
$s8 = "pnipcn.dll.urlUT" fullword ascii
$s9 = "ldvpreg.exeUT" fullword ascii */
$op0 = { e8 71 11 00 00 83 c4 10 ff 4d e4 8b f0 78 07 8b } /* Opcode */
$op1 = { e8 85 34 00 00 59 59 8b 86 b4 } /* Opcode */
$op2 = { 8b 45 0c 83 38 00 0f 84 97 } /* Opcode */
$op3 = { 8b 45 0c 83 38 00 0f 84 98 } /* Opcode */
$op4 = { 89 7e 0c ff 15 a0 50 40 00 59 8b d8 6a 20 59 8d } /* Opcode */
$op5 = { 56 8d 85 cd fc ff ff 53 50 88 9d cc fc ff ff e8 } /* Opcode */
condition:
uint16(0) == 0x5a4d and filesize < 400KB and all of ($x*) and 1 of ($op*)
}
}
rule HttpBrowser_RAT_Sample1 : RAT APT {
rule HttpBrowser_RAT_Sample1
meta:
{
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Sample update.hancominc.com"
author = "Florian Roth"
meta:
reference = "http://snip.ly/giNB"
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Sample update.hancominc.com"
date = "2015-08-06"
author = "Florian Roth"
score = 80
reference = "http://snip.ly/giNB"
hash1 = "be334d1f8fa65a723af65200a166c2bbdb06690c8b30fafe772600e4662fc68b"
date = "2015-08-06"
hash2 = "1052ad7f4d49542e4da07fa8ea59c15c40bc09a4d726fad023daafdf05866ebb"
score = 80
strings:
hash1 = "be334d1f8fa65a723af65200a166c2bbdb06690c8b30fafe772600e4662fc68b"
$s0 = "update.hancominc.com" fullword wide
hash2 = "1052ad7f4d49542e4da07fa8ea59c15c40bc09a4d726fad023daafdf05866ebb"
condition:
uint16(0) == 0x5a4d and filesize < 100KB and $s0
strings:
$s0 = "update.hancominc.com" fullword wide
condition:
uint16(0) == 0x5a4d and filesize < 100KB and $s0
}
}
rule HttpBrowser_RAT_Sample2 : RAT APT {
rule HttpBrowser_RAT_Sample2
meta:
{
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Sample"
author = "Florian Roth"
meta:
reference = "http://snip.ly/giNB"
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Sample"
date = "2015-08-06"
author = "Florian Roth"
score = 80
reference = "http://snip.ly/giNB"
hash1 = "c57c5a2c322af2835ae136b75283eaaeeaa6aa911340470182a9983ae47b8992"
date = "2015-08-06"
strings:
score = 80
$s0 = "nKERNEL32.DLL" fullword wide
hash1 = "c57c5a2c322af2835ae136b75283eaaeeaa6aa911340470182a9983ae47b8992"
$s1 = "WUSER32.DLL" fullword wide
$s2 = "mscoree.dll" fullword wide
strings:
$s3 = "VPDN_LU.exeUT" fullword ascii
$s0 = "nKERNEL32.DLL" fullword wide
condition:
$s1 = "WUSER32.DLL" fullword wide
uint16(0) == 0x5a4d and filesize < 250KB and all of them
$s2 = "mscoree.dll" fullword wide
$s3 = "VPDN_LU.exeUT" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 250KB and all of them
}
}
rule HttpBrowser_RAT_Gen : RAT APT {
rule HttpBrowser_RAT_Gen
meta:
{
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Generic"
author = "Florian Roth"
meta:
reference = "http://snip.ly/giNB"
