Common Information
Type | Value |
---|---|
Value |
import "hash" import "pe" rule FlyingAFalseFlag_Exchanger { meta: description = "FlyingAFalseFlag - Exchanger_x64.exe, Exchanger_x86.exe" sha256_1 = "6a5605da5f7207b1b14b798e9428c2310633664eed53ce7bdb39a6847eff6609" sha256_2 = "c337983b7eefbea3cc02e4d011398292ccbd475ba932ced40603a4a9a3927032" strings: $s1 = "api-ms-win-core-synch-l1-2-0.dll" wide fullword $s2 = "<GetItem xmlns=\"http://schemas.microsoft.com/exchange/services/2006/messages\">" ascii fullword $s3 = "<DeleteItem DeleteType=\"HardDelete\" xmlns=\"http://schemas.microsoft.com/exchange/services/2006/messages\">" ascii fullword $s4 = "<soap:Envelope xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:t=" $s5 = "://schemas.microsoft.com/exchange/services/2006/types\" xmlns:m=\"http://schemas.microsoft.com/exchange/services/2006/messages\"" $s6 = "[+] Found vault creds: %s / " ascii fullword $s7 = "[!] Failed to execute tasking" ascii fullword $s8 = " <requestedExecutionLevel level='asInvoker' uiAccess='false' />" ascii fullword $s9 = "[+] Auto-hide rule '%s' is ready" ascii fullword $s10 = "mail@<domain.com>" ascii fullword $s11 = "%localappdata%\\Microsoft\\Outlook\\" wide fullword $s12 = "<AutoDiscoverSMTPAddress>" ascii fullword $s13 = "<m:MailboxSmtpAddress>**MAILBOX**</m:MailboxSmtpAddress>" ascii fullword $s14 = "[+] Got tasking... executing." ascii fullword $s15 = "<soap:Envelope xmlns:xsd=\"http://www.w3.org/2001/XMLSchema\" xmlns:soap=\"http://schemas.xmlsoap.org/soap/envelope/\" xmlns:t=" $s16 = "[!] Failed to create rule '%s'" ascii fullword $s17 = "[!] Failed to beacon to '%s'" ascii fullword $s18 = "</m:GetInboxRules>" ascii fullword $s19 = " </soap:Header>" ascii fullword condition: hash.sha256(0, filesize) == "6a5605da5f7207b1b14b798e9428c2310633664eed53ce7bdb39a6847eff6609" or hash.sha256(0, filesize) == "c337983b7eefbea3cc02e4d011398292ccbd475ba932ced40603a4a9a3927032" or pe.imports("kernel32.dll", "FindNextFileW") and pe.imports("kernel32.dll", "TerminateProcess") and pe.imports("wininet.dll", "InternetConnectA") and pe.imports("advapi32.dll", "LookupAccountSidA") and ((uint16(0) == 0x5a4d and filesize < 300KB and (8 of them)) or (all of them)) } |
Category | |
Type | Yara Rule |
Misp Type | |
Description |