/* This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license. */ rule AAR : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/AAR" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "Hashtable" $b = "get_IsDisposed" $c = "TripleDES" $d = "testmemory.FRMMain.resources" $e = "$this.Icon" wide $f = "{11111-22222-20001-00001}" wide $g = "@@@@@" condition: all of them } rule Ap0calypse: RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Ap0calypse" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "Ap0calypse" $b = "Sifre" $c = "MsgGoster" $d = "Baslik" $e = "Dosyalars" $f = "Injecsiyon" condition: all of them } rule Arcom : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Arcom" maltype = "Remote Access Trojan" filetype = "exe" strings: $a1 = "CVu3388fnek3W(3ij3fkp0930di" $a2 = "ZINGAWI2" $a3 = "clWebLightGoldenrodYellow" $a4 = "Ancestor for '%s' not found" wide $a5 = "Control-C hit" wide $a6 = {A3 24 25 21} condition: all of them } rule Bandook : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/bandook" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "aaaaaa1|" $b = "aaaaaa2|" $c = "aaaaaa3|" $d = "aaaaaa4|" $e = "aaaaaa5|" $f = "%s%d.exe" $g = "astalavista" $h = "givemecache" $i = "%s\\system32\\drivers\\blogs\\*" $j = "bndk13me" condition: all of them } rule BlackNix : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/BlackNix" maltype = "Remote Access Trojan" filetype = "exe" strings: $a1 = "SETTINGS" wide $a2 = "Mark Adler" $a3 = "Random-Number-Here" $a4 = "RemoteShell" $a5 = "SystemInfo" condition: all of them } rule BlueBanana : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/BlueBanana" maltype = "Remote Access Trojan" filetype = "Java" strings: $meta = "META-INF" $conf = "config.txt" $a = "a/a/a/a/f.class" $b = "a/a/a/a/l.class" $c = "a/a/a/b/q.class" $d = "a/a/a/b/v.class" condition: all of them } rule ClientMesh : RAT { meta: author = "Kevin Breen <kevin@techanarchy.net>" date = "2014/06" ref = "http://malwareconfig.com/stats/ClientMesh" family = "torct" strings: $string1 = "machinedetails" $string2 = "MySettings" $string3 = "sendftppasswords" $string4 = "sendbrowserpasswords" $string5 = "arma2keyMass" $string6 = "keylogger" $conf = {00 00 00 00 00 00 00 00 00 7E} condition: all of them } rule DarkRAT : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/DarkRAT" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "@1906dark1996coder@" $b = "SHEmptyRecycleBinA" $c = "mciSendStringA" $d = "add_Shutdown" $e = "get_SaveMySettingsOnExit" $f = "get_SpecialDirectories" $g = "Client.My" condition: all of them } rule Greame : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Greame" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = {23 23 23 23 40 23 23 23 23 E8 EE E9 F9 23 23 23 23 40 23 23 23 23} $b = {23 23 23 23 40 23 23 23 23 FA FD F0 EF F9 23 23 23 23 40 23 23 23 23} $c = "EditSvr" $d = "TLoader" $e = "Stroks" $f = "Avenger by NhT" $g = "####@####" $h = "GREAME" condition: all of them } rule HawkEye : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2015/06" ref = "http://malwareconfig.com/stats/HawkEye" maltype = "KeyLogger" filetype = "exe" strings: $key = "HawkEyeKeylogger" wide $salt = "099u787978786" wide $string1 = "HawkEye_Keylogger" wide $string2 = "holdermail.txt" wide $string3 = "wallet.dat" wide $string4 = "Keylog Records" wide $string5 = "<!