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Generic"
date = "2015-08-06"
author = "Florian Roth"
score = 90
reference = "http://snip.ly/giNB"
hash1 = "0299493ccb175d452866f5e21d023d3e92cd8d28452517d1d19c0f05f2c5ca27"
date = "2015-08-06"
hash2 = "065d055a90da59b4bdc88b97e537d6489602cb5dc894c5c16aff94d05c09abc7"
score = 90
hash3 = "05c7291db880f94c675eea336ecd66338bd0b1d49ad239cc17f9df08106e6684"
hash1 = "0299493ccb175d452866f5e21d023d3e92cd8d28452517d1d19c0f05f2c5ca27"
hash4 = "07133f291fe022cd14346cd1f0a649aa2704ec9ccadfab809ca9c48b91a7d81b"
hash2 = "065d055a90da59b4bdc88b97e537d6489602cb5dc894c5c16aff94d05c09abc7"
hash5 = "0f8893e87ddec3d98e39a57f7cd530c28e36d596ea0a1d9d1e993dc2cae0a64d"
hash3 = "05c7291db880f94c675eea336ecd66338bd0b1d49ad239cc17f9df08106e6684"
hash6 = "108e6633744da6efe773eb78bd0ac804920add81c3dde4b26e953056ac1b26c5"
hash4 = "07133f291fe022cd14346cd1f0a649aa2704ec9ccadfab809ca9c48b91a7d81b"
hash7 = "1052ad7f4d49542e4da07fa8ea59c15c40bc09a4d726fad023daafdf05866ebb"
hash5 = "0f8893e87ddec3d98e39a57f7cd530c28e36d596ea0a1d9d1e993dc2cae0a64d"
hash8 = "1277ede988438d4168bb5b135135dd3b9ae7d9badcdf1421132ca4692dd18386"
hash6 = "108e6633744da6efe773eb78bd0ac804920add81c3dde4b26e953056ac1b26c5"
hash9 = "19be90c152f7a174835fd05a0b6f722e29c648969579ed7587ae036679e66a7b"
hash7 = "1052ad7f4d49542e4da07fa8ea59c15c40bc09a4d726fad023daafdf05866ebb"
hash10 = "1e7133bf5a9fe5e462321aafc2b7770b8e4183a66c7fef14364a0c3f698a29af"
hash8 = "1277ede988438d4168bb5b135135dd3b9ae7d9badcdf1421132ca4692dd18386"
hash11 = "2264e5e8fcbdcb29027798b200939ecd8d1d3ad1ef0aef2b8ce7687103a3c113"
hash9 = "19be90c152f7a174835fd05a0b6f722e29c648969579ed7587ae036679e66a7b"
hash12 = "2a1bdeb0a021fb0bdbb328bd4b65167d1f954c871fc33359cb5ea472bad6e13e"
hash10 = "1e7133bf5a9fe5e462321aafc2b7770b8e4183a66c7fef14364a0c3f698a29af"
hash13 = "259a2e0508832d0cf3f4f5d9e9e1adde17102d2804541a9587a9a4b6f6f86669"
hash11 = "2264e5e8fcbdcb29027798b200939ecd8d1d3ad1ef0aef2b8ce7687103a3c113"
hash14 = "240d9ce148091e72d8f501dbfbc7963997d5c2e881b4da59a62975ddcbb77ca2"
hash12 = "2a1bdeb0a021fb0bdbb328bd4b65167d1f954c871fc33359cb5ea472bad6e13e"
hash15 = "211a1b195cf2cc70a2caf8f1aafb8426eb0e4bae955e85266490b12b5322aa16"
hash13 = "259a2e0508832d0cf3f4f5d9e9e1adde17102d2804541a9587a9a4b6f6f86669"
hash16 = "2d25c6868c16085c77c58829d538b8f3dbec67485f79a059f24e0dce1e804438"
hash14 = "240d9ce148091e72d8f501dbfbc7963997d5c2e881b4da59a62975ddcbb77ca2"
hash17 = "2d932d764dd9b91166361d8c023d64a4480b5b587a6087b0ce3d2ac92ead8a7d"
hash15 = "211a1b195cf2cc70a2caf8f1aafb8426eb0e4bae955e85266490b12b5322aa16"
hash18 = "3556722d9aa37beadfa6ba248a66576f767e04b09b239d3fb0479fa93e0ba3fd"
