signature-base/yara/apt_project_sauron_extras.yar
2016-08-10 09:34:15 +02:00

225 lines
7.5 KiB
Plaintext

rule APT_Project_Sauron_Scripts {
meta:
description = "Detects scripts (mostly LUA) from Project Sauron report by Kaspersky"
author = "Florian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-08"
strings:
$x1 = "local t = w.exec2str(\"regedit "
$x2 = "local r = w.exec2str(\"cat"
$x3 = "ap*.txt link*.txt node*.tun VirtualEncryptedNetwork.licence"
$x4 = "move O FakeVirtualEncryptedNetwork.dll"
$x5 = "sinfo | basex b 32url | dext l 30"
$x6 = "w.exec2str(execStr)"
$x7 = "netnfo irc | basex b 32url"
$x8 = "w.exec(\"wfw status\")"
$x9 = "exec(\"samdump\")"
$x10 = "cat VirtualEncryptedNetwork.ini|grep"
$x11 = "if string.lower(k) == \"securityproviders\" then"
$x12 = "exec2str(\"plist b | grep netsvcs\")"
$x13 = ".*account.*|.*acct.*|.*domain.*|.*login.*|.*member.*"
$x14 = "SAURON_KBLOG_KEY ="
condition:
1 of them
}
rule APT_Project_Sauron_arping_module {
meta:
description = "Detects strings from arping module - Project Sauron report by Kaspersky"
author = "Florian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-08"
strings:
$s1 = "Resolve hosts that answer"
$s2 = "Print only replying Ips"
$s3 = "Do not display MAC addresses"
condition:
all of them
}
rule APT_Project_Sauron_kblogi_module {
meta:
description = "Detects strings from kblogi module - Project Sauron report by Kaspersky"
author = "Florian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-08"
strings:
$x1 = "Inject using process name or pid. Default"
$s2 = "Convert mode: Read log from file and convert to text"
$s3 = "Maximum running time in seconds"
condition:
$x1 or 2 of them
}
rule APT_Project_Sauron_basex_module {
meta:
description = "Detects strings from basex module - Project Sauron report by Kaspersky"
author = "Florian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-08"
strings:
$x1 = "64, 64url, 32, 32url or 16."
$s2 = "Force decoding when input is invalid/corrupt"
$s3 = "This cruft"
condition:
$x1 or 2 of them
}
rule APT_Project_Sauron_dext_module {
meta:
description = "Detects strings from dext module - Project Sauron report by Kaspersky"
author = "Florian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-08"
strings:
$x1 = "Assemble rows of DNS names back to a single string of data"
$x2 = "removes checks of DNS names and lengths (during split)"
$x3 = "Randomize data lengths (length/2 to length)"
$x4 = "This cruft"
condition:
2 of them
}
rule Hacktool_This_Cruft {
meta:
description = "Detects string 'This cruft' often used in hack tools like netcat or cryptcat and also mentioned in Project Sauron report"
author = "Florian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-08"
score = 60
strings:
$x1 = "This cruft" fullword
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and $x1 )
}
/*
Yara Rule Set
Author: FLorian Roth
Date: 2016-08-09
Identifier: Project Sauron - my own ruleset
*/
/* Rule Set ----------------------------------------------------------------- */
rule APT_Project_Sauron_Custom_M1 {
meta:
description = "Detects malware from Project Sauron APT"
author = "FLorian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-09"
hash1 = "9572624b6026311a0e122835bcd7200eca396802000d0777dba118afaaf9f2a9"
strings:
$s1 = "ncnfloc.dll" fullword wide
$s4 = "Network Configuration Locator" fullword wide
$op0 = { 80 75 6e 85 c0 79 6a 66 41 83 38 0a 75 63 0f b7 } /* Opcode */
$op1 = { 80 75 29 85 c9 79 25 b9 01 } /* Opcode */
$op2 = { 2b d8 48 89 7c 24 38 44 89 6c 24 40 83 c3 08 89 } /* Opcode */
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and ( all of ($s*) ) and 1 of ($op*) ) or ( all of them )
}
rule APT_Project_Sauron_Custom_M2 {
meta:
description = "Detects malware from Project Sauron APT"
author = "FLorian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-09"
hash1 = "30a824155603c2e9d8bfd3adab8660e826d7e0681e28e46d102706a03e23e3a8"
strings:
$s2 = "\\*\\3vpn" fullword ascii
$op0 = { 55 8b ec 83 ec 0c 53 56 33 f6 39 75 08 57 89 75 } /* Opcode */
$op1 = { 59 59 c3 8b 65 e8 ff 75 88 ff 15 50 20 40 00 ff } /* Opcode */
$op2 = { 8b 4f 06 85 c9 74 14 83 f9 12 0f 82 a7 } /* Opcode */
condition:
( uint16(0) == 0x5a4d and filesize < 400KB and ( all of ($s*) ) and all of ($op*) )
}
rule APT_Project_Sauron_Custom_M3 {
meta:
description = "Detects malware from Project Sauron APT"
author = "FLorian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-09"
hash1 = "a4736de88e9208eb81b52f29bab9e7f328b90a86512bd0baadf4c519e948e5ec"
strings:
$s1 = "ExampleProject.dll" fullword ascii
$op0 = { 8b 4f 06 85 c9 74 14 83 f9 13 0f 82 ba } /* Opcode */
$op1 = { ff 15 34 20 00 10 85 c0 59 a3 60 30 00 10 75 04 } /* Opcode */
$op2 = { 55 8b ec ff 4d 0c 75 09 ff 75 08 ff 15 00 20 00 } /* Opcode */
condition:
( uint16(0) == 0x5a4d and filesize < 1000KB and ( all of ($s*) ) and all of ($op*) )
}
rule APT_Project_Sauron_Custom_M4 {
meta:
description = "Detects malware from Project Sauron APT"
author = "FLorian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-09"
hash1 = "e12e66a6127cfd2cbb42e6f0d57c9dd019b02768d6f1fb44d91f12d90a611a57"
strings:
$s1 = "xpsmngr.dll" fullword wide
$s2 = "XPS Manager" fullword wide
$op0 = { 89 4d e8 89 4d ec 89 4d f0 ff d2 3d 08 00 00 c6 } /* Opcode */
$op1 = { 55 8b ec ff 4d 0c 75 09 ff 75 08 ff 15 04 20 5b } /* Opcode */
$op2 = { 8b 4f 06 85 c9 74 14 83 f9 13 0f 82 b6 } /* Opcode */
condition:
( uint16(0) == 0x5a4d and filesize < 90KB and ( all of ($s*) ) and 1 of ($op*) ) or ( all of them )
}
rule APT_Project_Sauron_Custom_M6 {
meta:
description = "Detects malware from Project Sauron APT"
author = "FLorian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-09"
hash1 = "3782b63d7f6f688a5ccb1b72be89a6a98bb722218c9f22402709af97a41973c8"
strings:
$s1 = "rseceng.dll" fullword wide
$s2 = "Remote Security Engine" fullword wide
$op0 = { 8b 0d d5 1d 00 00 85 c9 0f 8e a2 } /* Opcode */
$op1 = { 80 75 6e 85 c0 79 6a 66 41 83 38 0a 75 63 0f b7 } /* Opcode */
$op2 = { 80 75 29 85 c9 79 25 b9 01 } /* Opcode */
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and ( all of ($s*) ) and 1 of ($op*) ) or ( all of them )
}
rule APT_Project_Sauron_Custom_M7 {
meta:
description = "Detects malware from Project Sauron APT"
author = "FLorian Roth"
reference = "https://goo.gl/eFoP4A"
date = "2016-08-09"
hash1 = "6c8c93069831a1b60279d2b316fd36bffa0d4c407068dbef81b8e2fe8fd8e8cd"
hash2 = "7cc0bf547e78c8aaf408495ceef58fa706e6b5d44441fefdce09d9f06398c0ca"
strings:
$sx1 = "Default user" fullword wide
$sx2 = "Hincorrect header check" fullword ascii /* Typo */
$sa1 = "MSAOSSPC.dll" fullword ascii
$sa2 = "MSAOSSPC.DLL" fullword wide
$sa3 = "MSAOSSPC" fullword wide
$sa4 = "AOL Security Package" fullword wide
$sa5 = "AOL Security Package" fullword wide
$sa6 = "AOL Client for 32 bit platforms" fullword wide
$op0 = { 8b ce 5b e9 4b ff ff ff 55 8b ec 51 53 8b 5d 08 } /* Opcode */
$op1 = { e8 0a fe ff ff 8b 4d 14 89 46 04 89 41 04 8b 45 } /* Opcode */
$op2 = { e9 29 ff ff ff 83 7d fc 00 0f 84 cf 0a 00 00 8b } /* Opcode */
$op3 = { 83 f8 0c 0f 85 3a 01 00 00 44 2b 41 6c 41 8b c9 } /* Opcode */
$op4 = { 44 39 57 0c 0f 84 d6 0c 00 00 44 89 6f 18 45 89 } /* Opcode */
$op5 = { c1 ed 02 83 c6 fe e9 68 fe ff ff 44 39 57 08 75 } /* Opcode */
condition:
uint16(0) == 0x5a4d and filesize < 200KB and
(
( 3 of ($s*) and 3 of ($op*) ) or
( 1 of ($sx*) and 1 of ($sa*) )
)
}