Overview - Yara rules

Details Type #Events CTI Value
Details Yara rule 1
rule meta_s {
	meta:
		author = "sysopfb"
	strings:
		$snippet1 = { 66 0? EF }
		$snippet2 = { C5 ?? EF }
	condition:
		($snippet1 or $snippet2)
}
Details Yara rule 1
import "elf"

rule Kinsing_Malware {
	meta:
		author = "Aluma Lavi, CyberArk"
		date = "22-01-2021"
		version = "1.0"
		hash = "d247687e9bdb8c4189ac54d10efd29aee12ca2af78b94a693113f382619a175b"
		description = "Kinsing/NSPPS malware"
	strings:
		$rc4_key = { 37 36 34 31 35 33 34 34 36 62 36 31 }
		$firewire = "./firewire -iL $INPUT --rate $RATE -p$PORT -oL $OUTPUT"
		$packa1 = "google/btree" ascii wide
		$packa2 = "kardianos/osext" ascii wide
		$packa3 = "kelseyhightower/envconfig" ascii wide
		$packa4 = "markbates/pkger" ascii wide
		$packa5 = "nu7hatch/gouuid" ascii wide
		$packa6 = "paulbellamy/ratecounter" ascii wide
		$packa7 = "peterbourgon/diskv" ascii wide
		$func1 = "main.RC4" ascii wide
		$func2 = "main.runTaskWithScan" ascii wide
		$func3 = "main.backconnect" ascii wide
		$func4 = "main.downloadAndExecute" ascii wide
		$func5 = "main.startCmd" ascii wide
		$func6 = "main.execTaskOut" ascii wide
		$func7 = "main.minerRunningCheck" ascii wide
	condition:
		(uint16(0) == 0x457F and not (elf.sections[0].size + elf.sections[1].size + elf.sections[2].size + elf.sections[3].size + elf.sections[4].size + elf.sections[5].size + elf.sections[6].size + elf.sections[7].size > filesize)) and ($rc4_key or $firewire or all of ($packa*) or 4 of ($func*))
}
Details Yara rule 1
rule NetwireCampaign_Payload_Jun2020 {
	meta:
		description = "Yara Rule for Netwire campaign final payload Jun2020"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-06-05"
		tlp = "white"
		SHA256 = "cc419a1c36ed5bdae1d3cd35c4572766dc06ad5a447687f87e89da0bb5a42091"
		category = "informational"
	strings:
		$a1 = { C7 04 ?4 ?? ?? ?? ?? E8 6F 2C 00 00 C7 04 ?4 ?? ?? ?? ?? E8 63 2C 00 00 8B 35 }
		$a2 = { 89 84 ?4 B0 00 00 00 C7 84 ?4 A4 00 00 00 ?? ?? ?? ?? 66 C7 84 ?4 A8 00 00 00 00 00 E8 ?? ?? ?? ?? 83 EC 28 85 C0 75 27 }
		$a3 = { C7 44 ?4 0C ?? ?? ?? ?? C7 44 ?4 08 ?? ?? ?? ?? C7 04 ?4 ?? ?? ?? ?? 89 44 ?4 04 E8 39 1C 01 00 83 EC ?? }
	condition:
		uint16(0) == 0x5A4D and 2 of ($a*)
}
Details Yara rule 1
rule APT_MAL_LNX_RedMenshen_BPFDoor_Controller_Generic_May22_1 {
	meta:
		description = "Detects BPFDoor malware"
		author = "Florian Roth"
		reference = "https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896"
		date = "2022-05-09"
		score = 90
		hash1 = "07ecb1f2d9ffbd20a46cd36cd06b022db3cc8e45b1ecab62cd11f9ca7a26ab6d"
		hash2 = "1925e3cd8a1b0bba0d297830636cdb9ebf002698c8fa71e0063581204f4e8345"
		hash3 = "4c5cf8f977fc7c368a8e095700a44be36c8332462c0b1e41bff03238b2bf2a2d"
		hash4 = "591198c234416c6ccbcea6967963ca2ca0f17050be7eed1602198308d9127c78"
		hash5 = "599ae527f10ddb4625687748b7d3734ee51673b664f2e5d0346e64f85e185683"
