rule APT_Project_Sauron_Scripts { meta: description = "Detects scripts (mostly LUA) from Project Sauron report by Kaspersky" author = "Florian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-08" strings: $x1 = "local t = w.exec2str(\"regedit " $x2 = "local r = w.exec2str(\"cat" $x3 = "ap*.txt link*.txt node*.tun VirtualEncryptedNetwork.licence" $x4 = "move O FakeVirtualEncryptedNetwork.dll" $x5 = "sinfo | basex b 32url | dext l 30" $x6 = "w.exec2str(execStr)" $x7 = "netnfo irc | basex b 32url" $x8 = "w.exec(\"wfw status\")" $x9 = "exec(\"samdump\")" $x10 = "cat VirtualEncryptedNetwork.ini|grep" $x11 = "if string.lower(k) == \"securityproviders\" then" $x12 = "exec2str(\"plist b | grep netsvcs\")" $x13 = ".*account.*|.*acct.*|.*domain.*|.*login.*|.*member.*" $x14 = "SAURON_KBLOG_KEY =" condition: 1 of them } rule APT_Project_Sauron_arping_module { meta: description = "Detects strings from arping module - Project Sauron report by Kaspersky" author = "Florian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-08" strings: $s1 = "Resolve hosts that answer" $s2 = "Print only replying Ips" $s3 = "Do not display MAC addresses" condition: all of them } rule APT_Project_Sauron_kblogi_module { meta: description = "Detects strings from kblogi module - Project Sauron report by Kaspersky" author = "Florian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-08" strings: $x1 = "Inject using process name or pid. Default" $s2 = "Convert mode: Read log from file and convert to text" $s3 = "Maximum running time in seconds" condition: $x1 or 2 of them } rule APT_Project_Sauron_basex_module { meta: description = "Detects strings from basex module - Project Sauron report by Kaspersky" author = "Florian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-08" strings: $x1 = "64, 64url, 32, 32url or 16." $s2 = "Force decoding when input is invalid/corrupt" $s3 = "This cruft" condition: $x1 or 2 of them } rule APT_Project_Sauron_dext_module { meta: description = "Detects strings from dext module - Project Sauron report by Kaspersky" author = "Florian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-08" strings: $x1 = "Assemble rows of DNS names back to a single string of data" $x2 = "removes checks of DNS names and lengths (during split)" $x3 = "Randomize data lengths (length/2 to length)" $x4 = "This cruft" condition: 2 of them } rule Hacktool_This_Cruft { meta: description = "Detects string 'This cruft' often used in hack tools like netcat or cryptcat and also mentioned in Project Sauron report" author = "Florian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-08" score = 60 strings: $x1 = "This cruft" fullword condition: ( uint16(0) == 0x5a4d and filesize < 200KB and $x1 ) } /* Yara Rule Set Author: FLorian Roth Date: 2016-08-09 Identifier: Project Sauron - my own ruleset */ /* Rule Set ----------------------------------------------------------------- */ rule APT_Project_Sauron_Custom_M1 { meta: description = "Detects malware from Project Sauron APT" author = "FLorian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-09" hash1 = "9572624b6026311a0e122835bcd7200eca396802000d0777dba118afaaf9f2a9" strings: $s1 = "ncnfloc.dll" fullword wide $s4 = "Network Configuration Locator" fullword wide $op0 = { 80 75 6e 85 c0 79 6a 66 41 83 38 0a 75 63 0f b7 } /* Opcode */ $op1 = { 80 75 29 85 c9 79 25 b9 01 } /* Opcode */ $op2 = { 2b d8 48 89 7c 24 38 44 89 6c 24 40 83 c3 08 89 } /* Opcode */ condition: ( uint16(0) == 0x5a4d and filesize < 200KB and ( all of ($s*) ) and 1 of ($op*) ) or ( all of them ) } rule APT_Project_Sauron_Custom_M2 { meta: description = "Detects malware from