signature-base/yara/thor-hacktools.yar

4578 lines
166 KiB
Plaintext

/*
THOR APT Scanner - Hack Tool Extract
This rulset is a subset of all hack tool rules included in our
APT Scanner THOR - the full featured APT scanner.
We will frequently update this file with new rules rated TLP:WHITE
Florian Roth
BSK Consulting GmbH
Web: bsk-consulting.de
revision: 20170620
License: Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
Copyright and related rights waived via https://creativecommons.org/licenses/by-nc-sa/4.0/
*/
import "pe"
/* WCE */
rule WindowsCredentialEditor
{
meta:
description = "Windows Credential Editor"
threat_level = 10
score = 90
strings:
$a = "extract the TGT session key"
$b = "Windows Credentials Editor"
condition:
all of them
}
rule Amplia_Security_Tool
{
meta:
description = "Amplia Security Tool"
score = 60
nodeepdive = 1
strings:
$a = "Amplia Security"
$b = "Hernan Ochoa"
$c = "getlsasrvaddr.exe"
$d = "Cannot get PID of LSASS.EXE"
$e = "extract the TGT session key"
$f = "PPWDUMP_DATA"
condition: 1 of them
}
/* pwdump/fgdump */
rule PwDump
{
meta:
description = "PwDump 6 variant"
author = "Marc Stroebel"
date = "2014-04-24"
score = 70
strings:
$s5 = "Usage: %s [-x][-n][-h][-o output_file][-u user][-p password][-s share] machineNa"
$s6 = "Unable to query service status. Something is wrong, please manually check the st"
$s7 = "pwdump6 Version %s by fizzgig and the mighty group at foofus.net" fullword
condition:
1 of them
}
rule PScan_Portscan_1 {
meta:
description = "PScan - Port Scanner"
author = "F. Roth"
score = 50
strings:
$a = "00050;0F0M0X0a0v0}0"
$b = "vwgvwgvP76"
$c = "Pr0PhOFyP"
condition:
all of them
}
rule HackTool_Samples {
meta:
description = "Hacktool"
score = 50
strings:
$a = "Unable to uninstall the fgexec service"
$b = "Unable to set socket to sniff"
$c = "Failed to load SAM functions"
$d = "Dump system passwords"
$e = "Error opening sam hive or not valid file"
$f = "Couldn't find LSASS pid"
$g = "samdump.dll"
$h = "WPEPRO SEND PACKET"
$i = "WPE-C1467211-7C89-49c5-801A-1D048E4014C4"
$j = "Usage: unshadow PASSWORD-FILE SHADOW-FILE"
$k = "arpspoof\\Debug"
$l = "Success: The log has been cleared"
$m = "clearlogs [\\\\computername"
$n = "DumpUsers 1."
$o = "dictionary attack with specified dictionary file"
$p = "by Objectif Securite"
$q = "objectif-securite"
$r = "Cannot query LSA Secret on remote host"
$s = "Cannot write to process memory on remote host"
$t = "Cannot start PWDumpX service on host"
$u = "usage: %s <system hive> <security hive>"
$v = "username:domainname:LMhash:NThash"
$w = "<server_name_or_ip> | -f <server_list_file> [username] [password]"
$x = "Impersonation Tokens Available"
$y = "failed to parse pwdump format string"
$z = "Dumping password"
condition:
1 of them
}
/* Disclosed hack tool set */
rule Fierce2
{
meta:
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
description = "This signature detects the Fierce2 domain scanner"
date = "07/2014"
score = 60
strings:
$s1 = "$tt_xml->process( 'end_domainscan.tt', $end_domainscan_vars,"
condition:
1 of them
}
rule Ncrack
{
meta:
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
description = "This signature detects the Ncrack brute force tool"
date = "07/2014"
score = 60
strings:
$s1 = "NcrackOutputTable only supports adding up to 4096 to a cell via"
condition:
1 of them
}
rule SQLMap
{
meta:
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
description = "This signature detects the SQLMap SQL injection tool"
date = "07/2014"
score = 60
strings:
$s1 = "except SqlmapBaseException, ex:"
condition:
1 of them
}
rule PortScanner {
meta:
description = "Auto-generated rule on file PortScanner.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "b381b9212282c0c650cb4b0323436c63"
strings:
$s0 = "Scan Ports Every"
$s3 = "Scan All Possible Ports!"
condition:
all of them
}
rule DomainScanV1_0 {
meta:
description = "Auto-generated rule on file DomainScanV1_0.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "aefcd73b802e1c2bdc9b2ef206a4f24e"
strings:
$s0 = "dIJMuX$aO-EV"
$s1 = "XELUxP\"-\\"
$s2 = "KaR\"U'}-M,."
