From 7b16da508135878b87a4432335cd53e9a9c5a868 Mon Sep 17 00:00:00 2001 From: Florian Roth Date: Sun, 15 Jan 2017 16:30:56 +0100 Subject: [PATCH] P0wnShell --- yara/gen_p0wnshell.yar | 166 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 166 insertions(+) create mode 100644 yara/gen_p0wnshell.yar diff --git a/yara/gen_p0wnshell.yar b/yara/gen_p0wnshell.yar new file mode 100644 index 0000000..87e4d5a --- /dev/null +++ b/yara/gen_p0wnshell.yar @@ -0,0 +1,166 @@ +/* + Yara Rule Set + Author: Florian Roth + Date: 2017-01-14 + Identifier: p0wnedShell +*/ + +/* Rule Set ----------------------------------------------------------------- */ + +rule p0wnedPowerCat { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedPowerCat.cs" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + hash1 = "6a3ba991d3b5d127c4325bc194b3241dde5b3a5853b78b4df1bce7cbe87c0fdf" + strings: + $x1 = "Now if we point Firefox to http://127.0.0.1" fullword ascii + $x2 = "powercat -l -v -p" fullword ascii + $x3 = "P0wnedListener" fullword ascii + $x4 = "EncodedPayload.bat" fullword ascii + $x5 = "powercat -c " fullword ascii + $x6 = "Program.P0wnedPath()" ascii + $x7 = "Invoke-PowerShellTcpOneLine" fullword ascii + condition: + ( uint16(0) == 0x7375 and filesize < 150KB and 1 of them ) or ( 2 of them ) +} + +rule Hacktool_Strings_p0wnedShell { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedShell.cs" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + hash1 = "e1f35310192416cd79e60dba0521fc6eb107f3e65741c344832c46e9b4085e60" + strings: + $x1 = "Invoke-TokenManipulation" fullword ascii + $x2 = "windows/meterpreter" fullword ascii + $x3 = "lsadump::dcsync" fullword ascii + $x4 = "p0wnedShellx86" fullword ascii + $x5 = "p0wnedShellx64" fullword ascii + $x6 = "Invoke_PsExec()" fullword ascii + $x7 = "Invoke-Mimikatz" fullword ascii + $x8 = "Invoke_Shellcode()" fullword ascii + $x9 = "Invoke-ReflectivePEInjection" ascii + condition: + 1 of them +} + +rule p0wnedPotato { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedPotato.cs" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + hash1 = "aff2b694a01b48ef96c82daf387b25845abbe01073b76316f1aab3142fdb235b" + strings: + $x1 = "Invoke-Tater" fullword ascii + $x2 = "P0wnedListener.Execute(WPAD_Proxy);" fullword ascii + $x3 = " -SpooferIP " ascii + $x4 = "TaterCommand()" ascii + $x5 = "FileName = \"cmd.exe\"," fullword ascii + condition: + 1 of them +} + +rule p0wnedExploits { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedExploits.cs" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + hash1 = "54548e7848e742566f5596d8f02eca1fd2cbfeae88648b01efb7bab014b9301b" + strings: + $x1 = "Pshell.RunPSCommand(Whoami);" fullword ascii + $x2 = "If succeeded this exploit should popup a System CMD Shell" fullword ascii + condition: + all of them +} + +rule p0wnedShellx64 { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedShellx64.exe" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + hash1 = "d8b4f5440627cf70fa0e0e19e0359b59e671885f8c1855517211ba331f48c449" + strings: + $x1 = "Oq02AB+LCAAAAAAABADs/QkW3LiOLQBuRUsQR1H731gHMQOkFGFnvvrdp/O4sp6tkDiAIIjhAryu4z6PVOtxHuXz3/xT6X9za/Df/Hsa/JT/9Pjgb/+kPPhv9Sjp01Wf" wide + $x2 = "Invoke-TokenManipulation" wide + $x3 = "-CreateProcess \"cmd.exe\" -Username \"nt authority\\system\"" fullword wide + $x4 = "CommandShell with Local Administrator privileges :)" fullword wide + $x5 = "Invoke-shellcode -Payload windows/meterpreter/reverse_https -Lhost " fullword wide + condition: + 1 of them +} + +rule p0wnedListenerConsole { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedListenerConsole.cs" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + hash1 = "d2d84e65fad966a8556696fdaab5dc8110fc058c9e9caa7ea78aa00921ae3169" + strings: + $x1 = "Invoke_ReflectivePEInjection" fullword wide + $x5 = "p0wnedShell> " fullword wide + $x6 = "Resources.Get_PassHashes" fullword wide + $s7 = "Invoke_CredentialsPhish" fullword wide + $s8 = "Invoke_Shellcode" fullword wide + $s9 = "Resources.Invoke_TokenManipulation" fullword wide + $s10 = "Resources.Port_Scan" fullword wide + $s20 = "Invoke_PowerUp" fullword wide + condition: + 1 of them +} + +rule p0wnedBinaries { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedBinaries.cs" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + hash1 = "fd7014625b58d00c6e54ad0e587c6dba5d50f8ca4b0f162d5af3357c2183c7a7" + strings: + $x1 = "Oq02AB+LCAAAAAAABADs/QkW3LiOLQBuRUsQR1H731gHMQOkFGFnvvrdp/O4sp6tkDiAIIjhAryu4z6PVOtxHuXz3/xT6X9za/Df/Hsa/JT/9" ascii + $x2 = "wpoWAB+LCAAAAAAABADs/QeyK7uOBYhORUNIenL+E2vBA0ympH3erY4f8Tte3TpbUiY9YRbcGK91vVKtr+tV3v/B/yr/m1vD/+DvNOVb+V/f" ascii + $x3 = "mo0MAB+LCAAAAAAABADsXQl24zqu3YqXII6i9r+xJ4AACU4SZcuJnVenf/9OxbHEAcRwcQGu62NbHsrax/Iw+3/hP5b+VzuH/4WfVeDf8n98" ascii + $x4 = "LE4CAB+LCAAAAAAABADsfQmW2zqu6Fa8BM7D/jf2hRmkKNuVm/Tt9zunkipb4giCIGb2/prhFUt5hVe+/sNP4b+pVvwPn+OQp/LT9ge/+" ascii + $x5 = "XpMCAB+LCAAAAAAABADsfQeWIzmO6FV0hKAn73+xL3iAwVAqq2t35r/tl53VyhCDFoQ3Y7zW9Uq1vq5Xef/CT+X/59bwFz6nKU/lp+8P/" ascii + $x6 = "STwAAB+LCAAAAAAABADtWwmy6yoO3YqXgJjZ/8ZaRwNgx/HNfX/o7qqUkxgzCM0SmLR2jHBQzkc4En9xZbvHUuSLMnWv9ateK/70ilStR" ascii + $x7 = "namespace p0wnedShell" fullword ascii + condition: + 1 of them +} + +rule p0wnedAmsiBypass { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - file p0wnedAmsiBypass.cs" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + hash1 = "345e8e6f38b2914f4533c4c16421d372d61564a4275537e674a2ac3360b19284" + strings: + $x1 = "Program.P0wnedPath()" fullword ascii + $x2 = "namespace p0wnedShell" fullword ascii + $x3 = "H4sIAAAAAAAEAO1YfXRUx3WflXalFazQgiVb5nMVryzxIbGrt/rcFRZIa1CQYEFCQnxotUhP2pX3Q337HpYotCKrPdbmoQQnkOY0+BQCNKRpe" ascii + condition: + 1 of them +} + +rule p0wnedShell_outputs { + meta: + description = "p0wnedShell Runspace Post Exploitation Toolkit - from files p0wnedShell.cs, p0wnedShell.cs" + author = "Florian Roth" + reference = "https://github.com/Cn33liz/p0wnedShell" + date = "2017-01-14" + super_rule = 1 + hash1 = "e1f35310192416cd79e60dba0521fc6eb107f3e65741c344832c46e9b4085e60" + strings: + $s1 = "[+] For this attack to succeed, you need to have Admin privileges." fullword ascii + $s2 = "[+] This is not a valid hostname, please try again" fullword ascii + $s3 = "[+] First return the name of our current domain." fullword ascii + condition: + 1 of them +}