-- do not script -->" wide $string6 = "\\pidloc.txt" wide $string7 = "BSPLIT" wide condition: $key and $salt and all of ($string*) } rule Imminent : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Imminent" maltype = "Remote Access Trojan" filetype = "exe" strings: $v1a = "DecodeProductKey" $v1b = "StartHTTPFlood" $v1c = "CodeKey" $v1d = "MESSAGEBOX" $v1e = "GetFilezillaPasswords" $v1f = "DataIn" $v1g = "UDPzSockets" $v1h = {52 00 54 00 5F 00 52 00 43 00 44 00 41 00 54 00 41} $v2a = "<URL>k__BackingField" $v2b = "<RunHidden>k__BackingField" $v2c = "DownloadAndExecute" $v2d = "-CHECK & PING -n 2 127.0.0.1 & EXIT" wide $v2e = "england.png" wide $v2f = "Showed Messagebox" wide condition: all of ($v1*) or all of ($v2*) } rule Infinity : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Infinity" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "CRYPTPROTECT_PROMPTSTRUCT" $b = "discomouse" $c = "GetDeepInfo" $d = "AES_Encrypt" $e = "StartUDPFlood" $f = "BATScripting" wide $g = "FBqINhRdpgnqATxJ.html" wide $i = "magic_key" wide condition: all of them } rule JavaDropper : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2015/10" ref = "http://malwareconfig.com/stats/AlienSpy" maltype = "Remote Access Trojan" filetype = "exe" strings: $jar = "META-INF/MANIFEST.MF" $a1 = "ePK" $a2 = "kPK" $b1 = "config.ini" $b2 = "password.ini" $c1 = "stub/stub.dll" $d1 = "c.dat" condition: $jar and (all of ($a*) or all of ($b*) or all of ($c*) or all of ($d*)) } rule LostDoor : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/LostDoor" maltype = "Remote Access Trojan" filetype = "exe" strings: $a0 = {0D 0A 2A 45 44 49 54 5F 53 45 52 56 45 52 2A 0D 0A} $a1 = "*mlt* = %" $a2 = "*ip* = %" $a3 = "*victimo* = %" $a4 = "*name* = %" $b5 = "[START]" $b6 = "[DATA]" $b7 = "We Control Your Digital World" wide ascii $b8 = "RC4Initialize" wide ascii $b9 = "RC4Decrypt" wide ascii condition: all of ($a*) or all of ($b*) } rule LuminosityLink : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/LuminosityLink" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "SMARTLOGS" wide $b = "RUNPE" wide $c = "b.Resources" wide $d = "CLIENTINFO*" wide $e = "Invalid Webcam Driver Download URL, or Failed to Download File!" wide $f = "Proactive Anti-Malware has been manually activated!" wide $g = "REMOVEGUARD" wide $h = "C0n1f8" wide $i = "Luminosity" wide $j = "LuminosityCryptoMiner" wide $k = "MANAGER*CLIENTDETAILS*" wide condition: all of them } rule LuxNet : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/LuxNet" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "GetHashCode" $b = "Activator" $c = "WebClient" $d = "op_Equality" $e = "dickcursor.cur" wide $f = "{0}|{1}|{2}" wide condition: all of them } rule NanoCore : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/NanoCore" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "NanoCore" $b = "ClientPlugin" $c = "ProjectData" $d = "DESCrypto" $e = "KeepAlive" $f = "IPNETROW" $g = "LogClientMessage" $h = "|ClientHost" $i = "get_Connected" $j = "#=q" $key = {43 6f 24 cb 95 30 38 39} condition: 6 of them } rule Paradox : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Paradox" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "ParadoxRAT" $b = "Form1" $c = "StartRMCam" $d = "Flooders" $e = "SlowLaris" $f = "SHITEMID" $g = "set_Remote_Chat" condition: all of them } rule Plasma : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Plasma" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "Miner: Failed to Inject." wide $b = "Started GPU Mining on:" wide $c = "BK: Hard Bot Killer Ran Successfully!" wide $d = "Uploaded Keylogs Successfully!" wide $e = "No Slowloris Attack is Running!" wide $f = "An ARME Attack is Already Running on" wide $g = "Proactive Bot Killer Enabled!" wide $h = "PlasmaRAT" wide ascii $i = "AntiEverything" wide ascii condition: all of them } rule PredatorPain : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/PredatorPain" maltype = "Remote Access Trojan" filetype = "exe" strings: $string1 = "holderwb.txt" wide $string3 = "There is a file attached to this email" wide $string4 = "screens\\screenshot" wide $string5 = "Disablelogger" wide $string6 = "\\pidloc.txt" wide $string7 = "clearie" wide $string8 = "clearff" wide $string9 = "emails should be sent to you shortly" wide $string10 = "jagex_cache\\regPin" wide $string11 = "open=Sys.exe" wide $ver1 = "PredatorLogger" wide $ver2 = "EncryptedCredentials" wide $ver3 = "Predator Pain" wide condition: 7 of ($string*) and any of ($ver*) } rule Punisher : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Punisher" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "abccba" $b = {5C 00 68 00 66 00 68 00 2E 00 76 00 62 00 73} $c = {5C 00 73 00 63 00 2E 00 76 00 62 00 73} $d = "SpyTheSpy" wide ascii $e = "wireshark" wide $f = "apateDNS" wide $g = "abccbaDanabccb" condition: all of them } rule PythoRAT : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/PythoRAT" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "TKeylogger" $b = "uFileTransfer" $c = "TTDownload" $d = "SETTINGS" $e = "Unknown" wide $f = "#@#@#" $g = "PluginData" $i = "OnPluginMessage" condition: all of them } rule QRat : RAT { meta: author = "Kevin Breen @KevTheHermit" date = "2015/08" ref = "http://malwareconfig.com" maltype = "Remote Access Trojan" filetype = "jar" strings: $a0 = "e-data" $a1 = "quaverse/crypter" $a2 = "Qrypt.class" $a3 = "Jarizer.class" $a4 = "URLConnection.class" condition: 4 of them } rule SmallNet : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/SmallNet" maltype = "Remote Access Trojan" filetype = "exe" strings: $split1 = "!!<3SAFIA<3!!" $split2 = "!!ElMattadorDz!!" $a1 = "stub_2.Properties" $a2 = "stub.exe" wide $a3 = "get_CurrentDomain" condition: ($split1 or $split2) and (all of ($a*)) } rule SpyGate : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/SpyGate" maltype = "Remote Access Trojan" filetype = "exe" strings: $split = "abccba" $a1 = "abccbaSpyGateRATabccba" //$a = Version 0.2.6 $a2 = "StubX.pdb" $a3 = "abccbaDanabccb" $b1 = "monikerString" nocase //$b = Version 2.0 $b2 = "virustotal1" $b3 = "get_CurrentDomain" $c1 = "shutdowncomputer" wide //$c = Version 2.9 $c2 = "shutdown -r -t 00" wide $c3 = "set cdaudio door closed" wide $c4 = "FileManagerSplit" wide $c5 = "Chating With >> [~Hacker~]" wide condition: (all of ($a*) and #split > 40) or (all of ($b*) and #split > 10) or (all of ($c*)) } rule Sub7Nation : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Sub7Nation" maltype = "Remote Access Trojan" filetype = "exe" strings: $a = "EnableLUA /t REG_DWORD /d 0 /f" $b = "*A01*" $c = "*A02*" $d = "*A03*" $e = "*A04*" $f = "*A05*" $g = "*A06*" $h = "#@#@#" $i = "HostSettings" $verSpecific1 = "sevane.tmp" $verSpecific2 = "cmd_.bat" $verSpecific3 = "a2b7c3d7e4" $verSpecific4 = "cmd.dll" condition: all of them } rule UPX : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" strings: $a = "UPX0" $b = "UPX1" $c = "UPX!" condition: all of them } rule Vertex : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/Vertex" maltype = "Remote Access Trojan" filetype = "exe" strings: $string1 = "DEFPATH" $string2 = "HKNAME" $string3 = "HPORT" $string4 = "INSTALL" $string5 = "IPATH" $string6 = "MUTEX" $res1 = "PANELPATH" $res2 = "ROOTURL" condition: all of them } rule VirusRat : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/VirusRat" maltype = "Remote Access Trojan" filetype = "exe" strings: $string0 = "virustotal" $string1 = "virusscan" $string2 = "abccba" $string3 = "pronoip" $string4 = "streamWebcam" $string5 = "DOMAIN_PASSWORD" $string6 = "Stub.Form1.resources" $string7 = "ftp://{0}@{1}" wide $string8 = "SELECT * FROM moz_logins" wide $string9 = "SELECT * FROM moz_disabledHosts" wide $string10 = "DynDNS\\Updater\\config.dyndns" wide $string11 = "|BawaneH|" wide condition: all of them } rule unrecom : RAT { meta: author = " Kevin Breen <kevin@techanarchy.net>" date = "2014/04" ref = "http://malwareconfig.com/stats/AAR" maltype = "Remote Access Trojan" filetype = "exe" strings: $meta = "META-INF" $conf = "load/ID" $a = "load/JarMain.class" $b = "load/MANIFEST.MF" $c = "plugins/UnrecomServer.class" condition: all of them }