hash16 = "2d25c6868c16085c77c58829d538b8f3dbec67485f79a059f24e0dce1e804438"
hash19 = "365e1d4180e93d7b87ba28ce4369312cbae191151ac23ff4a35f45440cb9be48"
hash17 = "2d932d764dd9b91166361d8c023d64a4480b5b587a6087b0ce3d2ac92ead8a7d"
hash20 = "36c49f18ce3c205152eef82887eb3070e9b111d35a42b534b2fb2ee535b543c0"
hash18 = "3556722d9aa37beadfa6ba248a66576f767e04b09b239d3fb0479fa93e0ba3fd"
hash21 = "3eeb1fd1f0d8ab33f34183893c7346ddbbf3c19b94ba3602d377fa2e84aaad81"
hash19 = "365e1d4180e93d7b87ba28ce4369312cbae191151ac23ff4a35f45440cb9be48"
hash22 = "3fa8d13b337671323e7fe8b882763ec29b6786c528fa37da773d95a057a69d9a"
hash20 = "36c49f18ce3c205152eef82887eb3070e9b111d35a42b534b2fb2ee535b543c0"
strings:
hash21 = "3eeb1fd1f0d8ab33f34183893c7346ddbbf3c19b94ba3602d377fa2e84aaad81"
$s0 = "%d|%s|%04d/%02d/%02d %02d:%02d:%02d|%ld|%d" fullword wide
hash22 = "3fa8d13b337671323e7fe8b882763ec29b6786c528fa37da773d95a057a69d9a"
$s1 = "HttpBrowser/1.0" fullword wide
$s2 = "set cmd : %s" ascii fullword
strings:
$s3 = "\\config.ini" wide fullword
$s0 = "%d|%s|%04d/%02d/%02d %02d:%02d:%02d|%ld|%d" fullword wide
condition:
$s1 = "HttpBrowser/1.0" fullword wide
uint16(0) == 0x5a4d and filesize < 45KB and filesize > 20KB and all of them
$s2 = "set cmd : %s" ascii fullword
$s3 = "\\config.ini" wide fullword
condition:
uint16(0) == 0x5a4d and filesize < 45KB and filesize > 20KB and all of them
}
}
rule PlugX_NvSmartMax_Gen : PlugX APT {
rule PlugX_NvSmartMax_Gen
meta:
{
description = "Threat Group 3390 APT Sample - PlugX NvSmartMax Generic"
author = "Florian Roth"
reference = "http://snip.ly/giNB"
date = "2015-08-06"
score = 70
hash1 = "718fc72942b9b706488575c0296017971170463f6f40fa19b08fc84b79bf0cef"
hash2 = "1c0379481d17fc80b3330f148f1b87ff613cfd2a6601d97920a0bcd808c718d0"
hash3 = "555952aa5bcca4fa5ad5a7269fece99b1a04816d104ecd8aefabaa1435f65fa5"
hash4 = "71f7a9da99b5e3c9520bc2cc73e520598d469be6539b3c243fb435fe02e44338"
hash5 = "65bbf0bd8c6e1ccdb60cf646d7084e1452cb111d97d21d6e8117b1944f3dc71e"
strings:
$s0 = "NvSmartMax.dll" fullword ascii
$s1 = "NvSmartMax.dll.url" fullword ascii
$s2 = "Nv.exe" fullword ascii
$s4 = "CryptProtectMemory failed" fullword ascii
$s5 = "CryptUnprotectMemory failed" fullword ascii
$s7 = "r%.*s(%d)%s" fullword wide
$s8 = " %s CRC " fullword wide
$op0 = { c6 05 26 49 42 00 01 eb 4a 8d 85 00 f8 ff ff 50 } /* Opcode */
meta:
$op1 = { 8d 85 c8 fe ff ff 50 8d 45 c8 50 c6 45 47 00 e8 } /* Opcode */
description = "Threat Group 3390 APT Sample - PlugX NvSmartMax Generic"
$op2 = { e8 e6 65 00 00 50 68 10 43 41 00 e8 56 84 00 00 } /* Opcode */
author = "Florian Roth"
condition:
reference = "http://snip.ly/giNB"