		hash6 = "5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9"
		hash7 = "5faab159397964e630c4156f8852bcc6ee46df1cdd8be2a8d3f3d8e5980f3bb3"
		hash8 = "76bf736b25d5c9aaf6a84edd4e615796fffc338a893b49c120c0b4941ce37925"
		hash9 = "93f4262fce8c6b4f8e239c35a0679fbbbb722141b95a5f2af53a2bcafe4edd1c"
		hash10 = "96e906128095dead57fdc9ce8688bb889166b67c9a1b8fdb93d7cff7f3836bb9"
		hash11 = "97a546c7d08ad34dfab74c9c8a96986c54768c592a8dae521ddcf612a84fb8cc"
		hash12 = "c796fc66b655f6107eacbe78a37f0e8a2926f01fecebd9e68a66f0e261f91276"
		hash13 = "c80bd1c4a796b4d3944a097e96f384c85687daeedcdcf05cc885c8c9b279b09c"
		hash14 = "f47de978da1dbfc5e0f195745e3368d3ceef034e964817c66ba01396a1953d72"
		hash15 = "f8a5e735d6e79eb587954a371515a82a15883cf2eda9d7ddb8938b86e714ea27"
		hash16 = "fa0defdabd9fd43fe2ef1ec33574ea1af1290bd3d763fdb2bed443f2bd996d73"
		hash17 = "fd1b20ee5bd429046d3c04e9c675c41e9095bea70e0329bd32d7edd17ebaf68a"
	strings:
		$op1 = { C6 80 01 01 00 00 00 48 8B 45 ?8 0F B6 90 01 01 00 00 48 8B 45 ?8 88 90 00 01 00 00 C6 45 ?? 00 0F B6 45 ?? 88 45 }
		$op2 = { 48 89 55 C8 48 8B 45 C8 48 89 45 ?? 48 8B 45 C8 0F B6 80 00 01 00 00 88 45 F? 48 8B 45 C8 0F B6 80 01 01 00 00 }
		$op3 = { 48 89 45 ?? 48 8B 45 C8 0F B6 80 00 01 00 00 88 45 F? 48 8B 45 C8 0F B6 80 01 01 00 00 88 45 F? C7 45 F8 00 00 00 00 }
		$op4 = { 48 89 7D D8 89 75 D4 48 89 55 C8 48 8B 45 C8 48 89 45 ?? 48 8B 45 C8 0F B6 80 00 01 00 00 88 45 F? }
		$op5 = { 48 8B 45 ?8 C6 80 01 01 00 00 00 48 8B 45 ?8 0F B6 90 01 01 00 00 48 8B 45 ?8 88 90 00 01 00 00 C6 45 ?? 00 0F B6 45 }
		$op6 = { 89 75 D4 48 89 55 C8 48 8B 45 C8 48 89 45 ?? 48 8B 45 C8 0F B6 80 00 01 00 00 88 45 F? 48 8B 45 C8 }
	condition:
		uint16(0) == 0x457f and filesize < 200KB and 2 of them or 4 of them
}
Details Yara rule 1
import "pe"

rule Delphi_Loader_NanoCoreRAT {
	meta:
		description = "Yara Rule for Delphi Loader and embedded NanoCore RAT"
		author = "Cybaze - Yoroi ZLab"
		last_updated = "2019-06-12"
		tlp = "white"
		category = "informational"
	strings:
		$s1 = "IE(AL(\"%s\",4),\"AL(\\\"%0:s\\\",3)\",\"JK(\\\"%1:s\\\",\\\"%0:s\\\")\")"
		$a1 = "#=qP05CRmbt2pJg10eRU50wu1vx$mfteEn$pCn9SEbehP8="
		$a2 = "NanoCore"
		$a3 = { 69 73 34 31 74 49 58 4D }
		$b1 = "<*t\"<0r=<9w9i"
	condition:
		pe.number_of_resources == 73 and $s1 or 1 of ($a*) and $b1
}
Details Yara rule 1
rule ComputraceAgent {
	meta:
		description = "Absolute Computrace Agent Executable"
		thread_level = 3
		in_the_wild = true
	strings:
		$a = { D1 E0 F5 8B 4D 0C 83 D1 00 8B EC FF 33 83 C3 04 }
		$mz = { 4D 5A }
		$b1 = { 72 70 63 6E 65 74 70 2E 65 78 65 00 72 70 63 6E 65 74 70 00 }
		$b2 = { 54 61 67 49 64 00 }
	condition:
		($mz at 0) and ($a or ($b1 and $b2))
}
Details Yara rule 1
rule NK_SSL_PROXY {
	meta:
		Author = "CISA Code & Media Analysis"
		Incident = "10135536"
		Date = "2018-01-09"
