rule APT_MAL_NK_Lazarus_VHD_Ransomware_Oct20_1 { meta: description = "Detects Lazarus VHD Ransomware" author = "Florian Roth" reference = "https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/" date = "2020-10-05" hash1 = "52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6" hash2 = "5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473" hash3 = "6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306" strings: $s1 = "HowToDecrypt.txt" wide fullword $s2 = "rsa.cpp" wide fullword $s3 = "sc stop \"Microsoft Exchange Compliance Service\"" ascii fullword $op1 = { 8b 8d bc fc ff ff 8b 94 bd 34 03 00 00 33 c0 50 } $op2 = { 8b 8d 98 f9 ff ff 8d 64 24 00 8b 39 3b bc 85 34 } $op3 = { 8b 94 85 34 03 00 00 89 11 40 83 c1 04 3b 06 7c } condition: uint16(0) == 0x5a4d and filesize < 400KB and 2 of them } rule APT_MAL_NK_Lazarus_VHD_Ransomware_Oct20_2 { meta: description = "Detects Lazarus VHD Ransomware" author = "Florian Roth" reference = "https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/" date = "2020-10-05" hash1 = "097ca829e051a4877bca093cee340180ff5f13a9c266ad4141b0be82aae1a39b" hash2 = "73a10be31832c9f1cbbd798590411009da0881592a90feb472e80025dfb0ea79" strings: $op1 = { f9 36 88 08 8d ad fc ff ff ff 66 ff c1 e9 72 86 } $op2 = { c6 c4 58 0f a4 c8 12 8d ad ff ff ff ff 0f b6 44 } $op3 = { 88 02 66 c1 f0 54 8d bf fc ff ff ff 0f ba e0 19 } condition: uint16(0) == 0x5a4d and filesize < 9000KB and all of them }