$s3 = "V.)\\ZDxpLSav"
$s4 = "Decompress error"
$s5 = "Can't load library"
$s6 = "Can't load function"
$s7 = "com0tl32:.d"
condition:
all of them
}
rule MooreR_Port_Scanner {
meta:
description = "Auto-generated rule on file MooreR Port Scanner.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "376304acdd0b0251c8b19fea20bb6f5b"
strings:
$s0 = "Description|"
$s3 = "soft Visual Studio\\VB9yp"
$s4 = "adj_fptan?4"
$s7 = "DOWS\\SyMem32\\/o"
condition:
all of them
}
rule NetBIOS_Name_Scanner {
meta:
description = "Auto-generated rule on file NetBIOS Name Scanner.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "888ba1d391e14c0a9c829f5a1964ca2c"
strings:
$s0 = "IconEx"
$s2 = "soft Visual Stu"
$s4 = "NBTScanner!y&"
condition:
all of them
}
rule FeliksPack3___Scanners_ipscan {
meta:
description = "Auto-generated rule on file ipscan.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "6c1bcf0b1297689c8c4c12cc70996a75"
strings:
$s2 = "WCAP;}ECTED"
$s4 = "NotSupported"
$s6 = "SCAN.VERSION{_"
condition:
all of them
}
rule CGISscan_CGIScan {
meta:
description = "Auto-generated rule on file CGIScan.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "338820e4e8e7c943074d5a5bc832458a"
strings:
$s1 = "Wang Products" fullword wide
$s2 = "WSocketResolveHost: Cannot convert host address '%s'"
$s3 = "tcp is the only protocol supported thru socks server"
condition:
all of ($s*)
}
rule IP_Stealing_Utilities {
meta:
description = "Auto-generated rule on file IP Stealing Utilities.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "65646e10fb15a2940a37c5ab9f59c7fc"
strings:
$s0 = "DarkKnight"
$s9 = "IPStealerUtilities"
condition:
all of them
}
rule SuperScan4 {
meta:
description = "Auto-generated rule on file SuperScan4.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "78f76428ede30e555044b83c47bc86f0"
strings:
$s2 = " td class=\"summO1\">"
$s6 = "REM'EBAqRISE"
$s7 = "CorExitProcess'msc#e"
condition:
all of them
}
rule PortRacer {
meta:
description = "Auto-generated rule on file PortRacer.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "2834a872a0a8da5b1be5db65dfdef388"
strings:
$s0 = "Auto Scroll BOTH Text Boxes"
$s4 = "Start/Stop Portscanning"
$s6 = "Auto Save LogFile by pressing STOP"
condition:
all of them
}
rule scanarator {
meta:
description = "Auto-generated rule on file scanarator.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "848bd5a518e0b6c05bd29aceb8536c46"
strings:
$s4 = "GET /scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir HTTP/1.0"
condition:
all of them
}
rule aolipsniffer {
meta:
description = "Auto-generated rule on file aolipsniffer.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "51565754ea43d2d57b712d9f0a3e62b8"
strings:
$s0 = "C:\\Program Files\\Microsoft Visual Studio\\VB98\\VB6.OLB"
$s1 = "dwGetAddressForObject"
$s2 = "Color Transfer Settings"
$s3 = "FX Global Lighting Angle"
$s4 = "Version compatibility info"
$s5 = "New Windows Thumbnail"
$s6 = "Layer ID Generator Base"
$s7 = "Color Halftone Settings"
$s8 = "C:\\WINDOWS\\SYSTEM\\MSWINSCK.oca"
condition:
all of them
}
rule _Bitchin_Threads_ {
meta:
description = "Auto-generated rule on file =Bitchin Threads=.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "7491b138c1ee5a0d9d141fbfd1f0071b"
strings:
$s0 = "DarKPaiN"
$s1 = "=BITCHIN THREADS"
condition:
all of them
}
rule cgis4_cgis4 {
meta:
description = "Auto-generated rule on file cgis4.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "d658dad1cd759d7f7d67da010e47ca23"
strings:
$s0 = ")PuMB_syJ"
$s1 = "&,fARW>yR"
$s2 = "m3hm3t_rullaz"
$s3 = "7Projectc1"
$s4 = "Ten-GGl\""
$s5 = "/Moziqlxa"
condition:
all of them
}
rule portscan {
meta:
description = "Auto-generated rule on file portscan.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "a8bfdb2a925e89a281956b1e3bb32348"
strings:
$s5 = "0 :SCAN BEGUN ON PORT:"
$s6 = "0 :PORTSCAN READY."
condition:
all of them
}
rule ProPort_zip_Folder_ProPort {
meta:
description = "Auto-generated rule on file ProPort.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "c1937a86939d4d12d10fc44b7ab9ab27"
strings:
$s0 = "Corrupt Data!"
$s1 = "K4p~omkIz"
$s2 = "DllTrojanScan"
$s3 = "GetDllInfo"
$s4 = "Compressed by Petite (c)1999 Ian Luck."
$s5 = "GetFileCRC32"
$s6 = "GetTrojanNumber"
$s7 = "TFAKAbout"
condition:
all of them
}
rule StealthWasp_s_Basic_PortScanner_v1_2 {
meta:
description = "Auto-generated rule on file StealthWasp's Basic PortScanner v1.2.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "7c0f2cab134534cd35964fe4c6a1ff00"
strings:
$s1 = "Basic PortScanner"
$s6 = "Now scanning port:"
condition:
all of them
}
rule BluesPortScan {
meta:
description = "Auto-generated rule on file BluesPortScan.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "6292f5fc737511f91af5e35643fc9eef"
strings:
$s0 = "This program was made by Volker Voss"
$s1 = "JiBOo~SSB"
condition:
all of them
}
rule scanarator_iis {
meta:
description = "Auto-generated rule on file iis.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "3a8fc02c62c8dd65e038cc03e5451b6e"
strings:
$s0 = "example: iis 10.10.10.10"
$s1 = "send error"
condition:
all of them
}
rule stealth_Stealth {
meta:
description = "Auto-generated rule on file Stealth.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "8ce3a386ce0eae10fc2ce0177bbc8ffa"
strings:
$s3 = "<table width=\"60%\" bgcolor=\"black\" cellspacing=\"0\" cellpadding=\"2\" border=\"1\" bordercolor=\"white\"><tr><td>"