		Category = "Hidden_Cobra"
		Family = "BADCALL"
		Description = "Detects NK SSL PROXY"
		MD5_1 = "C6F78AD187C365D117CACBEE140F6230"
		MD5_2 = "C01DC42F65ACAF1C917C0CC29BA63ADC"
	strings:
		$s0 = { 8B 4C 24 08 8A 14 08 80 F2 47 80 C2 28 88 14 08 40 3B C6 7C EF 5E }
		$s1 = { 56 8B 74 24 0C 33 C0 85 F6 7E 15 8B 4C 24 08 8A 14 08 80 EA 28 80 F2 47 88 14 08 40 3B C6 7C EF 5E }
		$s2 = { 47 75 40 1F 71 34 35 74 79 75 36 68 67 76 68 69 37 5E 25 24 73 64 66 }
		$s3 = { 67 68 66 67 68 6A 75 79 75 66 67 64 67 66 74 72 }
		$s4 = { 6D 2A 5E 26 5E 67 68 66 67 65 34 77 65 72 }
		$s5 = { 31 71 61 7A 58 53 44 43 32 33 77 65 }
		$s6 = "ghfghjuyufgdgftr"
		$s7 = "q45tyu6hgvhi7^%$sdf"
		$s8 = "m*^&^ghfge4wer"
	condition:
		($s0 and $s1 and $s2 and $s3 and $s4 and $s5) or ($s6 and $s7 and $s8)
}
Details Yara rule 1
rule xor_add {
	meta:
		Author = "CISA trusted 3rd party"
		Incident = "10135536"
		Date = "2018-04-19"
		Category = "Hidden_Cobra"
		Family = "n/a"
		Description = "n/a"
	strings:
		$decode = { 80 EA 28 80 F2 47 }
		$encode = { 80 F2 47 80 C2 28 }
	condition:
		uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550 and all of them
}
Details Yara rule 2
rule CISA_10382580_02 : rat {
	meta:
		Author = "CISA Code & Media Analysis"
		Incident = "10382580"
		Date = "2022-06-02"
		Last_Modified = "20220602_1200"
		Actor = "n/a"
		Category = "RAT"
		Family = "n/a"
		Description = "Detects unidentified Remote Access Tool samples"
		MD5_1 = "7b1ce3fe542c6ae2919aa94e20dc860e"
		SHA256_1 = "d071c4959d00a1ef9cce535056c6b01574d8a8104a7c3b00a237031ef930b10f"
	strings:
		$s0 = { 48 8B 06 0F B6 04 01 32 C2 F6 C1 01 75 02 34 E7 }
		$s1 = { 88 04 0F 48 FF C1 48 8B 46 08 48 3B }
		$s2 = { 0F BE CA C1 CF 0D 8D 41 E0 80 FA 61 0F 4C C1 03 }
		$s3 = { F8 4D 8D 40 01 41 0F B6 10 84 D2 }
	condition:
		all of them
}
Details Yara rule 2
import "pe"

rule Poulight_Stealer_May_2020 {
	meta:
		description = "Yara rule for Poulight Stealer"
		hash = "8ef7b98e2fc129f59dd8f23d324df1f92277fcc16da362918655a1115c74ab95"
		author = "Cybaze - Yoroi  ZLab"
		last_updated = "2020-05-07"
		tlp = "white"
		category = "informational"
	strings:
		$s1 = "http//fff.gearhostpreview.com/ARMBot"
		$s2 = "WBcG91bGxpZ2h0Lhttp://poullight.ru/keys.txt"
		$s3 = "Poullight.exe"
		$s4 = "\\wallets\\wallet.dat" ascii wide
		$s5 = "=====================================" ascii wide
		$s6 = { 2F 7B 00 30 00 7D 00 3C 00 63 00 6C 00 62 00 61 00 73 00 65 00 3E 00 7B 00 ?? 00 7D 00 3C 00 2F 00 63 00 6C 00 62 00 61 00 73 00 65 00 3E 00 }
		$s7 = "Select * from Win32_ComputerSystem" ascii wide
	condition:
		uint16(0) == 0x5A4D and all of them
}
Details Yara rule 1
import "pe"

rule unpack_flawed_ammy_downloader_win32_ {
	meta:
		author = "tcontre"
		description = "detecting flawwed ammy rat downloader"
		date = "2019-07-02"
		sha256 = "3255b1165b227c35b70908f4eed490210390281fc96913fdf96f066d019bd1c2"
	strings:
		$mz = { 4D 5A }
		$code1 = { 8B 45 FC C1 E0 07 8B 4D FC C1 E9 19 0B C1 }
		$n1 = "net user /domain" fullword
		$n2 = "net group /domain" fullword
		$s1 = "NuGets\\template_%x.TMPTMPZIP7" fullword
		$s2 = "wsus.exe" fullword
		$s3 = "Vmwaretrat.exe" wide fullword
	condition:
		($mz at 0) and $code1 and 1 of ($n*) and 1 of ($s*)
}
Details Yara rule 1
rule FireEye_21_00004531_01 : SUNSHUTTLE backdoor {
	meta:
		Author = "FireEye"
		Date = "2021-03-04"
		Last_Modified = "20210305_1704"
		Actor = "UNC2452"
		Category = "Backdoor"
		Family = "SUNSHUTTLE"
		Description = "This rule detects strings found in SUNSHUTTLE"
		MD5_1 = "9466c865f7498a35e4e1a8f48ef1dffd"
		SHA256_1 = "b9a2c986b6ad1eb4cfb0303baede906936fe96396f3cf490b0984a4798d741d8"
	strings:
		$s1 = "main.request_session_key"
		$s2 = "main.define_internal_settings"
		$s3 = "main.send_file_part"
		$s4 = "main.clean_file"
		$s5 = "main.send_command_result"
		$s6 = "main.retrieve_session_key"
		$s7 = "main.save_internal_settings"
		$s8 = "main.resolve_command"
		$s9 = "main.write_file"
		$s10 = "main.beaconing"
		$s11 = "main.wget_file"
		$s12 = "main.fileExists"
		$s13 = "main.removeBase64Padding"
		$s14 = "main.addBase64Padding"
		$s15 = "main.delete_empty"
		$s16 = "main.GetMD5Hash"
	condition:
		filesize < 10MB and uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and (5 of them)
}
Details Yara rule 1
rule FireEye_21_00004531_02 : SUNSHUTTLE backdoor {
	meta:
		Author = "FireEye"
		Date = "2021-03-04"
		Last_Modified = "20210305_1704"
		Actor = "UNC2452"
		Category = "Backdoor"
		Family = "SUNSHUTTLE"
		Description = "This rule detects strings found in SUNSHUTTLE"
		MD5_1 = "9466c865f7498a35e4e1a8f48ef1dffd"
		SHA256_1 = "b9a2c986b6ad1eb4cfb0303baede906936fe96396f3cf490b0984a4798d741d8"
	strings:
		$s1 = "LS0tLS1CRUdJTiBQUklWQVRFIEtFWS0tLS0tCk"
		$s2 = "LS0tLS1FTkQgUFJJVkFURSBLRVktLS0tLQ"
		$s3 = "Go build ID: \""
	condition:
		filesize < 10MB and uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and all of them
}
Details Yara rule 1
rule CISA_3P_10327841_03 : CHINACHOPPER webshell {
	meta:
		Author = "CISA Trusted Third Party"
		Incident = "10327841"
		Date = "2021-03-26"
		Actor = "n/a"
		Category = "Webshell"
		Family = "CHINACHOPPER"
		Description = "Detects iteration of China Chopper webshell server-side component"
	strings:
		$first_bytes = "<%"
		$replace = ".Replace(\"/*/\",\"\")" nocase
		$eval = "eval" nocase
		$toString = "tostring" nocase
		$length = "length" nocase
	condition:
		all of them
}
Details Yara rule 1
rule malware_bumblebee_packed {
	meta:
		author = "Marc Salinas @ CheckPoint Research"
		malware_family = "BumbleBee"
		date = "13/07/2022"
		description = "Detects the packer used by bumblebee, the rule is based on the code responsible for allocating memory for a critical structure in its logic."
