Commit ea59b2e1 by Marc Rivero López Committed by GitHub

Update APT_Casper.yar

fixed rule style
parent 04c22d97
...@@ -5,7 +5,9 @@ ...@@ -5,7 +5,9 @@
import "pe" import "pe"
rule Casper_Backdoor_x86 : APT Backdoor { rule Casper_Backdoor_x86
{
meta: meta:
description = "Casper French Espionage Malware - Win32/ProxyBot.B - x86 Payload http://goo.gl/VRJNLo" description = "Casper French Espionage Malware - Win32/ProxyBot.B - x86 Payload http://goo.gl/VRJNLo"
author = "Florian Roth" author = "Florian Roth"
...@@ -13,30 +15,29 @@ rule Casper_Backdoor_x86 : APT Backdoor { ...@@ -13,30 +15,29 @@ rule Casper_Backdoor_x86 : APT Backdoor {
date = "2015/03/05" date = "2015/03/05"
hash = "f4c39eddef1c7d99283c7303c1835e99d8e498b0" hash = "f4c39eddef1c7d99283c7303c1835e99d8e498b0"
score = 80 score = 80
strings: strings:
$s1 = "\"svchost.exe\"" fullword wide $s1 = "\"svchost.exe\"" fullword wide
$s2 = "firefox.exe" fullword ascii $s2 = "firefox.exe" fullword ascii
$s3 = "\"Host Process for Windows Services\"" fullword wide $s3 = "\"Host Process for Windows Services\"" fullword wide
$x1 = "\\Users\\*" fullword ascii $x1 = "\\Users\\*" fullword ascii
$x2 = "\\Roaming\\Mozilla\\Firefox\\Profiles\\*" fullword ascii $x2 = "\\Roaming\\Mozilla\\Firefox\\Profiles\\*" fullword ascii
$x3 = "\\Mozilla\\Firefox\\Profiles\\*" fullword ascii $x3 = "\\Mozilla\\Firefox\\Profiles\\*" fullword ascii
$x4 = "\\Documents and Settings\\*" fullword ascii $x4 = "\\Documents and Settings\\*" fullword ascii
$y1 = "%s; %S=%S" fullword wide $y1 = "%s; %S=%S" fullword wide
$y2 = "%s; %s=%s" fullword ascii $y2 = "%s; %s=%s" fullword ascii
$y3 = "Cookie: %s=%s" fullword ascii $y3 = "Cookie: %s=%s" fullword ascii
$y4 = "http://%S:%d" fullword wide $y4 = "http://%S:%d" fullword wide
$z1 = "http://google.com/" fullword ascii $z1 = "http://google.com/" fullword ascii
$z2 = "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MALC)" fullword ascii $z2 = "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MALC)" fullword ascii
$z3 = "Operating System\"" fullword wide $z3 = "Operating System\"" fullword wide
condition: condition:
( all of ($s*) ) or ( all of ($s*) ) or ( 3 of ($x*) and 2 of ($y*) and 2 of ($z*) )
( 3 of ($x*) and 2 of ($y*) and 2 of ($z*) )
} }
rule Casper_EXE_Dropper : Dropper { rule Casper_EXE_Dropper
{
meta: meta:
description = "Casper French Espionage Malware - Win32/ProxyBot.B - Dropper http://goo.gl/VRJNLo" description = "Casper French Espionage Malware - Win32/ProxyBot.B - Dropper http://goo.gl/VRJNLo"
author = "Florian Roth" author = "Florian Roth"
...@@ -44,6 +45,7 @@ rule Casper_EXE_Dropper : Dropper { ...@@ -44,6 +45,7 @@ rule Casper_EXE_Dropper : Dropper {
date = "2015/03/05" date = "2015/03/05"
hash = "e4cc35792a48123e71a2c7b6aa904006343a157a" hash = "e4cc35792a48123e71a2c7b6aa904006343a157a"
score = 80 score = 80
strings: strings:
$s0 = "<Command>" fullword ascii $s0 = "<Command>" fullword ascii
