signature-base/yara/gen_powersploit_dropper.yar

15 lines
635 B
Plaintext
Raw Normal View History

2018-06-24 20:44:28 +00:00
rule HKTL_PowerSploit {
meta:
description = "Detects default strings used by PowerSploit to establish persistence"
author = "Markus Neis"
reference = "https://www.hybrid-analysis.com/sample/16937e76db6d88ed0420ee87317424af2d4e19117fe12d1364fee35aa2fadb75?environmentId=100" /*MuddyWater*/
date = "2018-06-23"
hash1 = "16937e76db6d88ed0420ee87317424af2d4e19117fe12d1364fee35aa2fadb75"
strings:
$ps = "function" nocase ascii wide
$s1 = "/Create /RU system /SC ONLOGON" ascii wide
$s2 = "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run" ascii wide
condition:
all of them
}