$s6 = "This tool may be used only by system administrators. I am not responsible for "
condition:
all of them
}
rule Angry_IP_Scanner_v2_08_ipscan {
meta:
description = "Auto-generated rule on file ipscan.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "70cf2c09776a29c3e837cb79d291514a"
strings:
$s0 = "_H/EnumDisplay/"
$s5 = "ECTED.MSVCRT0x"
$s8 = "NotSupported7"
condition:
all of them
}
rule crack_Loader {
meta:
description = "Auto-generated rule on file Loader.exe"
author = "yarGen Yara Rule Generator by Florian Roth"
hash = "f4f79358a6c600c1f0ba1f7e4879a16d"
strings:
$s0 = "NeoWait.exe"
$s1 = "RRRRRRRW"
condition:
all of them
}
rule CN_GUI_Scanner {
meta:
description = "Detects an unknown GUI scanner tool - CN background"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
hash = "3c67bbb1911cdaef5e675c56145e1112"
score = 65
date = "04.10.2014"
strings:
$s1 = "good.txt" fullword ascii
$s2 = "IP.txt" fullword ascii
$s3 = "xiaoyuer" fullword ascii
$s0w = "ssh(" fullword wide
$s1w = ").exe" fullword wide
condition:
all of them
}
rule CN_Packed_Scanner {
meta:
description = "Suspiciously packed executable"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
hash = "6323b51c116a77e3fba98f7bb7ff4ac6"
score = 40
date = "06.10.2014"
strings:
$s1 = "kernel32.dll" fullword ascii
$s2 = "CRTDLL.DLL" fullword ascii
$s3 = "__GetMainArgs" fullword ascii
$s4 = "WS2_32.DLL" fullword ascii
condition:
all of them and filesize < 180KB and filesize > 70KB
}
rule Tiny_Network_Tool_Generic {
meta:
description = "Tiny tool with suspicious function imports. (Rule based on WinEggDrop Scanner samples)"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "08.10.2014"
score = 40
type = "file"
hash0 = "9e1ab25a937f39ed8b031cd8cfbc4c07"
hash1 = "cafc31d39c1e4721af3ba519759884b9"
hash2 = "8e635b9a1e5aa5ef84bfa619bd2a1f92"
strings:
$magic = { 4d 5a }
$s0 = "KERNEL32.DLL" fullword ascii
$s1 = "CRTDLL.DLL" fullword ascii
$s3 = "LoadLibraryA" fullword ascii
$s4 = "GetProcAddress" fullword ascii
$y1 = "WININET.DLL" fullword ascii
$y2 = "atoi" fullword ascii
$x1 = "ADVAPI32.DLL" fullword ascii
$x2 = "USER32.DLL" fullword ascii
$x3 = "wsock32.dll" fullword ascii
$x4 = "FreeSid" fullword ascii
$x5 = "atoi" fullword ascii
$z1 = "ADVAPI32.DLL" fullword ascii
$z2 = "USER32.DLL" fullword ascii
$z3 = "FreeSid" fullword ascii
$z4 = "ToAscii" fullword ascii
condition:
( $magic at 0 ) and all of ($s*) and ( all of ($y*) or all of ($x*) or all of ($z*) ) and filesize < 15KB
}
rule Beastdoor_Backdoor {
meta:
description = "Detects the backdoor Beastdoor"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 55
hash = "5ab10dda548cb821d7c15ebcd0a9f1ec6ef1a14abcc8ad4056944d060c49535a"
strings:
$s0 = "Redirect SPort RemoteHost RPort -->Port Redirector" fullword
$s1 = "POST /scripts/WWPMsg.dll HTTP/1.0" fullword
$s2 = "http://IP/a.exe a.exe -->Download A File" fullword
$s7 = "Host: wwp.mirabilis.com:80" fullword
$s8 = "%s -Set Port PortNumber -->Set The Service Port" fullword
$s11 = "Shell -->Get A Shell" fullword
$s14 = "DeleteService ServiceName -->Delete A Service" fullword
$s15 = "Getting The UserName(%c%s%c)-->ID(0x%s) Successfully" fullword
$s17 = "%s -Set ServiceName ServiceName -->Set The Service Name" fullword
condition:
2 of them
}
rule Powershell_Netcat {
meta:
description = "Detects a Powershell version of the Netcat network hacking tool"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 60
date = "10.10.2014"
strings:
$s0 = "[ValidateRange(1, 65535)]" fullword
$s1 = "$Client = New-Object -TypeName System.Net.Sockets.TcpClient" fullword
$s2 = "$Buffer = New-Object -TypeName System.Byte[] -ArgumentList $Client.ReceiveBufferSize" fullword
condition:
all of them
}
rule Chinese_Hacktool_1014 {
meta:
description = "Detects a chinese hacktool with unknown use"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 60
date = "10.10.2014"
hash = "98c07a62f7f0842bcdbf941170f34990"
strings:
$s0 = "IEXT2_IDC_HORZLINEMOVECURSOR" fullword wide
$s1 = "msctls_progress32" fullword wide
$s2 = "Reply-To: %s" fullword ascii
$s3 = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" fullword ascii
$s4 = "html htm htx asp" fullword ascii
condition:
all of them
}
rule CN_Hacktool_BAT_PortsOpen {
meta:
description = "Detects a chinese BAT hacktool for local port evaluation"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 60
date = "12.10.2014"
strings:
$s0 = "for /f \"skip=4 tokens=2,5\" %%a in ('netstat -ano -p TCP') do (" ascii
$s1 = "in ('tasklist /fi \"PID eq %%b\" /FO CSV') do " ascii
$s2 = "@echo off" ascii
condition:
all of them
}
rule CN_Hacktool_SSPort_Portscanner {
meta:
description = "Detects a chinese Portscanner named SSPort"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 70
date = "12.10.2014"
strings:
$s0 = "Golden Fox" fullword wide
$s1 = "Syn Scan Port" fullword wide
$s2 = "CZ88.NET" fullword wide
condition:
all of them
}
rule CN_Hacktool_ScanPort_Portscanner {
meta:
description = "Detects a chinese Portscanner named ScanPort"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 70
date = "12.10.2014"
strings:
$s0 = "LScanPort" fullword wide
$s1 = "LScanPort Microsoft" fullword wide
$s2 = "www.yupsoft.com" fullword wide
condition:
all of them
}
rule CN_Hacktool_S_EXE_Portscanner {
meta:
description = "Detects a chinese Portscanner named s.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 70
date = "12.10.2014"
strings:
$s0 = "\\Result.txt" fullword ascii
$s1 = "By:ZT QQ:376789051" fullword ascii
$s2 = "(http://www.eyuyan.com)" fullword wide
condition:
all of them
}
rule CN_Hacktool_MilkT_BAT {
meta:
description = "Detects a chinese Portscanner named MilkT - shipped BAT"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 70
date = "12.10.2014"
strings:
$s0 = "for /f \"eol=P tokens=1 delims= \" %%i in (s1.txt) do echo %%i>>s2.txt" ascii
$s1 = "if not \"%Choice%\"==\"\" set Choice=%Choice:~0,1%" ascii
condition:
all of them
}
rule CN_Hacktool_MilkT_Scanner {
meta:
description = "Detects a chinese Portscanner named MilkT"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 60
date = "12.10.2014"
strings:
$s0 = "Bf **************" ascii fullword
$s1 = "forming Time: %d/" ascii
$s2 = "KERNEL32.DLL" ascii fullword
$s3 = "CRTDLL.DLL" ascii fullword
$s4 = "WS2_32.DLL" ascii fullword
$s5 = "GetProcAddress" ascii fullword
$s6 = "atoi" ascii fullword
condition:
all of them
}
rule CN_Hacktool_1433_Scanner {
meta:
description = "Detects a chinese MSSQL scanner"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 40
date = "12.10.2014"
strings:
$magic = { 4d 5a }
$s0 = "1433" wide fullword
$s1 = "1433V" wide
$s2 = "del Weak1.txt" ascii fullword
$s3 = "del Attack.txt" ascii fullword
$s4 = "del /s /Q C:\\Windows\\system32\\doors\\" fullword ascii
$s5 = "!&start iexplore http://www.crsky.com/soft/4818.html)" fullword ascii
condition:
( $magic at 0 ) and all of ($s*)
}
rule CN_Hacktool_1433_Scanner_Comp2 {
meta:
description = "Detects a chinese MSSQL scanner - component 2"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 40
date = "12.10.2014"
strings:
$magic = { 4d 5a }
$s0 = "1433" wide fullword
$s1 = "1433V" wide
$s2 = "UUUMUUUfUUUfUUUfUUUfUUUfUUUfUUUfUUUfUUUfUUUfUUUMUUU" ascii fullword
condition:
( $magic at 0 ) and all of ($s*)
}
rule WCE_Modified_1_1014 {
meta:
description = "Modified (packed) version of Windows Credential Editor"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
hash = "09a412ac3c85cedce2642a19e99d8f903a2e0354"
score = 70
strings:
$s0 = "LSASS.EXE" fullword ascii
$s1 = "_CREDS" ascii
$s9 = "Using WCE " ascii
condition:
all of them
}
rule ReactOS_cmd_valid {
meta:
description = "ReactOS cmd.exe with correct file name - maybe packed with software or part of hacker toolset"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
reference = "http://www.elifulkerson.com/articles/suzy-sells-cmd-shells.php"
score = 30
hash = "b88f050fa69d85af3ff99af90a157435296cbb6e"
strings:
$s1 = "ReactOS Command Processor" fullword wide
$s2 = "Copyright (C) 1994-1998 Tim Norman and others" fullword wide
$s3 = "Eric Kohl and others" fullword wide
$s4 = "ReactOS Operating System" fullword wide
condition:
all of ($s*)
}
rule iKAT_wmi_rundll {
meta:
description = "This exe will attempt to use WMI to Call the Win32_Process event to spawn rundll - file wmi_rundll.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
score = 65
reference = "http://ikat.ha.cked.net/Windows/functions/ikatfiles.html"
hash = "97c4d4e6a644eed5aa12437805e39213e494d120"
strings:
$s0 = "This operating system is not supported." fullword ascii
$s1 = "Error!" fullword ascii
$s2 = "Win32 only!" fullword ascii
$s3 = "COMCTL32.dll" fullword ascii
$s4 = "[LordPE]" ascii
$s5 = "CRTDLL.dll" fullword ascii
$s6 = "VBScript" fullword ascii
$s7 = "CoUninitialize" fullword ascii
condition:
all of them and filesize < 15KB
}
rule iKAT_revelations {
meta:
description = "iKAT hack tool showing the content of password fields - file revelations.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
score = 75
reference = "http://ikat.ha.cked.net/Windows/functions/ikatfiles.html"
hash = "c4e217a8f2a2433297961561c5926cbd522f7996"
strings:
$s0 = "The RevelationHelper.DLL file is corrupt or missing." fullword ascii
$s8 = "BETAsupport@snadboy.com" fullword wide
$s9 = "support@snadboy.com" fullword wide
$s14 = "RevelationHelper.dll" fullword ascii
condition:
all of them
}
rule iKAT_priv_esc_tasksch {
meta:
description = "Task Schedulder Local Exploit - Windows local priv-esc using Task Scheduler, published by webDevil. Supports Windows 7 and Vista."
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
score = 75
reference = "http://ikat.ha.cked.net/Windows/functions/ikatfiles.html"
hash = "84ab94bff7abf10ffe4446ff280f071f9702cf8b"
strings:
$s0 = "objShell.Run \"schtasks /change /TN wDw00t /disable\",,True" fullword ascii
$s3 = "objShell.Run \"schtasks /run /TN wDw00t\",,True" fullword ascii
$s4 = "'objShell.Run \"cmd /c copy C:\\windows\\system32\\tasks\\wDw00t .\",,True" fullword ascii
$s6 = "a.WriteLine (\"schtasks /delete /f /TN wDw00t\")" fullword ascii
$s7 = "a.WriteLine (\"net user /add ikat ikat\")" fullword ascii
$s8 = "a.WriteLine (\"cmd.exe\")" fullword ascii
$s9 = "strFileName=\"C:\\windows\\system32\\tasks\\wDw00t\"" fullword ascii
$s10 = "For n = 1 To (Len (hexXML) - 1) step 2" fullword ascii
$s13 = "output.writeline \" Should work on Vista/Win7/2008 x86/x64\"" fullword ascii
$s11 = "Set objExecObject = objShell.Exec(\"cmd /c schtasks /query /XML /TN wDw00t\")" fullword ascii
$s12 = "objShell.Run \"schtasks /create /TN wDw00t /sc monthly /tr \"\"\"+biatchFile+\"" ascii
$s14 = "a.WriteLine (\"net localgroup administrators /add v4l\")" fullword ascii
$s20 = "Set ts = fso.createtextfile (\"wDw00t.xml\")" fullword ascii
condition:
2 of them
}
rule iKAT_command_lines_agent {
meta:
description = "iKAT hack tools set agent - file ikat.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
score = 75
reference = "http://ikat.ha.cked.net/Windows/functions/ikatfiles.html"
hash = "c802ee1e49c0eae2a3fc22d2e82589d857f96d94"
strings:
$s0 = "Extended Module: super mario brothers" fullword ascii
$s1 = "Extended Module: " fullword ascii
$s3 = "ofpurenostalgicfeeling" fullword ascii
$s8 = "-supermariobrotheretic" fullword ascii
$s9 = "!http://132.147.96.202:80" fullword ascii
$s12 = "iKAT Exe Template" fullword ascii
$s15 = "withadancyflavour.." fullword ascii
$s16 = "FastTracker v2.00 " fullword ascii
condition:
4 of them
}
rule iKAT_cmd_as_dll {
meta:
description = "iKAT toolset file cmd.dll ReactOS file cloaked"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
score = 65
reference = "http://ikat.ha.cked.net/Windows/functions/ikatfiles.html"
hash = "b5d0ba941efbc3b5c97fe70f70c14b2050b8336a"
strings:
$s1 = "cmd.exe" fullword wide
$s2 = "ReactOS Development Team" fullword wide
$s3 = "ReactOS Command Processor" fullword wide
$ext = "extension: .dll" nocase
condition:
all of ($s*) and $ext
}
rule iKAT_tools_nmap {
meta:
description = "Generic rule for NMAP - based on NMAP 4 standalone"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
score = 50
reference = "http://ikat.ha.cked.net/Windows/functions/ikatfiles.html"
hash = "d0543f365df61e6ebb5e345943577cc40fca8682"
strings:
$s0 = "Insecure.Org" fullword wide
$s1 = "Copyright (c) Insecure.Com" fullword wide
$s2 = "nmap" fullword nocase
$s3 = "Are you alert enough to be using Nmap? Have some coffee or Jolt(tm)." ascii
condition:
all of them
}
rule iKAT_startbar {
meta:
description = "Tool to hide unhide the windows startbar from command line - iKAT hack tools - file startbar.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
score = 50
reference = "http://ikat.ha.cked.net/Windows/functions/ikatfiles.html"
hash = "0cac59b80b5427a8780168e1b85c540efffaf74f"
strings:
$s2 = "Shinysoft Limited1" fullword ascii
$s3 = "Shinysoft Limited0" fullword ascii
$s4 = "Wellington1" fullword ascii
$s6 = "Wainuiomata1" fullword ascii
$s8 = "56 Wright St1" fullword ascii
$s9 = "UTN-USERFirst-Object" fullword ascii
$s10 = "New Zealand1" fullword ascii
condition:
all of them
}
rule iKAT_Tool_Generic {
meta:
description = "Generic Rule for hack tool iKAT files gpdisable.exe, kitrap0d.exe, uacpoc.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "05.11.14"
score = 55
reference = "http://ikat.ha.cked.net/Windows/functions/ikatfiles.html"
super_rule = 1
hash0 = "814c126f21bc5e993499f0c4e15b280bf7c1c77f"
hash1 = "75f5aed1e719443a710b70f2004f34b2fe30f2a9"
hash2 = "b65a460d015fd94830d55e8eeaf6222321e12349"
strings:
$s0 = "<IconFile>C:\\WINDOWS\\App.ico</IconFile>" fullword
$s1 = "Failed to read the entire file" fullword
$s4 = "<VersionCreatedBy>14.4.0</VersionCreatedBy>" fullword
$s8 = "<ProgressCaption>Run &quot;executor.bat&quot; once the shell has spawned.</P"
$s9 = "Running Zip pipeline..." fullword
$s10 = "<FinTitle />" fullword
$s12 = "<AutoTemp>0</AutoTemp>" fullword
$s14 = "<DefaultDir>%TEMP%</DefaultDir>" fullword
$s15 = "AES Encrypting..." fullword
$s20 = "<UnzipDir>%TEMP%</UnzipDir>" fullword
condition:
all of them
}
rule BypassUac2 {
meta:
description = "Auto-generated rule - file BypassUac2.zip"
author = "yarGen Yara Rule Generator"
hash = "ef3e7dd2d1384ecec1a37254303959a43695df61"
strings:
$s0 = "/BypassUac/BypassUac/BypassUac_Utils.cpp" fullword ascii
$s1 = "/BypassUac/BypassUacDll/BypassUacDll.aps" fullword ascii
$s3 = "/BypassUac/BypassUac/BypassUac.ico" fullword ascii
condition:
all of them
}
rule BypassUac_3 {
meta:
description = "Auto-generated rule - file BypassUacDll.dll"
author = "yarGen Yara Rule Generator"
hash = "1974aacd0ed987119999735cad8413031115ce35"
strings:
$s0 = "BypassUacDLL.dll" fullword wide
$s1 = "\\Release\\BypassUacDll" ascii
$s3 = "Win7ElevateDLL" fullword wide
$s7 = "BypassUacDLL" fullword wide
condition:
3 of them
}
rule BypassUac_9 {
meta:
description = "Auto-generated rule - file BypassUac.zip"
author = "yarGen Yara Rule Generator"
hash = "93c2375b2e4f75fc780553600fbdfd3cb344e69d"
strings:
$s0 = "/x86/BypassUac.exe" fullword ascii
$s1 = "/x64/BypassUac.exe" fullword ascii
$s2 = "/x86/BypassUacDll.dll" fullword ascii
$s3 = "/x64/BypassUacDll.dll" fullword ascii
$s15 = "BypassUac" fullword ascii
condition:
all of them
}
rule BypassUacDll_6 {
meta:
description = "Auto-generated rule - file BypassUacDll.aps"
author = "yarGen Yara Rule Generator"
hash = "58d7b24b6870cb7f1ec4807d2f77dd984077e531"
strings:
$s3 = "BypassUacDLL.dll" fullword wide
$s4 = "AFX_IDP_COMMAND_FAILURE" fullword ascii
condition:
all of them
}
rule BypassUac_EXE {
meta:
description = "Auto-generated rule - file BypassUacDll.aps"
author = "yarGen Yara Rule Generator"
hash = "58d7b24b6870cb7f1ec4807d2f77dd984077e531"
strings:
$s1 = "Wole32.dll" wide
$s3 = "System32\\migwiz" wide
$s4 = "System32\\migwiz\\CRYPTBASE.dll" wide
$s5 = "Elevation:Administrator!new:" wide
$s6 = "BypassUac" wide
condition:
all of them
}
rule APT_Proxy_Malware_Packed_dev
{
meta:
author = "FRoth"
date = "2014-11-10"
description = "APT Malware - Proxy"