$s1 = "</Command>" fullword ascii $s1 = "</Command>" fullword ascii
...@@ -53,21 +55,24 @@ rule Casper_EXE_Dropper : Dropper { ...@@ -53,21 +55,24 @@ rule Casper_EXE_Dropper : Dropper {
$s6 = "@ReturnValue" fullword wide $s6 = "@ReturnValue" fullword wide
$s7 = "ID: 0x%x" fullword ascii $s7 = "ID: 0x%x" fullword ascii
$s8 = "Name: %S" fullword ascii $s8 = "Name: %S" fullword ascii
condition: condition:
7 of them 7 of them
} }
rule Casper_Included_Strings { rule Casper_Included_Strings
{
meta: meta:
description = "Casper French Espionage Malware - String Match in File - http://goo.gl/VRJNLo" description = "Casper French Espionage Malware - String Match in File - http://goo.gl/VRJNLo"
author = "Florian Roth" author = "Florian Roth"
reference = "http://goo.gl/VRJNLo" reference = "http://goo.gl/VRJNLo"
date = "2015/03/06" date = "2015/03/06"
score = 50 score = 50
strings: strings:
$a0 = "cmd.exe /C FOR /L %%i IN (1,1,%d) DO IF EXIST" $a0 = "cmd.exe /C FOR /L %%i IN (1,1,%d) DO IF EXIST"
$a1 = "& SYSTEMINFO) ELSE EXIT" $a1 = "& SYSTEMINFO) ELSE EXIT"
$mz = { 4d 5a } $mz = { 4d 5a }
$c1 = "domcommon.exe" wide fullword // File Name $c1 = "domcommon.exe" wide fullword // File Name
$c2 = "jpic.gov.sy" fullword // C2 Server $c2 = "jpic.gov.sy" fullword // C2 Server
...@@ -76,18 +81,21 @@ rule Casper_Included_Strings { ...@@ -76,18 +81,21 @@ rule Casper_Included_Strings {
$c5 = "Casper_DLL.dll" fullword // Name $c5 = "Casper_DLL.dll" fullword // Name
$c6 = { 7B 4B 59 DE 37 4A 42 26 59 98 63 C6 2D 0F 57 40 } // Decryption Key $c6 = { 7B 4B 59 DE 37 4A 42 26 59 98 63 C6 2D 0F 57 40 } // Decryption Key
$c7 = "{4216567A-4512-9825-7745F856}" fullword // Mutex $c7 = "{4216567A-4512-9825-7745F856}" fullword // Mutex
condition: condition:
all of ($a*) or all of ($a*) or ( $mz at 0 ) and ( 1 of ($c*) )
( $mz at 0 ) and ( 1 of ($c*) )
} }
rule Casper_SystemInformation_Output { rule Casper_SystemInformation_Output
{
meta: meta:
description = "Casper French Espionage Malware - System Info Output - http://goo.gl/VRJNLo" description = "Casper French Espionage Malware - System Info Output - http://goo.gl/VRJNLo"
author = "Florian Roth" author = "Florian Roth"
reference = "http://goo.gl/VRJNLo" reference = "http://goo.gl/VRJNLo"
date = "2015/03/06" date = "2015/03/06"
score = 70 score = 70
strings: strings:
$a0 = "***** SYSTEM INFORMATION ******" $a0 = "***** SYSTEM INFORMATION ******"
$a1 = "***** SECURITY INFORMATION ******" $a1 = "***** SECURITY INFORMATION ******"
...@@ -96,6 +104,8 @@ rule Casper_SystemInformation_Output { ...@@ -96,6 +104,8 @@ rule Casper_SystemInformation_Output {
$a4 = "***** EXECUTION CONTEXT ******" $a4 = "***** EXECUTION CONTEXT ******"
$a5 = "Identity: " $a5 = "Identity: "
$a6 = "<CONFIG TIMESTAMP=" $a6 = "<CONFIG TIMESTAMP="
condition: condition:
all of them all of them
} }
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment