signature-base/yara/apt_quasar_rat.yar
2019-05-28 09:49:22 +02:00

86 lines
3.4 KiB
Plaintext

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-04-07
Identifier: Quasar RAT
*/
/* Rule Set ----------------------------------------------------------------- */
rule Quasar_RAT_1 {
meta:
description = "Detects Quasar RAT"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf"
date = "2017-04-07"
hash1 = "0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740"
hash2 = "1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec"
hash3 = "515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89"
hash4 = "f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34"
strings:
$s1 = "DoUploadAndExecute" fullword ascii
$s2 = "DoDownloadAndExecute" fullword ascii
$s3 = "DoShellExecute" fullword ascii
$s4 = "set_Processname" fullword ascii
$op1 = { 04 1e fe 02 04 16 fe 01 60 }
$op2 = { 00 17 03 1f 20 17 19 15 28 }
$op3 = { 00 04 03 69 91 1b 40 }
condition:
( uint16(0) == 0x5a4d and filesize < 5000KB and all of ($s*) or all of ($op*) )
}
rule Quasar_RAT_2 {
meta:
description = "Detects Quasar RAT"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf"
date = "2017-04-07"
super_rule = 1
hash1 = "0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740"
hash2 = "515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89"
hash3 = "f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34"
strings:
$x1 = "GetKeyloggerLogsResponse" fullword ascii
$x2 = "get_Keylogger" fullword ascii
$x3 = "HandleGetKeyloggerLogsResponse" fullword ascii
$s1 = "DoShellExecuteResponse" fullword ascii
$s2 = "GetPasswordsResponse" fullword ascii
$s3 = "GetStartupItemsResponse" fullword ascii
$s4 = "<GetGenReader>b__7" fullword ascii
$s5 = "RunHidden" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 5000KB and $x1 ) or ( all of them )
}
rule MAL_QuasarRAT_May19_1 {
meta:
description = "Detects QuasarRAT malware"
author = "Florian Roth"
reference = "https://blog.ensilo.com/uncovering-new-activity-by-apt10"
date = "2019-05-27"
hash1 = "0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded"
strings:
$x1 = "Quasar.Common.Messages" ascii fullword
$x2 = "Client.MimikatzTools" ascii fullword
$x3 = "Resources.powerkatz_x86.dll" ascii fullword
$x4 = "Uninstalling... good bye :-(" wide fullword
$xc1 = { 41 00 64 00 6D 00 69 00 6E 00 00 11 73 00 63 00
68 00 74 00 61 00 73 00 6B 00 73 00 00 1B 2F 00
63 00 72 00 65 00 61 00 74 00 65 00 20 00 2F 00
74 00 6E 00 20 00 22 00 00 27 22 00 20 00 2F 00
73 }
$xc2 = { 00 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20
00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C
00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E
00 75 00 6C 00 0D 00 0A 00 64 00 65 00 6C 00 20
00 2F 00 61 00 20 00 2F 00 71 00 20 00 2F 00 66
00 20 00 }
condition:
uint16(0) == 0x5a4d and filesize < 10000KB and 1 of them
}