		dll_jul = "6bc2ab410376c1587717b2293f2f3ce47cb341f4c527a729da28ce00adaaa8db"
		dll_jun = "82aab01a3776e83695437f63dacda88a7e382af65af4af1306b5dbddbf34f9eb"
		dll_may = "a5bcb48c0d29fbe956236107b074e66ffc61900bc5abfb127087bb1f4928615c"
		iso_jul = "ca9da17b4b24bb5b24cc4274cc7040525092dffdaa5922f4a381e5e21ebf33aa"
		iso_jun = "13c573cad2740d61e676440657b09033a5bec1e96aa1f404eed62ba819858d78"
		iso_may = "b2c28cdc4468f65e6fe2f5ef3691fa682057ed51c4347ad6b9672a9e19b5565e"
		zip_jun = "7024ec02c9670d02462764dcf99b9a66b29907eae5462edb7ae974fe2efeebad"
		zip_may = "68ac44d1a9d77c25a97d2c443435459d757136f0d447bfe79027f7ef23a89fce"
	strings:
		$heapalloc = { 48 8? EC [1-6] FF 15 ?? ?? 0? 00 [0-5] 33 D2 4? [2-5] 4? ?? ?? FF 15 ?? ?? 0? 00 [8-11] 48 89 05 ?? ?? ?? 00 E8 ?? ?? ?? ?? 4? 8B ?? ?? ?? ?? 00 }
	condition:
		$heapalloc
}
Details Yara rule 1
rule CISA_10443863_03 : backdoor remote_access_trojan webshell exploitation information_gathering remote_access accesses_remote_machines anti_debugging captures_system_state_data controls_local_machine compromises_data_availability compromises_data_integrity fingerprints_host installs_other_components {
	meta:
		Author = "CISA Code & Media Analysis"
		Incident = "10443863"
		Date = "2023-05-16"
		Last_Modified = "20230605_1500"
		Actor = "n/a"
		Family = "n/a"
		Capabilities = "accesses-remote-machines anti-debugging captures-system-state-data controls-local-machine compromises-data-availability compromises-data-integrity fingerprints-host installs-other-components"
		Malware_Type = "backdoor remote-access-trojan webshell"
		Tool_Type = "exploitation information-gathering remote-access"
		Description = "Detects .NET DLL webshell samples"
		SHA256 = "b63c95300c8e36b5e6d3393da12931683796f88fd4601ba8364658b4d12ac05b"
	strings:
		$s0 = { 53 00 65 00 6C 00 65 00 63 00 74 00 20 00 2A 00 20 00 66 00 72 00 6F 00 6D 00 20 00 57 00 69 00 6E 00 33 00 32 00 5F 00 50 00 72 00 6F 00 63 00 65 00 73 00 73 }
		$s1 = { 62 61 73 65 36 34 ( 44 | 64 ) 65 63 6F 64 65 }
		$s2 = { 53 00 45 00 4C 00 45 00 43 00 54 00 20 00 2A 00 20 00 46 00 52 00 4F 00 4D }
		$s3 = { 49 00 49 00 53 00 20 00 41 00 50 00 50 00 50 00 4F 00 4F 00 4C }
		$s4 = { 4D 61 6E 61 67 65 6D 65 6E 74 4F 62 6A 65 63 74 }
		$s5 = { 43 72 65 61 74 65 4E 6F 57 69 6E 64 6F 77 }
		$s6 = { 73 71 6C 71 75 65 72 79 }
	condition:
		all of them
}
Details Yara rule 1
import "vt"

rule aws_monitor {
	condition:
		vt.net.domain.new_domain and (vt.net.url.favicon.dhash == "4026d4f494f8738c" or vt.net.url.favicon.dhash == "c8e3b88aaa88cbf8" or for any link in vt.net.url.outgoing_links : ( link matches /signin.aws.amazon\.com.*/ ) or vt.net.domain.raw matches /aws/)
}
Details Yara rule 1
import "pe"
import "hash"

rule generic_carbon {
	strings:
		$s1 = "ModStart"
		$s2 = "STOP|OK"
		$s3 = "STOP|KILL"
	condition:
		(uint16(0) == 0x5a4d) and all of them
}
Details Yara rule 1
import "pe"

rule carbon_metadata {
	condition:
		(pe.version_info["InternalName"] contains "SERVICE.EXE" or pe.version_info["InternalName"] contains "MSIMGHLP.DLL" or pe.version_info["InternalName"] contains "MSXIML.DLL") and pe.version_info["CompanyName"] contains "Microsoft Corporation" and not (tags contains "signed")
}
Details Yara rule 1
rule carbon_2016_filenames {
	condition:
		file_name contains "wkstrend.xml" or file_name contains "cifrado.xml" or file_name contains "fsbootfail.dat" or file_name contains "encodebase.inf" or file_name contains "zcerterror.png" or file_name contains "mkfieldsec.dll"
}
Details Yara rule 1
rule hz_rat {
	strings:
		$x_mutex = "91E99696-92CC-43F4-99B0-774D80BDAA6B"
		$x_pdb_path_2_8_2__and_2_9_0 = "D:\\WORKSPACE\\HZ_"
		$x_pdb_path_2_9_1 = "D:\\WORKSPACE\\HP\\HZ_"
		$x_pdf_path = "C:\\Users\\dell\\source\\repos\\WindowsProject2\\Release\\WindowsProject1.pdb"
		$x_pdb_path_short_part = "hp_client_win"
		$x_wrongly_written_error_msg = "instanse already exist."