uint16(0) == 0x5a4d and filesize < 800KB and all of ($s*) and 1 of ($op*)
date = "2015-08-06"
score = 70
hash1 = "718fc72942b9b706488575c0296017971170463f6f40fa19b08fc84b79bf0cef"
hash2 = "1c0379481d17fc80b3330f148f1b87ff613cfd2a6601d97920a0bcd808c718d0"
hash3 = "555952aa5bcca4fa5ad5a7269fece99b1a04816d104ecd8aefabaa1435f65fa5"
hash4 = "71f7a9da99b5e3c9520bc2cc73e520598d469be6539b3c243fb435fe02e44338"
hash5 = "65bbf0bd8c6e1ccdb60cf646d7084e1452cb111d97d21d6e8117b1944f3dc71e"
strings:
$s0 = "NvSmartMax.dll" fullword ascii
$s1 = "NvSmartMax.dll.url" fullword ascii
$s2 = "Nv.exe" fullword ascii
$s4 = "CryptProtectMemory failed" fullword ascii
$s5 = "CryptUnprotectMemory failed" fullword ascii
$s7 = "r%.*s(%d)%s" fullword wide
$s8 = " %s CRC " fullword wide
$op0 = { c6 05 26 49 42 00 01 eb 4a 8d 85 00 f8 ff ff 50 } /* Opcode */
$op1 = { 8d 85 c8 fe ff ff 50 8d 45 c8 50 c6 45 47 00 e8 } /* Opcode */
$op2 = { e8 e6 65 00 00 50 68 10 43 41 00 e8 56 84 00 00 } /* Opcode */
condition:
uint16(0) == 0x5a4d and filesize < 800KB and all of ($s*) and 1 of ($op*)
}
}
rule HttpBrowser_RAT_dropper_Gen2 : Dropper RAT {
rule HttpBrowser_RAT_dropper_Gen2
meta:
{
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Dropper"
author = "Florian Roth"
meta:
reference = "http://snip.ly/giNB"
description = "Threat Group 3390 APT Sample - HttpBrowser RAT Dropper"
date = "2015-08-06"
author = "Florian Roth"
score = 70
reference = "http://snip.ly/giNB"
hash1 = "c57c5a2c322af2835ae136b75283eaaeeaa6aa911340470182a9983ae47b8992"
date = "2015-08-06"
hash2 = "dfa984174268a9f364d856fd47cfaca75804640f849624d69d81fcaca2b57166"
score = 70
strings:
hash1 = "c57c5a2c322af2835ae136b75283eaaeeaa6aa911340470182a9983ae47b8992"
$s1 = "navlu.dll.urlUT" fullword ascii
hash2 = "dfa984174268a9f364d856fd47cfaca75804640f849624d69d81fcaca2b57166"
$s2 = "VPDN_LU.exeUT" fullword ascii
$s3 = "pnipcn.dllUT" fullword ascii
strings:
$s4 = "\\ssonsvr.exe" fullword ascii
$s1 = "navlu.dll.urlUT" fullword ascii
$s5 = "/c del /q %s" fullword ascii
$s2 = "VPDN_LU.exeUT" fullword ascii
$s6 = "\\setup.exe" fullword ascii
$s3 = "pnipcn.dllUT" fullword ascii
$s7 = "msi.dllUT" fullword ascii
$s4 = "\\ssonsvr.exe" fullword ascii
$s5 = "/c del /q %s" fullword ascii
$s6 = "\\setup.exe" fullword ascii
$s7 = "msi.dllUT" fullword ascii
$op0 = { 8b 45 0c 83 38 00 0f 84 98 } /* Opcode */
$op1 = { e8 dd 07 00 00 ff 35 d8 fb 40 00 8b 35 7c a0 40 } /* Opcode */
$op2 = { 83 fb 08 75 2c 8b 0d f8 af 40 00 89 4d dc 8b 0d } /* Opcode */
$op3 = { c7 43 18 8c 69 40 00 e9 da 01 00 00 83 7d f0 00 } /* Opcode */
$op4 = { 6a 01 e9 7c f8 ff ff bf 1a 40 00 96 1b 40 00 01 } /* Opcode */
$op0 = { 8b 45 0c 83 38 00 0f 84 98 } /* Opcode */
