signature-base/yara/apt_rokrat.yar

31 lines
1.1 KiB
Plaintext
Raw Normal View History

2017-04-05 09:23:44 +00:00
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-04-03
Identifier: ROKRAT
*/
rule ROKRAT_Malware {
meta:
description = "Detects ROKRAT Malware"
author = "Florian Roth"
reference = "http://blog.talosintelligence.com/2017/04/introducing-rokrat.html"
date = "2017-04-03"
hash1 = "051463a14767c6477b6dacd639f30a8a5b9e126ff31532b58fc29c8364604d00"
hash2 = "cd166565ce09ef410c5bba40bad0b49441af6cfb48772e7e4a9de3d646b4851c"
strings:
$x1 = "c:\\users\\appdata\\local\\svchost.exe" fullword ascii
$x2 = "c:\\temp\\episode3.mp4" fullword ascii
$x3 = "MAC-SIL-TED-FOO-YIM-LAN-WAN-SEC-BIL-TAB" ascii
$x4 = "c:\\temp\\%d.tmp" ascii fullword
$s1 = "%s%s%04d%02d%02d%02d%02d%02d.jar" fullword ascii
$s2 = "\\Aboard\\Acm%c%c%c.exe" fullword ascii
$a1 = "ython" ascii fullword
$a2 = "iddler" ascii fullword
$a3 = "egmon" ascii fullword
$a6 = "iresha" ascii fullword
condition:
( uint16(0) == 0x5a4d and filesize < 25000KB and ( 1 of ($x*) or all of ($a*) ) ) or ( 5 of them )
}