/* Yara Rule Set Author: Florian Roth Date: 2017-10-23 Identifier: Sofacy Malware Reference: http://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html */ /* Rule Set ----------------------------------------------------------------- */ import "pe" rule Sofacy_Oct17_1 { meta: description = "Detects Sofacy malware reported in October 2017" author = "Florian Roth" reference = "http://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html" date = "2017-10-23" hash1 = "522fd9b35323af55113455d823571f71332e53dde988c2eb41395cf6b0c15805" strings: $x1 = "%localappdata%\\netwf.dll" fullword wide $x2 = "set path = \"%localappdata%\\netwf.dll\"" fullword ascii $x3 = "%localappdata%\\netwf.bat" fullword wide $x4 = "KlpSvc.dll" fullword ascii /* used for generic approach */ $g1 = "set path = \"%localappdata%\\" ascii $g2 = "%localappdata%\\" wide $s1 = "start rundll32.exe %path %,#1a" fullword ascii $s2 = "gshell32" fullword wide $s3 = "s - %lu" fullword ascii $s4 = "be run i" fullword ascii $s5 = "ingToBinhary" fullword ascii $s6 = "%j%Xjs" fullword ascii $s7 = "if NOT exist %path % (exit)" fullword ascii condition: uint16(0) == 0x5a4d and filesize < 300KB and ( pe.imphash() == "a2d1be6502b4b3c28959a4fb0196ea45" or pe.exports("KlpSvc") or ( 1 of ($x*) or 4 of them ) or ( $s1 and all of ($g*) ) ) } rule Sofacy_Oct17_2 { meta: description = "Detects Sofacy malware reported in October 2017" author = "Florian Roth" reference = "http://blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html" date = "2017-10-23" hash1 = "ef027405492bc0719437eb58c3d2774cc87845f30c40040bbebbcc09a4e3dd18" strings: $x1 = "netwf.dll" fullword wide $s1 = "%s - %s - %2.2x" fullword wide $s2 = "%s - %lu" fullword ascii $s3 = "%s \"%s\", %s" fullword wide $s4 = "%j%Xjsf" fullword ascii condition: ( uint16(0) == 0x5a4d and filesize < 90KB and ( pe.imphash() == "13344e2a717849489bcd93692f9646f7" or ( 4 of them ) ) ) or ( all of them ) }