condition:
$op1 = { e8 dd 07 00 00 ff 35 d8 fb 40 00 8b 35 7c a0 40 } /* Opcode */
uint16(0) == 0x5a4d and filesize < 400KB and 3 of ($s*) and 1 of ($op*)
$op2 = { 83 fb 08 75 2c 8b 0d f8 af 40 00 89 4d dc 8b 0d } /* Opcode */
$op3 = { c7 43 18 8c 69 40 00 e9 da 01 00 00 83 7d f0 00 } /* Opcode */
$op4 = { 6a 01 e9 7c f8 ff ff bf 1a 40 00 96 1b 40 00 01 } /* Opcode */
condition:
uint16(0) == 0x5a4d and filesize < 400KB and 3 of ($s*) and 1 of ($op*)
}
}
rule ThreatGroup3390_Strings : APT {
rule ThreatGroup3390_Strings
meta:
{
description = "Threat Group 3390 APT - Strings"
author = "Florian Roth"
meta:
reference = "http://snip.ly/giNB"
description = "Threat Group 3390 APT - Strings"
date = "2015-08-06"
author = "Florian Roth"
score = 60
reference = "http://snip.ly/giNB"
strings:
date = "2015-08-06"
$s1 = "\"cmd\" /c cd /d \"c:\\Windows\\Temp\\\"©" ascii
score = 60
$s2 = "svchost.exe a -k -r -s -m5 -v1024000 -padmin-windows2014"
$s3 = "ren *.rar *.zip" fullword ascii
strings:
$s4 = "c:\\temp\\ipcan.exe" fullword ascii
$s1 = "\"cmd\" /c cd /d \"c:\\Windows\\Temp\\\"©" ascii
$s5 = "<%eval(Request.Item(\"admin-na-google123!@#" ascii
$s2 = "svchost.exe a -k -r -s -m5 -v1024000 -padmin-windows2014"
condition:
$s3 = "ren *.rar *.zip" fullword ascii
1 of them and filesize < 30KB
$s4 = "c:\\temp\\ipcan.exe" fullword ascii
$s5 = "<%eval(Request.Item(\"admin-na-google123!@#" ascii
condition:
1 of them and filesize < 30KB
}
}
rule ThreatGroup3390_C2 : C2 APT {
rule ThreatGroup3390_C2
meta:
{
description = "Threat Group 3390 APT - C2 Server"
author = "Florian Roth"
meta:
reference = "http://snip.ly/giNB"
description = "Threat Group 3390 APT - C2 Server"
date = "2015-08-06"
author = "Florian Roth"
score = 60
reference = "http://snip.ly/giNB"
strings:
date = "2015-08-06"
$s1 = "api.apigmail.com"
score = 60
$s2 = "apigmail.com"
$s3 = "backup.darkhero.org"
strings:
$s4 = "bel.updatawindows.com"
$s1 = "api.apigmail.com"
$s5 = "binary.update-onlines.org"
$s2 = "apigmail.com"
$s6 = "blackcmd.com"
$s3 = "backup.darkhero.org"
$s7 = "castle.blackcmd.com"
$s4 = "bel.updatawindows.com"
$s8 = "ctcb.blackcmd.com"
$s5 = "binary.update-onlines.org"
$s9 = "darkhero.org"
$s6 = "blackcmd.com"
$s10 = "dav.local-test.com"
$s7 = "castle.blackcmd.com"
$s11 = "test.local-test.com"
$s8 = "ctcb.blackcmd.com"
$s12 = "dev.local-test.com"
$s9 = "darkhero.org"
$s13 = "ocean.local-test.com"
$s10 = "dav.local-test.com"
$s14 = "ga.blackcmd.com"
$s11 = "test.local-test.com"
$s15 = "helpdesk.blackcmd.com"
$s12 = "dev.local-test.com"
$s16 = "helpdesk.csc-na.com"
$s13 = "ocean.local-test.com"
$s17 = "helpdesk.hotmail-onlines.com"
$s14 = "ga.blackcmd.com"
$s18 = "helpdesk.lnip.org"
$s15 = "helpdesk.blackcmd.com"
$s19 = "hotmail-onlines.com"
$s16 = "helpdesk.csc-na.com"
$s20 = "jobs.hotmail-onlines.com"
$s17 = "helpdesk.hotmail-onlines.com"
$s21 = "justufogame.com"
$s18 = "helpdesk.lnip.org"
$s22 = "lnip.org"
$s19 = "hotmail-onlines.com"
$s23 = "local-test.com"
$s20 = "jobs.hotmail-onlines.com"
$s24 = "login.hansoftupdate.com"
$s21 = "justufogame.com"
$s25 = "long.update-onlines.org"
$s22 = "lnip.org"
$s26 = "longlong.update-onlines.org"
$s23 = "local-test.com"
$s27 = "longshadow.dyndns.org"
$s24 = "login.hansoftupdate.com"
$s28 = "longshadow.update-onlines.org"
$s25 = "long.update-onlines.org"
$s29 = "longykcai.update-onlines.org"
$s26 = "longlong.update-onlines.org"
$s30 = "lostself.update-onlines.org"
$s27 = "longshadow.dyndns.org"
$s31 = "mac.navydocument.com"
$s28 = "longshadow.update-onlines.org"
$s32 = "mail.csc-na.com"
$s29 = "longykcai.update-onlines.org"
$s33 = "mantech.updatawindows.com"
$s30 = "lostself.update-onlines.org"
$s34 = "micr0soft.org"
$s31 = "mac.navydocument.com"
$s35 = "microsoft-outlook.org"
$s32 = "mail.csc-na.com"
$s36 = "mtc.navydocument.com"
$s33 = "mantech.updatawindows.com"
$s37 = "navydocument.com"
$s34 = "micr0soft.org"
$s38 = "mtc.update-onlines.org"
$s35 = "microsoft-outlook.org"
$s39 = "news.hotmail-onlines.com"
$s36 = "mtc.navydocument.com"
$s40 = "oac.3322.org"
$s37 = "navydocument.com"
$s41 = "ocean.apigmail.com"
$s38 = "mtc.update-onlines.org"
$s42 = "pchomeserver.com"
$s39 = "news.hotmail-onlines.com"
$s43 = "registre.organiccrap.com"
$s40 = "oac.3322.org"
$s44 = "security.pomsys.org"
$s41 = "ocean.apigmail.com"
$s45 = "services.darkhero.org"
$s42 = "pchomeserver.com"
$s46 = "sgl.updatawindows.com"
$s43 = "registre.organiccrap.com"
$s47 = "shadow.update-onlines.org"
$s44 = "security.pomsys.org"
$s48 = "sonoco.blackcmd.com"
$s45 = "services.darkhero.org"
$s49 = "test.logmastre.com"
$s46 = "sgl.updatawindows.com"
$s50 = "up.gtalklite.com"
$s47 = "shadow.update-onlines.org"
$s51 = "updatawindows.com"
$s48 = "sonoco.blackcmd.com"
$s52 = "update-onlines.org"
$s49 = "test.logmastre.com"
$s53 = "update.deepsoftupdate.com"
$s50 = "up.gtalklite.com"
$s54 = "update.hancominc.com"
$s51 = "updatawindows.com"
$s55 = "update.micr0soft.org"
$s52 = "update-onlines.org"
$s56 = "update.pchomeserver.com"
$s53 = "update.deepsoftupdate.com"
$s57 = "urs.blackcmd.com"
$s54 = "update.hancominc.com"
$s58 = "wang.darkhero.org"
$s55 = "update.micr0soft.org"
$s59 = "webs.local-test.com"
$s56 = "update.pchomeserver.com"
$s60 = "word.apigmail.com"
$s57 = "urs.blackcmd.com"
$s61 = "wordpress.blackcmd.com"
$s58 = "wang.darkhero.org"
$s62 = "working.blackcmd.com"
$s59 = "webs.local-test.com"
$s63 = "working.darkhero.org"
$s60 = "word.apigmail.com"
$s64 = "working.hotmail-onlines.com"
$s61 = "wordpress.blackcmd.com"
$s65 = "www.trendmicro-update.org"
$s62 = "working.blackcmd.com"
$s66 = "www.update-onlines.org"
$s63 = "working.darkhero.org"
$s67 = "x.apigmail.com"
$s64 = "working.hotmail-onlines.com"
$s68 = "ykcai.update-onlines.org"
$s65 = "www.trendmicro-update.org"
$s69 = "ykcailostself.dyndns-free.com"
$s66 = "www.update-onlines.org"
$s70 = "ykcainobody.dyndns.org"
$s67 = "x.apigmail.com"
$s71 = "zj.blackcmd.com"
$s68 = "ykcai.update-onlines.org"
$s72 = "laxness-lab.com"
$s69 = "ykcailostself.dyndns-free.com"
$s73 = "google-ana1ytics.com"
$s70 = "ykcainobody.dyndns.org"
$s74 = "www.google-ana1ytics.com"
$s71 = "zj.blackcmd.com"
$s75 = "ftp.google-ana1ytics.com"
$s72 = "laxness-lab.com"
$s76 = "hotmailcontact.net"
$s73 = "google-ana1ytics.com"
$s77 = "208.115.242.36"
$s74 = "www.google-ana1ytics.com"
$s78 = "208.115.242.37"
$s75 = "ftp.google-ana1ytics.com"
$s79 = "208.115.242.38"
$s76 = "hotmailcontact.net"
$s80 = "66.63.178.142"
$s77 = "208.115.242.36"
$s81 = "72.11.148.220"
$s78 = "208.115.242.37"
$s82 = "72.11.141.133"
$s79 = "208.115.242.38"
$s83 = "74.63.195.236"
$s80 = "66.63.178.142"
$s84 = "74.63.195.236"
$s81 = "72.11.148.220"
$s85 = "74.63.195.237"
$s82 = "72.11.141.133"
$s86 = "74.63.195.238"
$s83 = "74.63.195.236"
$s87 = "103.24.0.142"
$s84 = "74.63.195.236"
$s88 = "103.24.1.54"
$s85 = "74.63.195.237"
$s89 = "106.187.45.162"
$s86 = "74.63.195.238"
$s90 = "192.151.236.138"
$s87 = "103.24.0.142"
$s91 = "192.161.61.19"
$s88 = "103.24.1.54"
$s92 = "192.161.61.20"
$s89 = "106.187.45.162"
$s93 = "192.161.61.22"
$s90 = "192.151.236.138"
$s94 = "103.24.1.54"
$s91 = "192.161.61.19"
$s95 = "67.215.232.179"
$s92 = "192.161.61.20"
$s96 = "96.44.177.195"
$s93 = "192.161.61.22"
$s97 = "49.143.192.221"
$s94 = "103.24.1.54"
$s98 = "67.215.232.181"
$s95 = "67.215.232.179"
$s99 = "67.215.232.182"
$s96 = "96.44.177.195"
$s100 = "96.44.182.243"
$s97 = "49.143.192.221"
$s101 = "96.44.182.245"
$s98 = "67.215.232.181"
$s102 = "96.44.182.246"
$s99 = "67.215.232.182"
$s103 = "49.143.205.30"
$s100 = "96.44.182.243"
$s104 = "working_success@163.com"
$s101 = "96.44.182.245"
$s105 = "ykcaihyl@163.com"
$s102 = "96.44.182.246"
$s106 = "working_success@163.com"
$s103 = "49.143.205.30"
$s107 = "yuming@yinsibaohu.aliyun.com"
$s104 = "working_success@163.com"
condition:
$s105 = "ykcaihyl@163.com"
uint16(0) == 0x5a4d and 1 of them
$s106 = "working_success@163.com"
$s107 = "yuming@yinsibaohu.aliyun.com"
condition:
uint16(0) == 0x5a4d and 1 of them
}
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment