mirror of
https://github.com/valitydev/signature-base.git
synced 2024-11-06 18:15:20 +00:00
APT 19 - FireEye report
https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
This commit is contained in:
parent
f4c725bb84
commit
0082d91da8
65
yara/apt_apt19.yar
Normal file
65
yara/apt_apt19.yar
Normal file
@ -0,0 +1,65 @@
|
||||
|
||||
/*
|
||||
Yara Rule Set
|
||||
Author: Ian.Ahl@fireeye.com @TekDefense, modified by Florian Roth
|
||||
Date: 2017-06-05
|
||||
Identifier: APT19
|
||||
Reference: https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
|
||||
*/
|
||||
|
||||
rule Beacon_K5om {
|
||||
meta:
|
||||
description = "Detects Meterpreter Beacon - file K5om.dll"
|
||||
author = "Florian Roth"
|
||||
reference = "https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html"
|
||||
date = "2017-06-07"
|
||||
hash1 = "e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9"
|
||||
strings:
|
||||
$x1 = "IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:%u/'); %s" fullword ascii
|
||||
$x2 = "powershell -nop -exec bypass -EncodedCommand \"%s\"" fullword ascii
|
||||
$x3 = "%d is an x86 process (can't inject x64 content)" fullword ascii
|
||||
|
||||
$s1 = "Could not open process token: %d (%u)" fullword ascii
|
||||
$s2 = "0fd00b.dll" fullword ascii
|
||||
$s3 = "%s.4%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%08x%08x%08x%08x%08x%08x%08x.%x%x.%s" fullword ascii
|
||||
$s4 = "Could not connect to pipe (%s): %d" fullword ascii
|
||||
condition:
|
||||
( uint16(0) == 0x5a4d and filesize < 600KB and ( 1 of ($x*) or 3 of them ) )
|
||||
}
|
||||
|
||||
/* Rule Set ----------------------------------------------------------------- */
|
||||
|
||||
rule FE_LEGALSTRIKE_MACRO {
|
||||
meta:
|
||||
version=".1"
|
||||
filetype="MACRO"
|
||||
author="Ian.Ahl@fireeye.com @TekDefense - modified by Florian Roth"
|
||||
date="2017-06-02"
|
||||
description="This rule is designed to identify macros with the specific encoding used in the sample 30f149479c02b741e897cdb9ecd22da7."
|
||||
strings:
|
||||
// OBSFUCATION
|
||||
$ob1 = "ChrW(114) & ChrW(101) & ChrW(103) & ChrW(115) & ChrW(118) & ChrW(114) & ChrW(51) & ChrW(50) & ChrW(46) & ChrW(101)" ascii wide
|
||||
// wscript
|
||||
$wsobj1 = "Set Obj = CreateObject(\"WScript.Shell\")" ascii wide
|
||||
$wsobj2 = "Obj.Run " ascii wide
|
||||
condition:
|
||||
all of them
|
||||
}
|
||||
|
||||
rule FE_LEGALSTRIKE_RTF {
|
||||
meta:
|
||||
version=".1"
|
||||
filetype="MACRO"
|
||||
author="joshua.kim@FireEye. - modified by Florian Roth"
|
||||
date="2017-06-02"
|
||||
description="Rtf Phishing Campaign leveraging the CVE 2017-0199 exploit, to point to the domain 2bunnyDOTcom"
|
||||
strings:
|
||||
$lnkinfo = "4c0069006e006b0049006e0066006f"
|
||||
$encoded1 = "4f4c45324c696e6b"
|
||||
$encoded2 = "52006f006f007400200045006e007400720079"
|
||||
$encoded3 = "4f0062006a0049006e0066006f"
|
||||
$encoded4 = "4f006c0065"
|
||||
$datastore = "\\*\\datastore"
|
||||
condition:
|
||||
uint32be(0) == 0x7B5C7274 and all of them
|
||||
}
|
Loading…
Reference in New Issue
Block a user