How to Write Simple but Sound Yara Rules - Part 2 - Nextron Systems
Common Information
Type Value
UUID 5d8689ef-0fc9-44f2-b35c-6dbdd30446e7
Fingerprint 2e362abaadfef0fc
Analysis status DONE
Considered CTI value -2
Text language
Published Oct. 17, 2015, 4:53 p.m.
Added to db Sept. 26, 2022, 9:30 a.m.
Last updated Nov. 17, 2024, 2:56 a.m.
Headline How to Write Simple but Sound Yara Rules – Part 2
Title How to Write Simple but Sound Yara Rules - Part 2 - Nextron Systems
Detected Hints/Tags/Attributes 38/1/21
Attributes
Details Type #Events CTI Value
Details Domain 12
blog.gdatasoftware.com
Details Domain 80
goo.gl
Details Domain 4
yargen.py
Details File 2
imemonsvc.dll
Details File 2
iphlpsvc.tmp
Details File 2
wwwlib.dll
Details File 1
analysis-of-project-cobra.html
Details File 2
kmsvc.dll
Details File 1
svchostservicedll_w2k3.dll
Details File 3
msimghlp.dll
Details File 7
ab.exe
Details File 4
yargen.py
Details sha1 2
6d484daba3927fc0744b1bbd7981a56ebef95790
Details sha1 2
d4071272cc1bf944e3867db299b3f5dce126f82b
Details sha1 2
6c7c8b804cc76e2c208c6e3b6453cb134d01fa41
Details sha1 2
a28164de29e51f154be12d163ce5818fceb69233
Details sha256 1
d5696b32d32177cf70eaaa5a28d1c5823526d87e20d3c62b747517c6d41656f7
Details Url 1
https://blog.gdatasoftware.com/blog/article/analysis-of-project-cobra.html
Details Url 1
https://goo.gl/zuzv2s
Details Yara rule 1
rule Enfal_Malware_Backdoor {
	meta:
		description = "Generic Rule to detect the Enfal Malware"
		author = "Florian Roth"
		date = "2015/02/10"
		super_rule = 1
		hash0 = "6d484daba3927fc0744b1bbd7981a56ebef95790"
		hash1 = "d4071272cc1bf944e3867db299b3f5dce126f82b"
		hash2 = "6c7c8b804cc76e2c208c6e3b6453cb134d01fa41"
		score = 60
	strings:
		$x1 = "Micorsoft Corportation" wide fullword
		$x2 = "IM Monnitor Service" wide fullword
		$a1 = "imemonsvc.dll" wide fullword
		$a2 = "iphlpsvc.tmp" fullword
		$a3 = "{53A4988C-F91F-4054-9076-220AC5EC03F3}" fullword
		$s1 = "urlmon" fullword
		$s2 = "Registered trademarks and service marks are the property of their" wide
		$s3 = "XpsUnregisterServer" fullword
		$s4 = "XpsRegisterServer" fullword
	condition:
		uint16(0) == 0x5A4D and ((1 of ($x*)) or (2 of ($a*) and all of ($s*)))
}
Details Yara rule 1
rule Cobra_Trojan_Stage1 {
	meta:
		description = "Cobra Trojan  Stage 1"
		author = "Florian Roth"
		reference = "https://blog.gdatasoftware.com/blog/article/analysis-of-project-cobra.html"
		date = "2015/02/18"
		hash = "a28164de29e51f154be12d163ce5818fceb69233"
	strings:
		$x1 = "KmSvc.DLL" wide fullword
		$x2 = "SVCHostServiceDll_W2K3.dll" ascii fullword
		$s1 = "Microsoft Corporation. All rights reserved." wide fullword
		$s2 = "srservice" wide fullword
		$s3 = "Key Management Service" wide fullword
		$s4 = "msimghlp.dll" wide fullword
		$s5 = "_ServiceCtrlHandler@16" ascii fullword
		$s6 = "ModuleStart" ascii fullword
		$s7 = "ModuleStop" ascii fullword
		$s8 = "5.2.3790.3959 (srv03.sp2.070216-1710)" wide fullword
	condition:
		uint16(0) == 0x5A4D and filesize < 50000 and 1 of ($x*) and 6 of ($s*)
}