Overview - Yara rules

Details Type #Events CTI Value
Details Yara rule 1
rule Windows_Trojan_DoorMe {
	meta:
		author = "Elastic Security"
		creation_date = "2022-12-09"
		last_modified = "2022-12-15"
		os = "Windows"
		arch = "x86"
		category_type = "Trojan"
		family = "DoorMe"
		threat_name = "Windows.Trojan.DoorMe"
		reference_sample = "96b226e1dcfb8ea2155c2fa508125472c8c767569d009a881ab4c39453e4fe7f"
	strings:
		$seq_aes_crypto = { 8B 6C 24 ?? C1 E5 ?? 8B 5C 24 ?? 8D 34 9D ?? ?? ?? ?? 0F B6 04 31 32 44 24 ?? 88 04 29 8D 04 9D ?? ?? ?? ?? 0F B6 04 01 32 44 24 ?? 88 44 29 ?? 8D 04 9D ?? ?? ?? ?? 0F B6 04 01 44 30 F8 88 44 29 ?? 8D 04 9D ?? ?? ?? ?? 0F B6 04 01 44 30 E0 88 44 29 ?? 8B 74 24 ?? }
		$seq_copy_str = { 48 8B 44 24 ?? 48 89 58 ?? 48 89 F1 4C 89 F2 49 89 D8 E8 ?? ?? ?? ?? C6 04 1E ?? }
		$seq_md5 = { 89 F8 44 21 C8 44 89 C9 F7 D1 21 F1 44 01 C0 01 C8 44 8B AC 24 ?? ?? ?? ?? 8B 9C 24 ?? ?? ?? ?? 48 89 B4 24 ?? ?? ?? ?? 44 89 44 24 ?? 46 8D 04 28 41 81 C0 ?? ?? ?? ?? 4C 89 AC 24 ?? ?? ?? ?? 41 C1 C0 ?? 45 01 C8 44 89 C1 44 21 C9 44 89 C2 F7 D2 21 FA 48 89 BC 24 ?? ?? ?? ?? 8D 2C 1E 49 89 DC 01 D5 01 E9 81 C1 ?? ?? ?? ?? C1 C1 ?? 44 01 C1 89 CA 44 21 C2 89 CD F7 D5 44 21 CD 8B 84 24 ?? ?? ?? ?? 48 89 44 24 ?? 8D 1C 07 01 EB 01 DA 81 C2 ?? ?? ?? ?? C1 C2 ?? }
		$seq_calc_key = { 31 FF 48 8D 1D ?? ?? ?? ?? 48 83 FF ?? 4C 89 F8 77 ?? 41 0F B6 34 3E 48 89 F1 48 C1 E9 ?? 44 0F B6 04 19 BA ?? ?? ?? ?? 48 89 C1 E8 ?? ?? ?? ?? 83 E6 ?? 44 0F B6 04 1E BA ?? ?? ?? ?? 48 8B 4D ?? E8 ?? ?? ?? ?? 48 83 C7 ?? }
		$seq_base64 = { 8A 45 ?? 8A 4D ?? C0 E0 ?? 89 CA C0 EA ?? 80 E2 ?? 08 C2 88 55 ?? C0 E1 ?? 8A 45 ?? C0 E8 ?? 24 ?? 08 C8 88 45 ?? 41 83 C4 ?? 31 F6 44 39 E6 7D ?? 66 90 }
		$str_0 = ".?AVDoorme@@" ascii fullword
	condition:
		3 of ($seq*) or 1 of ($str*)
}
Details Yara rule 2
rule CyclopsBlink_module_initialisation {
	meta:
		author = "NCSC"
		description = "Detects the code bytes used to initialise the modules 
built into Cyclops Blink"
		hash1 = "3adf9a59743bc5d8399f67cab5eb2daf28b9b863"
		hash2 = "c59bc17659daca1b1ce65b6af077f86a648ad8a8"
	strings:
		$ = { 94 21 FF F0 93 E1 00 08 7C 3F 0B 78 38 00 00 ?? 7C 03 03 78 81 61 00 00 8E EB FF F8 7D 61 5B 78 4E 80 00 20 }
	condition:
		(uint32(0) == 0x464c457f) and (any of them)
}
Details Yara rule 1
rule CyclopsBlink_modified_install_upgrade {
	meta:
		author = "NCSC"
		description = "Detects notable strings identified within the modified 
install_upgrade executable, embedded within Cyclops Blink"
		hash1 = "3adf9a59743bc5d8399f67cab5eb2daf28b9b863"
		hash2 = "c59bc17659daca1b1ce65b6af077f86a648ad8a8"
		hash3 = "7d61c0dd0cd901221a9dff9df09bb90810754f10"
		hash4 = "438cd40caca70cafe5ca436b36ef7d3a6321e858"
	strings:
		$ = "/pending/%010lu_%06d_%03d_p1"
		$ = "/pending/sysa_code_dir/test_%d_%d_%d_%d_%d_%d"
		$ = "etaonrishdlcupfm"
		$ = "/pending/WGUpgrade-dl.new"
