mirror of
https://github.com/valitydev/signature-base.git
synced 2024-11-07 02:25:19 +00:00
27 lines
949 B
Plaintext
27 lines
949 B
Plaintext
|
/*
|
||
|
Yara Rule Set
|
||
|
Author: Florian Roth
|
||
|
Date: 2017-03-24
|
||
|
Identifier: WMImplant
|
||
|
*/
|
||
|
|
||
|
/* Rule Set ----------------------------------------------------------------- */
|
||
|
|
||
|
rule WMImplant {
|
||
|
meta:
|
||
|
description = "Auto-generated rule - file WMImplant.ps1"
|
||
|
author = "Florian Roth"
|
||
|
reference = "https://www.fireeye.com/blog/threat-research/2017/03/wmimplant_a_wmi_ba.html"
|
||
|
date = "2017-03-24"
|
||
|
hash1 = "860d7c237c2395b4f51b8c9bd0ee6cab06af38fff60ce3563d160d50c11d2f78"
|
||
|
strings:
|
||
|
$x1 = "Invoke-ProcessPunisher -Creds $RemoteCredential" fullword ascii
|
||
|
$x2 = "$Target -query \"SELECT * FROM Win32_NTLogEvent WHERE (logfile='security')" ascii
|
||
|
$x3 = "WMImplant -Creds" fullword ascii
|
||
|
$x4 = "-Download -RemoteFile C:\\passwords.txt" ascii
|
||
|
$x5 = "-Command 'powershell.exe -command \"Enable-PSRemoting" fullword ascii
|
||
|
$x6 = "Invoke-WMImplant" fullword ascii
|
||
|
condition:
|
||
|
1 of them
|
||
|
}
|