hash = "6b6a86ceeab64a6cb273debfa82aec58"
score = 50
strings:
$string0 = "PECompact2" fullword
$string1 = "[LordPE]"
$string2 = "steam_ker.dll"
condition:
all of them
}
rule Tzddos_DDoS_Tool_CN {
meta:
description = "Disclosed hacktool set - file tzddos"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "d4c517eda5458247edae59309453e0ae7d812f8e"
strings:
$s0 = "for /f %%a in (host.txt) do (" fullword ascii
$s1 = "for /f \"eol=S tokens=1 delims= \" %%i in (s2.txt) do echo %%i>>host.txt" fullword ascii
$s2 = "del host.txt /q" fullword ascii
$s3 = "for /f \"eol=- tokens=1 delims= \" %%i in (result.txt) do echo %%i>>s1.txt" fullword ascii
$s4 = "start Http.exe %%a %http%" fullword ascii
$s5 = "for /f \"eol=P tokens=1 delims= \" %%i in (s1.txt) do echo %%i>>s2.txt" fullword ascii
$s6 = "del Result.txt s2.txt s1.txt " fullword ascii
condition:
all of them
}
rule Ncat_Hacktools_CN {
meta:
description = "Disclosed hacktool set - file nc.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "001c0c01c96fa56216159f83f6f298755366e528"
strings:
$s0 = "nc -l -p port [options] [hostname] [port]" fullword ascii
$s2 = "nc [-options] hostname port[s] [ports] ... " fullword ascii
$s3 = "gethostpoop fuxored" fullword ascii
$s6 = "VERNOTSUPPORTED" fullword ascii
$s7 = "%s [%s] %d (%s)" fullword ascii
$s12 = " `--%s' doesn't allow an argument" fullword ascii
condition:
all of them
}
rule MS08_067_Exploit_Hacktools_CN {
meta:
description = "Disclosed hacktool set - file cs.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "a3e9e0655447494253a1a60dbc763d9661181322"
strings:
$s0 = "MS08-067 Exploit for CN by EMM@ph4nt0m.org" fullword ascii
$s3 = "Make SMB Connection error:%d" fullword ascii
$s5 = "Send Payload Over!" fullword ascii
$s7 = "Maybe Patched!" fullword ascii
$s8 = "RpcExceptionCode() = %u" fullword ascii
$s11 = "ph4nt0m" fullword wide
$s12 = "\\\\%s\\IPC" ascii
condition:
4 of them
}
rule Hacktools_CN_Burst_sql {
meta:
description = "Disclosed hacktool set - file sql.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "d5139b865e99b7a276af7ae11b14096adb928245"
strings:
$s0 = "s.exe %s %s %s %s %d /save" fullword ascii
$s2 = "s.exe start error...%d" fullword ascii
$s4 = "EXEC sp_addextendedproc xp_cmdshell,'xplog70.dll'" fullword ascii
$s7 = "EXEC master..xp_cmdshell 'wscript.exe cc.js'" fullword ascii
$s10 = "Result.txt" fullword ascii
$s11 = "Usage:sql.exe [options]" fullword ascii
$s17 = "%s root %s %d error" fullword ascii
$s18 = "Pass.txt" fullword ascii
$s20 = "SELECT sillyr_at_gmail_dot_com INTO DUMPFILE '%s\\\\sillyr_x.so' FROM sillyr_x" fullword ascii
condition:
6 of them
}
rule Hacktools_CN_Panda_445TOOL {
meta:
description = "Disclosed hacktool set - file 445TOOL.rar"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "92050ba43029f914696289598cf3b18e34457a11"
strings:
$s0 = "scan.bat" fullword ascii
$s1 = "Http.exe" fullword ascii
$s2 = "GOGOGO.bat" fullword ascii
$s3 = "ip.txt" fullword ascii
condition:
all of them
}
rule Hacktools_CN_Panda_445 {
meta:
description = "Disclosed hacktool set - file 445.rar"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "a61316578bcbde66f39d88e7fc113c134b5b966b"
strings:
$s0 = "for /f %%i in (ips.txt) do (start cmd.bat %%i)" fullword ascii
$s1 = "445\\nc.exe" fullword ascii
$s2 = "445\\s.exe" fullword ascii
$s3 = "cs.exe %1" fullword ascii
$s4 = "445\\cs.exe" fullword ascii
$s5 = "445\\ip.txt" fullword ascii
$s6 = "445\\cmd.bat" fullword ascii
$s9 = "@echo off" fullword ascii
condition:
all of them
}
rule Hacktools_CN_WinEggDrop {
meta:
description = "Disclosed hacktool set - file s.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "7665011742ce01f57e8dc0a85d35ec556035145d"
strings:
$s0 = "Normal Scan: About To Scan %u IP For %u Ports Using %d Thread" fullword ascii
$s2 = "SYN Scan: About To Scan %u IP For %u Ports Using %d Thread" fullword ascii
$s6 = "Example: %s TCP 12.12.12.12 12.12.12.254 21 512 /Banner" fullword ascii
$s8 = "Something Wrong About The Ports" fullword ascii
$s9 = "Performing Time: %d/%d/%d %d:%d:%d --> " fullword ascii
$s10 = "Example: %s TCP 12.12.12.12/24 80 512 /T8 /Save" fullword ascii
$s12 = "%u Ports Scanned.Taking %d Threads " fullword ascii
$s13 = "%-16s %-5d -> \"%s\"" fullword ascii
$s14 = "SYN Scan Can Only Perform On WIN 2K Or Above" fullword ascii
$s17 = "SYN Scan: About To Scan %s:%d Using %d Thread" fullword ascii
$s18 = "Scan %s Complete In %d Hours %d Minutes %d Seconds. Found %u Open Ports" fullword ascii
condition:
5 of them
}
rule Hacktools_CN_Scan_BAT {
meta:
description = "Disclosed hacktool set - file scan.bat"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "6517d7c245f1300e42f7354b0fe5d9666e5ce52a"
strings:
$s0 = "for /f %%a in (host.txt) do (" fullword ascii
$s1 = "for /f \"eol=S tokens=1 delims= \" %%i in (s2.txt) do echo %%i>>host.txt" fullword ascii
$s2 = "del host.txt /q" fullword ascii
$s3 = "for /f \"eol=- tokens=1 delims= \" %%i in (result.txt) do echo %%i>>s1.txt" fullword ascii
$s4 = "start Http.exe %%a %http%" fullword ascii
$s5 = "for /f \"eol=P tokens=1 delims= \" %%i in (s1.txt) do echo %%i>>s2.txt" fullword ascii
condition:
5 of them
}
rule Hacktools_CN_Panda_Burst {
meta:
description = "Disclosed hacktool set - file Burst.rar"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "ce8e3d95f89fb887d284015ff2953dbdb1f16776"
strings:
$s0 = "@sql.exe -f ip.txt -m syn -t 3306 -c 5000 -u http://60.15.124.106:63389/tasksvr." ascii
condition:
all of them
}
rule Hacktools_CN_445_cmd {
meta:
description = "Disclosed hacktool set - file cmd.bat"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "69b105a3aec3234819868c1a913772c40c6b727a"
strings:
$bat = "@echo off" fullword ascii
$s0 = "cs.exe %1" fullword ascii
$s2 = "nc %1 4444" fullword ascii
condition:
$bat at 0 and all of ($s*)
}
rule Hacktools_CN_GOGOGO_Bat {
meta:
description = "Disclosed hacktool set - file GOGOGO.bat"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "4bd4f5b070acf7fe70460d7eefb3623366074bbd"
strings:
$s0 = "for /f \"delims=\" %%x in (endend.txt) do call :lisoob %%x" fullword ascii
$s1 = "http://www.tzddos.com/ -------------------------------------------->byebye.txt" fullword ascii
$s2 = "ren %systemroot%\\system32\\drivers\\tcpip.sys tcpip.sys.bak" fullword ascii
$s4 = "IF /I \"%wangle%\"==\"\" ( goto start ) else ( goto erromm )" fullword ascii
$s5 = "copy *.tzddos scan.bat&del *.tzddos" fullword ascii
$s6 = "del /f tcpip.sys" fullword ascii
$s9 = "if /i \"%CB%\"==\"www.tzddos.com\" ( goto mmbat ) else ( goto wangle )" fullword ascii
$s10 = "call scan.bat" fullword ascii
$s12 = "IF /I \"%erromm%\"==\"\" ( goto start ) else ( goto zuihoujh )" fullword ascii
$s13 = "IF /I \"%zuihoujh%\"==\"\" ( goto start ) else ( goto laji )" fullword ascii
$s18 = "sc config LmHosts start= auto" fullword ascii
$s19 = "copy tcpip.sys %systemroot%\\system32\\drivers\\tcpip.sys > nul" fullword ascii
$s20 = "ren %systemroot%\\system32\\dllcache\\tcpip.sys tcpip.sys.bak" fullword ascii
condition:
3 of them
}
rule Hacktools_CN_Burst_pass {
meta:
description = "Disclosed hacktool set - file pass.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "55a05cf93dbd274355d798534be471dff26803f9"
strings:
$s0 = "123456.com" fullword ascii
$s1 = "123123.com" fullword ascii
$s2 = "360.com" fullword ascii
$s3 = "123.com" fullword ascii
$s4 = "juso.com" fullword ascii
$s5 = "sina.com" fullword ascii
$s7 = "changeme" fullword ascii
$s8 = "master" fullword ascii
$s9 = "google.com" fullword ascii
$s10 = "chinanet" fullword ascii
$s12 = "lionking" fullword ascii
condition:
all of them
}
rule Hacktools_CN_JoHor_Posts_Killer {
meta:
description = "Disclosed hacktool set - file JoHor_Posts_Killer.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "d157f9a76f9d72dba020887d7b861a05f2e56b6a"
strings:
$s0 = "Multithreading Posts_Send Killer" fullword ascii
$s3 = "GET [Access Point] HTTP/1.1" fullword ascii
$s6 = "The program's need files was not exist!" fullword ascii
$s7 = "JoHor_Posts_Killer" fullword wide
$s8 = "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)" fullword ascii
$s10 = " ( /s ) :" fullword ascii
$s11 = "forms.vbp" fullword ascii
$s12 = "forms.vcp" fullword ascii
$s13 = "Software\\FlySky\\E\\Install" fullword ascii
condition:
5 of them
}
rule Hacktools_CN_Panda_tesksd {
meta:
description = "Disclosed hacktool set - file tesksd.jpg"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "922147b3e1e6cf1f5dd5f64a4e34d28bdc9128cb"
strings:
$s0 = "name=\"Microsoft.Windows.Common-Controls\" " fullword ascii
$s1 = "ExeMiniDownload.exe" fullword wide
$s16 = "POST %Hs" fullword ascii
condition:
all of them
}
rule Hacktools_CN_Http {
meta:
description = "Disclosed hacktool set - file Http.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "788bf0fdb2f15e0c628da7056b4e7b1a66340338"
strings:
$s0 = "RPCRT4.DLL" fullword ascii
$s1 = "WNetAddConnection2A" fullword ascii
$s2 = "NdrPointerBufferSize" fullword ascii
$s3 = "_controlfp" fullword ascii
condition:
all of them and filesize < 10KB
}
rule Hacktools_CN_Burst_Start {
meta:
description = "Disclosed hacktool set - file Start.bat - DoS tool"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "75d194d53ccc37a68286d246f2a84af6b070e30c"
strings:
$s0 = "for /f \"eol= tokens=1,2 delims= \" %%i in (ip.txt) do (" fullword ascii
$s1 = "Blast.bat /r 600" fullword ascii
$s2 = "Blast.bat /l Blast.bat" fullword ascii
$s3 = "Blast.bat /c 600" fullword ascii
$s4 = "start Clear.bat" fullword ascii
$s5 = "del Result.txt" fullword ascii
$s6 = "s syn %%i %%j 3306 /save" fullword ascii
$s7 = "start Thecard.bat" fullword ascii
$s10 = "setlocal enabledelayedexpansion" fullword ascii
condition:
5 of them
}
rule Hacktools_CN_Panda_tasksvr {
meta:
description = "Disclosed hacktool set - file tasksvr.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "a73fc74086c8bb583b1e3dcfd326e7a383007dc0"
strings:
$s2 = "Consys21.dll" fullword ascii
$s4 = "360EntCall.exe" fullword wide
$s15 = "Beijing1" fullword ascii
condition:
all of them
}
rule Hacktools_CN_Burst_Clear {
meta:
description = "Disclosed hacktool set - file Clear.bat"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "148c574a4e6e661aeadaf3a4c9eafa92a00b68e4"
strings:
$s0 = "del /f /s /q %systemdrive%\\*.log " fullword ascii
$s1 = "del /f /s /q %windir%\\*.bak " fullword ascii
$s4 = "del /f /s /q %systemdrive%\\*.chk " fullword ascii
$s5 = "del /f /s /q %systemdrive%\\*.tmp " fullword ascii
$s8 = "del /f /q %userprofile%\\COOKIES s\\*.* " fullword ascii
$s9 = "rd /s /q %windir%\\temp & md %windir%\\temp " fullword ascii
$s11 = "del /f /s /q %systemdrive%\\recycled\\*.* " fullword ascii
$s12 = "del /f /s /q \"%userprofile%\\Local Settings\\Temp\\*.*\" " fullword ascii