		$ = "/pending/bin/install_upgraded"
		$ = { 38 80 4C 00 }
		$ = { 38 80 4C 05 }
		$ = { 38 80 4C 04 }
		$ = { 3C 00 48 4D 60 00 41 43 90 09 00 00 }
	condition:
		(uint32(0) == 0x464c457f) and (6 of them)
}
Details Yara rule 1
rule CyclopsBlink_core_command_check {
	meta:
		author = "NCSC"
		description = "Detects the code bytes used to test the command ID 
being sent to the core component of Cyclops Blink"
		hash1 = "3adf9a59743bc5d8399f67cab5eb2daf28b9b863"
		hash2 = "c59bc17659daca1b1ce65b6af077f86a648ad8a8"
	strings:
		$cmd_check = { 81 3F 00 18 88 09 00 05 54 00 06 3E 2F 80 00 ( 07 | 0A | 0B | 0C | 0D ) }
	condition:
		(uint32(0) == 0x464c457f) and (#cmd_check == 5)
}
Details Yara rule 1
rule EXP_CVE_2020_35730 {
	meta:
		author = "Insikt Group, Recorded Future"
		date = "2023-06-13"
		description = "Detects CVE-2020-35730 use in EML files"
		version = "1"
	strings:
		$ = "[<script>" base64
		$ = "</script>]:##str_replacement_" base64
		$ = "From:"
		$ = "To:"
		$ = "Subject:"
	condition:
		all of them
}
Details Yara rule 1
rule CyclopsBlink_handle_mod_0xf_command {
	meta:
		author = "NCSC"
		description = "Detects the code bytes used to check module ID 0xf 
control flags and a format string used for file content upload"
		hash1 = "3adf9a59743bc5d8399f67cab5eb2daf28b9b863"
		hash2 = "c59bc17659daca1b1ce65b6af077f86a648ad8a8"
	strings:
		$ = { 54 00 06 3E 54 00 07 FE 54 00 06 3E 2F 80 00 00 }
		$ = { 54 00 06 3E 54 00 07 BC 2F 80 00 00 }
		$ = { 54 00 06 3E 54 00 07 7A 2F 80 00 00 }
		$ = { 54 00 06 3E 54 00 06 F6 2F 80 00 00 }
		$ = "file:%s\n" fullword
	condition:
		(uint32(0) == 0x464c457f) and (all of them)
}
Details Yara rule 1
rule CyclopsBlink_handle_mod_0x51_command {
	meta:
		author = "NCSC"
		description = "Detects the code bytes used to check commands sent to 
module ID 0x51 and notable strings relating to the Cyclops Blink update 
process"
		hash1 = "3adf9a59743bc5d8399f67cab5eb2daf28b9b863"
		hash2 = "c59bc17659daca1b1ce65b6af077f86a648ad8a8"
	strings:
		$cmd_check = { 88 1F [2] 54 00 06 3E 2F 80 00 ( 01 | 02 | 03 ) }
		$path1 = "/etc/wg/configd-hash.xml"
		$path2 = "/etc/wg/config.xml"
		$mnt_arg1 = "ext2"
		$mnt_arg2 = "errors=continue"
		$mnt_arg3 = { 38 C0 0C 20 }
		$mnt_arg4 = { 38 C0 0C 21 }
	condition:
		(uint32(0) == 0x464c457f) and (#cmd_check == 3) and ((@cmd_check[3] - @cmd_check[1]) < 0x200) and (all of ($path*)) and (all of ($mnt_arg*))
}
Details Yara rule 1
rule APT28_Graphite_62333_00028 : RUSSIAN THREAT GROUP {
	meta:
		description = "Detects Fancy Bear Graphite variant through internal strings"
		author = "Cluster25"
		tlp = "white"
		hash1 = "34aca02d3a4665f63fddb354551b5eff5a7e8877032ddda6db4f5c42452885ad"
	strings:
		$ = "_LL_x64.dll" ascii fullword
		$ = "qqhqx!iwwU1ptzd1WngCv9BCmVtxgFTJBPR1bJ2Ze17e0N6W3VHZC2FQOOUhu4nQ2Wrj0qLEBowQ$$"
		$ = "62272a08-fe9d-4825-bc65-203842ff92bc" ascii fullword
		$ = "%s d sp. %s" ascii fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 100KB and all of them
}
Details Yara rule 1
rule APT_MAL_LNX_Turla_Apr202004_1 {
	meta:
		description = "Detects Turla Linux malware x64 x32"
		date = "2020-04-24"
		hash1 = "67d9556c695ef6c51abf6fbab17acb3466e3149cf4d20cb64d6d34dc969b6502"
		hash2 = "8ccc081d4940c5d8aa6b782c16ed82528c0885bbb08210a8d0a8c519c54215bc"
		hash3 = "8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667"
		hash4 = "1d5e4466a6c5723cd30caf8b1c3d33d1a3d4c94c25e2ebe186c02b8b41daf905"
		hash5 = "2dabb2c5c04da560a6b56dbaa565d1eab8189d1fa4a85557a22157877065ea08"
		hash6 = "3e138e4e34c6eed3506efc7c805fce19af13bd62aeb35544f81f111e83b5d0d4"
		hash7 = "5a204263cac112318cd162f1c372437abf7f2092902b05e943e8784869629dd8"
		hash8 = "8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667"
		hash9 = "d49690ccb82ff9d42d3ee9d7da693fd7d302734562de088e9298413d56b86ed0"
	strings:
		$s1 = "/root/.hsperfdata" ascii fullword
		$s2 = "Desc|     Filename     |  size  |state|" ascii fullword
		$s3 = "VS filesystem: %s" ascii fullword
		$s4 = "File already exist on remote filesystem !" ascii fullword
		$s5 = "/tmp/.sync.pid" ascii fullword
		$s6 = "rem_fd: ssl " ascii fullword
		$s7 = "TREX_PID=%u" ascii fullword
		$s8 = "/tmp/.xdfg" ascii fullword
		$s9 = "__we_are_happy__" ascii fullword
		$s10 = "/root/.sess" ascii fullword
		$s11 = "ZYSZLRTS^Z@@NM@@G_Y_FE" ascii fullword
	condition:
		uint16(0) == 0x457f and filesize < 5000KB and 4 of them
}
Details Yara rule 1
rule APT_MAL_LNX_Turla_Apr202004_1_opcode {
	meta:
		description = "Detects Turla Linux malware x64 x32"
		date = "2020-04-24"
		hash1 = "67d9556c695ef6c51abf6fbab17acb3466e3149cf4d20cb64d6d34dc969b6502"
		hash2 = "8ccc081d4940c5d8aa6b782c16ed82528c0885bbb08210a8d0a8c519c54215bc"
		hash3 = "8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667"
		hash4 = "1d5e4466a6c5723cd30caf8b1c3d33d1a3d4c94c25e2ebe186c02b8b41daf905"
		hash5 = "2dabb2c5c04da560a6b56dbaa565d1eab8189d1fa4a85557a22157877065ea08"
		hash6 = "3e138e4e34c6eed3506efc7c805fce19af13bd62aeb35544f81f111e83b5d0d4"
		hash7 = "5a204263cac112318cd162f1c372437abf7f2092902b05e943e8784869629dd8"
		hash8 = "8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667"
		hash9 = "d49690ccb82ff9d42d3ee9d7da693fd7d302734562de088e9298413d56b86ed0"
	strings:
		$op0 = { 8D 41 05 32 06 48 FF C6 88 81 E0 80 69 00 }
		$op1 = { 48 FF C1 48 83 F9 49 75 E9 }
		$op2 = { C7 05 9B 7D 29 00 1D 00 00 00 C7 05 2D 7B 29 00 65 74 68 30 C6 05 2A 7B 29 00 00 E8 }
		$op3 = { BF FF FF FF FF E8 96 9D 0A 00 90 90 90 90 90 90 90 90 90 90 89 F0 }
		$op4 = { 88 D3 80 C3 05 32 9A C1 D6 0C 08 88 9A 60 A1 0F 08 42 83 FA 08 76 E9 }
		$op5 = { 8B 8D 50 DF FF FF B8 09 00 00 00 89 44 24 04 89 0C 24 E8 DD E5 02 00 }
		$op6 = { 8D 5A 05 32 9A 60 26 0C 08 88 9A 20 F4 0E 08 42 83 FA 48 76 EB }
		$op7 = { 8D 4A 05 32 8A 25 26 0C 08 88 8A 20 F4 0E 08 42 83 FA 08 76 EB }
	condition:
		uint16(0) == 0x457f and filesize < 5000KB and 2 of them
}
Details Yara rule 1
rule SideWinderRTF {
	meta:
		author = "AT&T Alien Labs"
		description = "Detects SideWinder RTF Files"
		reference = "https://otx.alienvault.com/pulse/5f21d5b84d529ed134127a66"
	strings:
		$s1 = { 42 31 30 43 46 31 33 30 35 41 39 37 33 37 46 45 45 33 36 30 35 36 36 38 37 42 44 31 39 42 44 36 33 31 44 39 35 35 45 36 39 44 46 31 46 45 30 45 31 42 35 37 31 43 43 41 43 46 33 42 37 37 41 43 36 30 43 45 38 31 43 41 46 36 30 30 33 32 35 42 34 44 31 31 38 43 36 36 34 41 31 35 43 34 46 37 45 46 37 }
		$s2 = { 30 30 36 31 30 30 30 31 30 35 30 30 30 30 30 30 30 30 30 30 30 30 7D 7B 5C 72 65 73 75 6C 74 20 20 7D 7D 7B 5C 6F 62 6A 65 63 74 5C 6F 62 6A }
		$s3 = { 44 33 43 30 43 37 31 32 39 42 39 42 32 35 37 46 42 39 42 43 41 42 38 36 38 36 46 36 46 39 43 38 45 41 39 42 44 36 45 38 35 45 33 33 38 46 32 35 31 33 31 43 37 34 34 43 34 42 30 39 41 41 33 46 44 30 43 41 31 44 46 33 43 30 38 41 30 43 46 37 38 39 30 36 45 37 30 45 31 33 45 43 35 38 46 30 39 33 }
	condition:
		uint16(0) == 0x5c7b and all of them
}
Details Yara rule 1
rule SideWinder_implant {
	meta:
		author = "AT&T Alien Labs"
		description = "Detects SideWinder final payload"
		hash = "c568238dcf1e30d55a398579a4704ddb8196b685"
		reference = "https://otx.alienvault.com/pulse/5f21d5b84d529ed134127a66"
	strings:
		$code = { 1B 30 05 00 C7 00 00 00 00 00 00 00 02 28 03 00 00 06 7D 12 00 00 04 02 02 FE 06 23 00 00 06 73 5B 00 00 0A 14 20 88 13 00 00 15 73 5C 00 00 0A 7D 13 00 00 04 02 02 FE 06 24 00 00 06 73 5B 00 00 0A 14 20 88 13 00 00 15 73 5C 00 00 0A 7D 15 00 00 04 02 7B 12 00 00 04 6F 0E 00 00 06 2C 1D 02 28 1F 00 00 06 02 7B 12 00 00 04 16 6F 0F 00 00 06 02 7B 12 00 00 04 6F 06 00 00 06 02 7B 12 00 00 04 6F 10 00 00 06 2C 23 02 28 20 00 00 06 02 28 21 00 00 06 02 7B 12 00 00 04 16 }
		$strings = { 2E 00 73 00 69 00 66 00 00 09 2E 00 66 00 6C 00 63 00 00 1B 73 00 65 00 6C 00 65 00 63 00 74 00 65 00 64 00 46 00 69 00 6C 00 65 00 73 }
	condition:
		uint16(0) == 0x5A4D and all of them
}
Details Yara rule 1
rule Adwind_JAR_PACKA {
	meta:
		author = "Vitaly Kamluk, Vitaly.Kamluk@kaspersky.com"
		last_modified = "2015-11-30"
	strings:
		$b1 = ".class"
		$b2 = "c/a/a/"
		$b3 = "b/a/"
		$b4 = "a.dat"
		$b5 = "META-INF/MANIFEST.MF"
	condition:
		int16(0) == 0x4B50 and ($b1 and $b2 and $b3 and $b4 and $b5)
}
Details Yara rule 1
rule Adwind_JAR_PACKB {
	meta:
		author = "Vitaly Kamluk, Vitaly.Kamluk@kaspersky.com"
		last_modified = "2015-11-30"
	strings:
		$c1 = "META-INF/MANIFEST.MF"
		$c2 = "main/Start.class"
		$a1 = "config/config.perl"
		$b1 = "java/textito.isn"
	condition:
		int16(0) == 0x4B50 and ($c1 and $c2 and ($a1 or $b1))
}
Details Yara rule 1
rule w3ll_admin_panel_old {
	meta:
		description = "The old admin login page for the W3LL 
panel."
		author = "Anton Ushakov"
	strings:
		$a = "<div class=\"card-header text-center\">Login 
to Panel</div>"
		$b = "placeholder=\"Private Key\""
		$c = "background-color: #000000"
	condition:
		all of them
}
Details Yara rule 1
import "hash"

rule w3ll_activation_page {
	meta:
		description = "The W3LL Panel activation page"
		author = "Anton Ushakov"
	strings:
		$a = "https://t.me/+VaWMi2T0FgTV7_ZS"
		$b = "W3LL OV6 REGISTER CODE"
	condition:
		all of them or (filesize < 1MB and hash.md5(0, filesize) == "8a22b59035d
f5d71e8d14ea75843c218")
}
Details Yara rule 1
rule w3ll_phishing_verification_page {
	meta:
		description = "The W3LL Panel verification page"
		author = "Victor Okorokov"
	strings:
		$a = "<title>Verification"
		$b = "function isBot()"
	condition:
		all of them
}
Details Yara rule 1
rule w3ll_phishing_recaptcha {
	meta:
		description = "The reCAPTCHA page used by the W3LL Panel."
		author = "Victor Okorokov"
	strings:
		$a = "6Lcf2-EhAAAAAAb4lCjGZLljSQMQ9lL7LxhkWGBN"
	condition:
		all of them
}
Details Yara rule 1
import "pe"

rule MAL_IsaacWiper {
	meta:
		author = "CNANCE, Insikt Group, Recorded Future"
		date = "2022-03-08"
		description = "Detects IsaacWiper destructive malware"
		version = "1.0"
		reference = "https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-
ukraine/"
		hash = "13037b749aa4b1eda538fda26d6ac41c8f7b1d02d83f47b0d187dd645154e033"
		hash = "7bcd4ec18fc4a56db30e0aaebd44e2988f98f7b5d8c14f6689f650b4f11e16c0"
		RF_MALWARE = "IsaacWiper"
		RF_MALWARE_ID = "lzQ5GL"
	strings:
		$physical_drive_check = { 6A 00 6A 00 6A 03 6A 00 6A 03 68 00 00 00 80 8D ?? CC 50 FF D? 8B F0 83 FE FF 0F 84 ?? ?? ?? ?? 6A 00 8D ?? E4 C7 4? ?? 00 00 00 00 50 6A 0C 8D ?? AC 50 6A 00 6A 00 68 80 10 2D 00 56 FF 15 ?? ?? ?? ?? 83 F8 01 0F 94 ?? 75 ?? 33 C0 83 7? ?? 07 0F 44 4? ?? 89 4? ?? 56 FF 15 ?? ?? ?? ?? 84 DB EB ?? 84 C9 0F 84 ?? ?? ?? ?? 8B 5? ?? 8B D3 8B 4? ?? 6A 01 E8 }
	condition:
		uint16(0) == 0x5a4d and filesize > 170KB and pe.imphash() == "a4b162717c197e11b76a4d9bc58ea25d" and pe.exports("_start@4") and pe.imports("kernel32.dll", "DeviceIoControl") and $physical_drive_check
}
Details Yara rule 1
rule SUSP_Asherintartrading_FiercePhish_campaign {
	meta:
		author = "Insikt Group, Recorded Future"
		description = "Detecting phishing email content used in asherintartrading campaign throughout 2020"
		hash1 = "bfb0bb8d8ff2802519e55ceef583dcb9eceaab6420dc341127215980656d5408"
		date = "2020-10-22"
	strings:
		$eml_1 = "has some undelivered mails due to mailbox synchronization failure.</p></td></tr>" ascii fullword
		$eml_2 = "<p>You wont be able to receive new mails until you synchronize your mailbox.</p></td></tr>" ascii fullword
		$eml_3 = "<p>Automatically synchronize your mailbox now through the below instruction.</p></td></tr>" ascii fullword
		$eml_4 = "You have (4) pending message.</font></span>" ascii fullword
		$eml_5 = "<p>Kindly unsubscribe if you feel this message is irrelevant to you <a href=3D" ascii fullword
	condition:
		4 of them
}
Details Yara rule 1
rule PoS_Malware_RawPOS2015_service : RawPOS2015_service {
	meta:
		author = "Trend Micro, Inc."
		date = "2015-03-10"
		description = "Used to detect RawPOS RAM service, including 2015 sample set"
		sample_filetype = "exe"
	strings:
		$string0 = "OpenService failed - %s"
		$string1 = "OpenSCManager failed - %s"
		$string2 = "Unable to install %s - %s"
		$string3 = "File already exists"
		$string4 = "Stopping %s."
		$string5 = "This may take several seconds.  Please wait."
		$string6 = "%s failed to stop."
		$string7 = "%s removed."
		$string8 = "Debugging %s."
		$string9 = "Could not create registery key"
		$string10 = "\\\\.\\pipe\\susrv"
		$string11 = "SYSTEM\\CurrentControlSet\\Services\\EventLog\\Application\\%s"
	condition:
		all of ($string*)
}
Details Yara rule 1
rule PoS_Malware_RawPOS2015_dumper : RawPOS2015_dumper {
	meta:
		author = "Trend Micro, Inc."
		date = "2015-03-10"
		description = "Used to detect RawPOS RAM dumper, including 2015 sample set"
		sample_filetype = "exe"
	strings:
		$string1 = "(1[0-2]))([0-9]"
		$string2 = "(1[0-2]))[0-9]{8,30})"
		$string3 = "((B(([0-9]{13,16})"
		$mess1 = "Found track data at %s with PID %d"
		$mess2 = "Enter Process Id: "
		$mess3 = " Dump private process memory by PID"
		$mess4 = "Dumping private memory for pid %s to %s.dmp..."
		$mess5 = " Full private dump of all running processes"
		$memd1 = "memdump\\%s-%d.dmp"
		$memd2 = "mkdir memdump >NUL 2>NUL"
	condition:
		(all of ($memd*)) and (all of ($mess*)) and (any of ($string*))
}
Details Yara rule 1
rule PoS_Malware_RawPOS2015_dumper_old : RawPOS2015_dumper_old {
	meta:
		author = "Trend Micro, Inc."
		date = "2015-03-10"
		description = "Used to detect RawPOS memory dumper, pre-2012"
		sample_filetype = "exe"
	strings:
		$string0 = " Full private dump of all running processes"
		$string1 = " show info on Process like Path"
		$string2 = " Show this help"
		$string3 = " List all running processes"
		$string4 = "Dumping private memory for pid %s to %s.dmp..."
		$string5 = "%s-%d.dmp"
		$string6 = "memdump\\%s-%d.dmp"
		$string7 = "del memdump\\"
		$string8 = "Process Memory Dumper"
		$string9 = "Base size: %u"
		$string10 = "Module ID: %u"
		$string11 = "Hex: %xh"
	condition:
		all of ($string*)
}
Details Yara rule 1
rule lokibot {
	meta:
		description = "Lokibot detection rule based on .x section and C&C decoding"
		author = "gpellegrino@infoblox.com"
	strings:
		$c2decoding = { BB FF FF DF DD BE 74 00 4A 00 90 90 90 90 30 1E }
	condition:
		uint16(0) == 0x5A4D and filesize < 105KB and uint16(0x260) == 0x782E and uint16(0x270) == 0x2000 and $c2decoding in (uint32(0x274) .. uint32(0x274) + 0x2000)
}
Details Yara rule 1
rule final_policy_key {
	strings:
		$str1 = "Providers" nocase
		$str2 = "Trust" nocase
		$str3 = "FinalPolicy" nocase
	condition:
		all of them
}