	condition:
		any of them
}
Details Yara rule 1
rule hz_rat_aes_packer {
	strings:
		$decryption_body_747 = { 8D 44 24 1C 89 04 24 E8 84 ED 00 00 E8 DF DE 00 00 C7 44 24 08 10 00 00 00 C7 44 24 04 20 30 41 00 8D 44 24 54 89 04 24 C7 44 24 20 01 00 00 00 E8 B7 00 00 00 C7 84 24 3C 02 00 00 00 00 00 00 C7 84 24 38 02 00 00 00 00 00 00 EB 4B 8B 84 24 38 02 00 00 C1 E0 04 8D 90 40 30 41 00 8B 84 24 38 02 00 00 C1 E0 04 05 40 30 41 00 89 54 24 08 89 44 24 04 8D 44 24 54 89 04 24 C7 44 24 20 01 00 00 00 E8 E9 0E 00 00 83 84 24 3C 02 00 00 10 83 84 24 38 02 00 00 01 81 BC 24 3C 02 00 00 ?? ?? ?? 00 76 A8 B8 40 30 41 00 C7 44 24 20 01 00 00 00 FF D0 B8 00 00 00 00 89 44 24 18 EB 14 8B }
		$decryption_body_748 = { 55 89 E5 5D C3 90 90 90 90 90 90 90 90 90 90 90 8D 4C 24 04 83 E4 F0 FF 71 FC 55 89 E5 57 56 53 51 81 EC 68 02 00 00 C7 85 CC FD FF FF 80 24 41 00 C7 85 D0 FD FF FF 3C 2B 41 00 8D 85 D4 FD FF FF 8D 4D E8 89 08 BA 28 17 40 00 89 50 04 89 60 08 8D 85 B4 FD FF FF 89 04 24 E8 51 EE 00 00 E8 AC DF 00 00 C7 44 24 08 10 00 00 00 C7 44 24 04 20 30 41 00 8D 85 F0 FD FF FF 89 04 24 C7 85 B8 FD FF FF 01 00 00 00 E8 78 01 00 00 C7 45 E4 00 00 00 00 C7 45 E0 00 00 00 00 EB 3F 8B 45 E0 C1 E0 04 8D 90 40 30 41 00 8B 45 E0 C1 E0 04 05 40 30 41 00 89 54 24 08 89 44 24 04 8D 85 F0 FD FF FF 89 04 24 C7 85 B8 FD FF FF 01 00 00 00 E8 B6 0F 00 00 83 45 E4 10 83 45 E0 01 81 7D E4 ?? ?? ?? 00 76 B8 A1 5C 71 45 00 C7 85 B8 FD FF FF 01 }
	condition:
		any of them
}
Details Yara rule 1
rule MaliciousInfra_IP_Detection {
	meta:
		description = "Detection of known IP addresses associated with Transparent Tribe"
		author = "CRT"
	strings:
		$ip1 = "143.198.64.151"
		$ip2 = "165.232.118.207"
		$ip3 = "161.35.186.219"
		$ip4 = "178.128.92.166"
		$ip5 = "64.23.155.109"
		$ip6 = "159.203.133.189"
		$ip7 = "138.197.156.131"
		$ip8 = "142.93.74.10"
		$ip9 = "152.42.245.111"
		$ip10 = "139.59.109.136"
		$ip11 = "137.184.211.26"
		$ip12 = "159.223.0.196"
		$ip13 = "64.23.213.61"
		$ip14 = "152.42.198.168"
		$ip15 = "206.189.134.185"
	condition:
		any of ($ip*)
}
Details Yara rule 1
import "hash"
import "pe"

rule ransomware_blackkingdom {
	meta:
		description = "Rule to detect Black Kingdom ransomware"
		author = "Kaspersky Lab"
