Common Information
Type Value
Value
rule SpicyHotPot_KMDF_LOOK {
	meta:
		description = "SpicyHotPot - KMDF_LOOK.sys: Used to identify browser hijacking component"
		author = "jai-minton"
		reference = "https://www.crowdstrike.com/blog/author/jai-minton/"
		copyright = "(c) 2020 CrowdStrike Inc."
		date = "2020-11-01"
		hash1 = "39764e887fd0b461d86c1be96018a4c2a670b1de90d05f86ed0acb357a683318"
	strings:
		$x1 = "G:\\SVN\\"
		$s1 = "TSWebDownLoadProtect.dll" wide fullword
		$s2 = "ShellIco.dll" wide fullword
		$s3 = "QMLogEx.dll" wide fullword
		$s4 = "SSOCommon.dll" wide fullword
		$s5 = "TsService.exe" ascii fullword
		$s6 = "Hookport.sys" wide fullword
		$s7 = "SafeWrapper32.dll" wide fullword
		$s8 = "safemon.dll" wide fullword
		$s9 = "iNetSafe.dll" wide fullword
		$s10 = "ieplus.dll" wide fullword
		$s11 = "wdui2.dll" wide fullword
		$s12 = "ExtBhoIEToSe.dll" wide fullword
		$s13 = "360NetBase.dll" wide fullword
		$s14 = "urlproc.dll" wide fullword
		$s15 = "360sdbho.dll" wide fullword
		$s16 = "360base.dll" wide fullword
		$s17 = "360UDiskGuard.dll" wide fullword
		$s18 = "TSClinicWebFix.dll" wide fullword
		$s19 = "QMEmKit.dll" wide fullword
		$s20 = "WdHPFileSafe.dll" wide fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 1000KB and 8 of them
}
Category
Type Yara Rule
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2020-12-22 66 Spicy Hot Pot Rootkit: Finding, Hunting, and Eradicating It