Project Sauron APT" author = "FLorian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-09" hash1 = "30a824155603c2e9d8bfd3adab8660e826d7e0681e28e46d102706a03e23e3a8" strings: $s2 = "\\*\\3vpn" fullword ascii $op0 = { 55 8b ec 83 ec 0c 53 56 33 f6 39 75 08 57 89 75 } /* Opcode */ $op1 = { 59 59 c3 8b 65 e8 ff 75 88 ff 15 50 20 40 00 ff } /* Opcode */ $op2 = { 8b 4f 06 85 c9 74 14 83 f9 12 0f 82 a7 } /* Opcode */ condition: ( uint16(0) == 0x5a4d and filesize < 400KB and ( all of ($s*) ) and all of ($op*) ) } rule APT_Project_Sauron_Custom_M3 { meta: description = "Detects malware from Project Sauron APT" author = "FLorian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-09" hash1 = "a4736de88e9208eb81b52f29bab9e7f328b90a86512bd0baadf4c519e948e5ec" strings: $s1 = "ExampleProject.dll" fullword ascii $op0 = { 8b 4f 06 85 c9 74 14 83 f9 13 0f 82 ba } /* Opcode */ $op1 = { ff 15 34 20 00 10 85 c0 59 a3 60 30 00 10 75 04 } /* Opcode */ $op2 = { 55 8b ec ff 4d 0c 75 09 ff 75 08 ff 15 00 20 00 } /* Opcode */ condition: ( uint16(0) == 0x5a4d and filesize < 1000KB and ( all of ($s*) ) and all of ($op*) ) } rule APT_Project_Sauron_Custom_M4 { meta: description = "Detects malware from Project Sauron APT" author = "FLorian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-09" hash1 = "e12e66a6127cfd2cbb42e6f0d57c9dd019b02768d6f1fb44d91f12d90a611a57" strings: $s1 = "xpsmngr.dll" fullword wide $s2 = "XPS Manager" fullword wide $op0 = { 89 4d e8 89 4d ec 89 4d f0 ff d2 3d 08 00 00 c6 } /* Opcode */ $op1 = { 55 8b ec ff 4d 0c 75 09 ff 75 08 ff 15 04 20 5b } /* Opcode */ $op2 = { 8b 4f 06 85 c9 74 14 83 f9 13 0f 82 b6 } /* Opcode */ condition: ( uint16(0) == 0x5a4d and filesize < 90KB and ( all of ($s*) ) and 1 of ($op*) ) or ( all of them ) } rule APT_Project_Sauron_Custom_M6 { meta: description = "Detects malware from Project Sauron APT" author = "FLorian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-09" hash1 = "3782b63d7f6f688a5ccb1b72be89a6a98bb722218c9f22402709af97a41973c8" strings: $s1 = "rseceng.dll" fullword wide $s2 = "Remote Security Engine" fullword wide $op0 = { 8b 0d d5 1d 00 00 85 c9 0f 8e a2 } /* Opcode */ $op1 = { 80 75 6e 85 c0 79 6a 66 41 83 38 0a 75 63 0f b7 } /* Opcode */ $op2 = { 80 75 29 85 c9 79 25 b9 01 } /* Opcode */ condition: ( uint16(0) == 0x5a4d and filesize < 200KB and ( all of ($s*) ) and 1 of ($op*) ) or ( all of them ) } rule APT_Project_Sauron_Custom_M7 { meta: description = "Detects malware from Project Sauron APT" author = "FLorian Roth" reference = "https://goo.gl/eFoP4A" date = "2016-08-09" hash1 = "6c8c93069831a1b60279d2b316fd36bffa0d4c407068dbef81b8e2fe8fd8e8cd" hash2 = "7cc0bf547e78c8aaf408495ceef58fa706e6b5d44441fefdce09d9f06398c0ca" strings: $sx1 = "Default user" fullword wide $sx2 = "Hincorrect header check" fullword ascii /* Typo */ $sa1 = "MSAOSSPC.dll" fullword ascii $sa2 = "MSAOSSPC.DLL" fullword wide $sa3 = "MSAOSSPC" fullword wide $sa4 = "AOL Security Package" fullword wide $sa5 = "AOL Security Package" fullword wide $sa6 = "AOL Client for 32 bit platforms" fullword wide $op0 = { 8b ce 5b e9 4b ff ff ff 55 8b ec 51 53 8b 5d 08 } /* Opcode */ $op1 = { e8 0a fe ff ff 8b 4d 14 89 46 04 89 41 04 8b 45 } /* Opcode */ $op2 = { e9 29 ff ff ff 83 7d fc 00 0f 84 cf 0a 00 00 8b } /* Opcode */ $op3 = { 83 f8 0c 0f 85 3a 01 00 00 44 2b 41 6c 41 8b c9 } /* Opcode */ $op4 = { 44 39 57 0c 0f 84 d6 0c 00 00 44 89 6f 18 45 89 } /* Opcode */ $op5 = { c1 ed 02 83 c6 fe e9 68 fe ff ff 44 39 57 08 75 } /* Opcode */ condition: uint16(0) == 0x5a4d and filesize < 200KB and ( ( 3 of ($s*) and 3 of ($op*) ) or ( 1 of ($sx*) and 1 of ($sa*) ) ) }