		copyright = "Kaspersky Lab"
		distribution = "DISTRIBUTION IS FORBIDDEN. DO NOT UPLOAD TO ANY MULTISCANNER OR SHARE ON ANY THREAT INTEL PLATFORM"
		version = "1.0"
		last_modified = "2021-05-02"
		hash = "866b1f5c5edd9f01c5ba84d02e94ae7c1f9b2196af380eed1917e8fc21acbbdc"
		hash = "910fbfa8ef4ad7183c1b5bdd3c9fd1380e617ca0042b428873c48f71ddc857db"
	condition:
		hash.sha256(pe.rich_signature.clear_data) == "0e7d0db29c7247ae97591751d3b6c0728aed0ec1b1f853b25fc84e75ae12b7b8"
}
Details Yara rule 1
rule APT_MAL_LNX_RedMenshen_BPFDoor_Controller_May22_1 {
	meta:
		description = "Detects unknown Linux implants (uploads from KR and MO)"
		author = "Florian Roth"
		reference = "https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896"
		date = "2022-05-05"
		score = 90
		hash1 = "07ecb1f2d9ffbd20a46cd36cd06b022db3cc8e45b1ecab62cd11f9ca7a26ab6d"
		hash2 = "4c5cf8f977fc7c368a8e095700a44be36c8332462c0b1e41bff03238b2bf2a2d"
		hash3 = "599ae527f10ddb4625687748b7d3734ee51673b664f2e5d0346e64f85e185683"
		hash4 = "5b2a079690efb5f4e0944353dd883303ffd6bab4aad1f0c88b49a76ddcb28ee9"
		hash5 = "5faab159397964e630c4156f8852bcc6ee46df1cdd8be2a8d3f3d8e5980f3bb3"
		hash6 = "93f4262fce8c6b4f8e239c35a0679fbbbb722141b95a5f2af53a2bcafe4edd1c"
		hash7 = "97a546c7d08ad34dfab74c9c8a96986c54768c592a8dae521ddcf612a84fb8cc"
		hash8 = "c796fc66b655f6107eacbe78a37f0e8a2926f01fecebd9e68a66f0e261f91276"
		hash9 = "f8a5e735d6e79eb587954a371515a82a15883cf2eda9d7ddb8938b86e714ea27"
		hash10 = "fd1b20ee5bd429046d3c04e9c675c41e9095bea70e0329bd32d7edd17ebaf68a"
	strings:
		$s1 = "[-] Connect failed." ascii fullword
		$s2 = "export MYSQL_HISTFILE=" ascii fullword
		$s3 = "udpcmd" ascii fullword
		$s4 = "getshell" ascii fullword
		$op1 = { E8 ?? FF FF FF 80 45 EE 01 0F B6 45 EE 3B 45 D4 7C 04 C6 45 EE 00 80 45 FF 01 80 7D FF 00 }
		$op2 = { 55 48 89 E5 48 83 EC 30 89 7D EC 48 89 75 E0 89 55 DC 83 7D DC 00 75 0? }
		$op3 = { E8 A? FE FF FF 0F B6 45 F6 48 03 45 E8 0F B6 10 0F B6 45 F7 48 03 45 E8 0F B6 00 8D 04 02 }
		$op4 = { C6 80 01 01 00 00 00 48 8B 45 C8 0F B6 90 01 01 00 00 48 8B 45 C8 88 90 00 01 00 00 C6 45 EF 00 0F B6 45 EF 88 45 EE }
	condition:
		uint16(0) == 0x457f and filesize < 80KB and 2 of them or 5 of them
}