Details |
Yara rule |
1 |
|
rule CheekyChipmunk_amsi_avoidance_strings {
meta:
author = "NCSC"
description = "Detects Cheeky Chipmunk loader AMSI avoidance
strings"
date = "2022-01-24"
hash1 = "50c0bf9479efc93fa9cf1aa99bdca923273b71a1"
strings:
$functionname = "FindAmsiFun"
$x86found = "x32 protection detected"
$x64found = "x64 protection detected"
condition:
all of them
} |
Details |
Yara rule |
1 |
|
rule CheekyChipmunk_namedpipe_stackstring {
meta:
author = "NCSC"
description = "Detects stack string for Cheeky Chipmunk named
pipe"
date = "2022-01-24"
hash1 = "52c8cbd0545caab7596c1382c7fc5a479209851d"
strings:
$stackstring = { B8 5C 00 00 00 66 89 84 24 80 00 00 00 B8 70 00 00 00 66 89 84 24 82 00 00 00 B8 69 00 00 00 66 89 84 24 84 00 00 00 B8 70 00 00 00 66 89 84 24 86 00 00 00 B8 65 00 00 00 66 89 84 24 88 00 00 00 B8 5C 00 00 00 66 89 84 24 8A 00 00 00 B8 70 00 00 00 66 89 84 24 8C 00 00 00 B8 6E 00 00 00 66 89 84 24 8E 00 00 00 B8 72 00 00 00 66 89 84 24 90 00 00 00 B8 73 00 00 00 66 89 84 24 92 00 00 00 B8 76 00 00 00 66 89 84 24 94 00 00 00 B8 63 00 00 00 66 89 84 24 96 00 00 00 33 C0 66 89 84 24 98 00 00 00 }
condition:
uint16(0) == 0x5A4D and uint32(uint32(0x3c)) == 0x00004550 and all of them
} |
Details |
Yara rule |
1 |
|
rule CheekyChipmunk_xor_function_code {
meta:
author = "NCSC"
description = "Detects Cheeky Chipmunk XOR function"
date = "2022-01-24"
hash1 = "52c8cbd0545caab7596c1382c7fc5a479209851d"
strings:
$funccode = { 8B 44 24 04 48 8B 4C 24 20 0F B6 04 01 8B 0C 24 03 C8 8B C1 89 04 24 8B 44 24 04 48 8B 4C 24 20 0F B6 04 01 83 F0 55 8B 4C 24 04 48 8B 54 24 20 88 04 0A B8 01 00 00 00 48 6B C0 00 48 8B 4C 24 20 0F B6 04 01 8B 0C 24 03 C8 8B C1 89 04 24 }
condition:
uint16(0) == 0x5A4D and uint32(uint32(0x3c)) == 0x00004550 and all of them
} |
Details |
Yara rule |
1 |
|
rule GootLoader_Malware {
strings:
$a = "GootLoader" ascii wide nocase
condition:
$a
} |
Details |
Yara rule |
1 |
|
rule apt_NK_Lazarus_Fall2017_payload_minCondition {
meta:
desc = "Minimal condition set to detect payloads from Fall 2017 Lazarus
Campaign against Cryptocurrency Exchanges and Friends of MOFA 11"
author = "JAGS, Insikt Group, Recorded Future"
version = "2.0"
TLP = "Green"
md5 = "46d1d1f6e396a1908471e8a8d8b38417"
md5 = "6b061267c7ddeb160368128a933d38be"
md5 = "afa40517d264d1b03ac5c4d2fef8fc32"
md5 = "c270eb96deaf27dd2598bc4e9afd99da"
md5 = "d897b4b8e729a408f64911524e8647db"
md5 = "e1cc2dcb40e729b2b61cf436d20d8ee5"
strings:
$sub1800115A0 = { 48 8D 54 24 60 48 8D 8D B0 05 00 00 41 FF 94 24 88 20 00 00 4C 8B E8 48 83 F8 FF 0F 84 EA 01 00 00 48 8D 8D C0 07 00 00 33 D2 41 B8 00 40 00 00 E8 }
$sub18000A720 = { 33 C0 48 8B BC 24 98 02 00 00 48 8B 9C 24 90 02 00 00 48 8B 8D 60 01 00 00 48 33 CC E8 }
condition:
uint16(0) == 0x5A4D and filesize < 5MB and any of them
} |
Details |
Yara rule |
1 |
|
rule apt_ext4_linuxlistener {
meta:
description = "Detects Unique Linux Backdoor, Ext4"
author = "Insikt Group, Recorded Future"
TLP = "White"
date = "2018-08-14"
md5_x64 = "d08de00e7168a441052672219e717957"
strings:
$s1 = "rm /tmp/0baaf161db39"
$op1 = { 3C 61 0F }
$op2 = { 3C 6E 0F }
$op3 = { 3C 74 0F }
$op4 = { 3C 69 0F }
$op5 = { 3C 3A 0F }
condition:
all of them
} |
Details |
Yara rule |
1 |
|
import "pe"
rule APT_VN_APT32_DLLSideloading_Oct2020 {
meta:
description = "Track DLL Sideloading Technique Used by APT32/OceanLotus in October 2020"
author = "Insikt Group, Recorded Future"
hash1 = "d873bdb08c45378650761bad71df7418c7b542adb13ccd4a87df2001801f4808"
hash2 = "75c61d9d8da4a87882ccdd37b664953c10a186b5545c5152fd1b6bf788a1a846"
date = "2020-10-22"
strings:
$s1 = "SoftwareUpdateFilesLocalized.dll"
$s2 = "SoftwareUpdateFiles.locale" wide
$s3 = "This indicates a bug in your application."
