Common Information
Type Value
Value
rule poweliks_injected {
	meta:
		description = "system infected with poweliks"
		in_the_wild = true
	strings:
		$s1 = "http://%s/q"
		$s2 = /(syswow64|system32)\\dllhost\.exe/ wide
		$s3 = "%1d.%1d.%04d_%1d.%1d"
		$s4 = "%x%x%x%x%x%x"
		$s5 = "builddate"
		$t1 = /windowspowershell\\[a-z0-9]{1,3}\.[a-z0-
Figure 51: POWELIKSs HTTP connections.
Figure 52: Noti
    cation for blocking suspicious software, in this case, POWELIKS.
DOING MORE WITH LESS: A STUDY OF FILELESS INFECTION ATTACKS  RIVERA & INOCENCIO
88
VIRUS BULLETIN CONFERENCE SEPTEMBER 2015
9]{1,2}\\powershell\.exe/ wide
		$t2 = "powershell.exe"
	condition:
		all of ($s*) and any of ($t*)
}
Category
Type Yara Rule
Misp Type
Description
Details Published Attributes CTI Title
Details Pdf 2016-12-24 71 DOING MORE WITH LESS: A STUDY OF FILELESS INFECTION ATTACKS