condition:
uint16(0) == 0x5a4d and filesize < 60KB and ((all of them and pe.timestamp == 4294967295000) or pe.imphash() == "3937374c70baa93e1fd75d8e894faf94" or pe.rich_signature.key == 0x6597ead6)
} |
Details |
Yara rule |
1 |
|
rule YARA_CN_APT10_Trochilus_RC4Salsa20_decrypted_payload {
meta:
description = "Rule to identify Trochilus variant configured with RC4+Salsa20 encrypted C2 comms used by APT10 in 2018"
author = "Insikt Group, Recorded Future"
tlp = "white"
date = "2019-01-10"
hash1 = "42b5eb1f77a25ad73202d3be14e1833ef0502b0b6ae7ab54f5d4b5c2283429c6"
strings:
$s1 = "NASDKJF7832Hnkjsadf878UHds89iujkhNHKJDHJDH8UIYE98uihwjshewde8w"
$s2 = "www.miphomanager.com"
$s3 = { 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 10 }
$s4 = { 65 06 06 67 06 08 69 06 0A 6B 06 0C }
condition:
(uint16(0) == 0x5a4d and filesize < 1000KB and (2 of them))
} |
Details |
Yara rule |
1 |
|
import "pe"
rule YARA_CN_APT10_Trochilus_vcruntime140_dll_injector {
meta:
description = "Malicious DLL vcruntime140.dll launched using benign CASTSP.exe to inject encrypted shellcode containing
Trochilus payload"
author = "Insikt Group, Recorded Future"
tlp = "white"
date = "2019-01-16"
hash1 = "eed0c7f7d36e75382c83e945a8b00abf01d3762b973c952dec05ceccb34b487d"
strings:
$s1 = "vcruntime140.dll" ascii fullword
$s2 = "AppPolicyGetProcessTerminationMethod" ascii fullword
$s3 = "CASTSP.exe" ascii fullword
$s4 = "operator co_await" ascii fullword
$s5 = "api-ms-win-appmodel-runtime-l1-1-2" wide fullword
$s6 = "<!<(<3<=<E<" ascii fullword
$s7 = "RUTLFJPBTJSFZZAOJTYP" ascii fullword
condition:
uint16(0) == 0x5a4d and filesize < 300KB and (pe.imphash() == "c326c208bc65e6309413d8e699062a39" or all of them)
} |
Details |
Yara rule |
1 |
|
import "pe"
rule YARA_CN_APT10_Trochilus_version_dll_injector {
meta:
description = "Malicious DLL version.dll launched using benign CASTSP.exe to inject encrypted shellcode containing
Trochilus payload"
author = "Insikt Group, Recorded Future"
tlp = "white"
date = "2019-01-16"
hash1 = "10182f0e64b765db989c158402c76eb1e0e862cab407f7c5cec133d8e5cb73e3"
strings:
$s1 = "AppPolicyGetProcessTerminationMethod" ascii fullword
$s2 = "CASTSP.exe" ascii fullword
$s3 = "(p!xLq {Lp Lq h*r!iLq h*t!`Lq h*u!tLq G+y!~Lq G+u!xLq G+q!zLq G+s!zLq Rich{Lq " ascii fullword
$s4 = "operator co_await" ascii fullword
$s5 = "api-ms-win-appmodel-runtime-l1-1-2" wide fullword
$s6 = "CZYSOYKPOIKKZGUFOIUI" ascii fullword
condition:
uint16(0) == 0x5a4d and filesize < 300KB and (pe.imphash() == "0df4d1c641594cfb0df9e8869fa35db8" or all of them)
} |
Details |
Yara rule |
1 |
|
rule Generic_PDF_Contains_Batch_Script {
strings:
$pdf_anchor = "PDF Comment '%PDF"
$bat_1 = /\\b[a-z0-9]+\\.bat/ nocase
condition:
$pdf_anchor at 0 and any of ($bat_*)
} |
Details |
Yara rule |
1 |
|
rule Generic_PDF_Contains_VBScript {
strings:
$pdf_anchor = "PDF Comment '%PDF"
$vb_1 = /\\b[a-z0-9]+\\.vbs/ nocase
condition:
$pdf_anchor at 0 and any of ($vb_*)
} |
Details |
Yara rule |
1 |
|
rule Generic_PDF_Contains_PowerShell_Reference {
strings:
$pdf_anchor = "PDF Comment '%PDF"
$ps_1 = "powershell" nocase
condition:
$pdf_anchor at 0 and any of ($ps_*)
} |
Details |
Yara rule |
2 |
|
rule wellmail_unique_strings {
meta:
description = "Rule for detection of WellMail based on unique strings
contained in the binary"
author = "NCSC"
hash = "0c5ad1e8fe43583e279201cdb1046aea742bae59685e6da24e963a41df987494"
strings:
$a = "C:\\Server\\Mail\\App_Data\\Temp\\agent.sh\\src"
$b = "C:/Server/Mail/App_Data/Temp/agent.sh/src/main.go"
$c = "HgQdbx4qRNv"
$d = "042a51567eea19d5aca71050b4535d33d2ed43ba"
$e = "main.zipit"
$f = "@[^\\s]+?\\s(?P<tar>.*?)\\s"
condition:
uint32(0) == 0x464C457F and 3 of them
} |