$s19 = "del /f /s /q \"%userprofile%\\Local Settings\\Temporary Internet Files\\*.*\" " ascii
condition:
5 of them
}
rule Hacktools_CN_Burst_Thecard {
meta:
description = "Disclosed hacktool set - file Thecard.bat"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "50b01ea0bfa5ded855b19b024d39a3d632bacb4c"
strings:
$s0 = "tasklist |find \"Clear.bat\"||start Clear.bat" fullword ascii
$s1 = "Http://www.coffeewl.com" fullword ascii
$s2 = "ping -n 2 localhost 1>nul 2>nul" fullword ascii
$s3 = "for /L %%a in (" fullword ascii
$s4 = "MODE con: COLS=42 lines=5" fullword ascii
condition:
all of them
}
rule Hacktools_CN_Burst_Blast {
meta:
description = "Disclosed hacktool set - file Blast.bat"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "17.11.14"
score = 60
hash = "b07702a381fa2eaee40b96ae2443918209674051"
strings:
$s0 = "@sql.exe -f ip.txt -m syn -t 3306 -c 5000 -u http:" ascii
$s1 = "@echo off" fullword ascii
condition:
all of them
}
rule VUBrute_VUBrute {
meta:
description = "PoS Scammer Toolbox - http://goo.gl/xiIphp - file VUBrute.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "22.11.14"
score = 70
hash = "166fa8c5a0ebb216c832ab61bf8872da556576a7"
strings:
$s0 = "Text Files (*.txt);;All Files (*)" fullword ascii
$s1 = "http://ubrute.com" fullword ascii
$s11 = "IP - %d; Password - %d; Combination - %d" fullword ascii
$s14 = "error.txt" fullword ascii
condition:
all of them
}
rule DK_Brute {
meta:
description = "PoS Scammer Toolbox - http://goo.gl/xiIphp - file DK Brute.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "22.11.14"
score = 70
reference = "http://goo.gl/xiIphp"
hash = "93b7c3a01c41baecfbe42461cb455265f33fbc3d"
strings:
$s6 = "get_CrackedCredentials" fullword ascii
$s13 = "Same port used for two different protocols:" fullword wide
$s18 = "coded by fLaSh" fullword ascii
$s19 = "get_grbToolsScaningCracking" fullword ascii
condition:
all of them
}
rule VUBrute_config {
meta:
description = "PoS Scammer Toolbox - http://goo.gl/xiIphp - file config.ini"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "22.11.14"
score = 70
reference = "http://goo.gl/xiIphp"
hash = "b9f66b9265d2370dab887604921167c11f7d93e9"
strings:
$s2 = "Restore=1" fullword ascii
$s6 = "Thread=" ascii
$s7 = "Running=1" fullword ascii
$s8 = "CheckCombination=" fullword ascii
$s10 = "AutoSave=1.000000" fullword ascii
$s12 = "TryConnect=" ascii
$s13 = "Tray=" ascii
condition:
all of them
}
rule sig_238_hunt {
meta:
description = "Disclosed hacktool set (old stuff) - file hunt.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "f9f059380d95c7f8d26152b1cb361d93492077ca"
strings:
$s1 = "Programming by JD Glaser - All Rights Reserved" fullword ascii
$s3 = "Usage - hunt \\\\servername" fullword ascii
$s4 = ".share = %S - %S" fullword wide
$s5 = "SMB share enumerator and admin finder " fullword ascii
$s7 = "Hunt only runs on Windows NT..." fullword ascii
$s8 = "User = %S" fullword ascii
$s9 = "Admin is %s\\%s" fullword ascii
condition:
all of them
}
rule sig_238_listip {
meta:
description = "Disclosed hacktool set (old stuff) - file listip.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "f32a0c5bf787c10eb494eb3b83d0c7a035e7172b"
strings:
$s0 = "ERROR!!! Bad host lookup. Program Terminate." fullword ascii
$s2 = "ERROR No.2!!! Program Terminate." fullword ascii
$s4 = "Local Host Name: %s" fullword ascii
$s5 = "Packed by exe32pack 1.38" fullword ascii
$s7 = "Local Computer Name: %s" fullword ascii
$s8 = "Local IP Adress: %s" fullword ascii
condition:
all of them
}
rule ArtTrayHookDll {
meta:
description = "Disclosed hacktool set (old stuff) - file ArtTrayHookDll.dll"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "4867214a3d96095d14aa8575f0adbb81a9381e6c"
strings:
$s0 = "ArtTrayHookDll.dll" fullword ascii
$s7 = "?TerminateHook@@YAXXZ" fullword ascii
condition:
all of them
}
rule sig_238_eee {
meta:
description = "Disclosed hacktool set (old stuff) - file eee.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "236916ce2980c359ff1d5001af6dacb99227d9cb"
strings:
$s0 = "szj1230@yesky.com" fullword wide
$s3 = "C:\\Program Files\\DevStudio\\VB\\VB5.OLB" fullword ascii
$s4 = "MailTo:szj1230@yesky.com" fullword wide
$s5 = "Command1_Click" fullword ascii
$s7 = "software\\microsoft\\internet explorer\\typedurls" fullword wide
$s11 = "vb5chs.dll" fullword ascii
$s12 = "MSVBVM50.DLL" fullword ascii
condition:
all of them
}
rule aspbackdoor_asp4 {
meta:
description = "Disclosed hacktool set (old stuff) - file asp4.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "faf991664fd82a8755feb65334e5130f791baa8c"
strings:
$s0 = "system.dll" fullword ascii
$s2 = "set sys=server.CreateObject (\"system.contral\") " fullword ascii
$s3 = "Public Function reboot(atype As Variant)" fullword ascii
$s4 = "t& = ExitWindowsEx(1, atype)" ascii
$s5 = "atype=request(\"atype\") " fullword ascii
$s7 = "AceiveX dll" fullword ascii
$s8 = "Declare Function ExitWindowsEx Lib \"user32\" (ByVal uFlags As Long, ByVal " ascii
$s10 = "sys.reboot(atype)" fullword ascii
condition:
all of them
}
rule aspfile1 {
meta:
description = "Disclosed hacktool set (old stuff) - file aspfile1.asp"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "77b1e3a6e8f67bd6d16b7ace73dca383725ac0af"
strings:
$s0 = "' -- check for a command that we have posted -- '" fullword ascii
$s1 = "szTempFile = \"C:\\\" & oFileSys.GetTempName( )" fullword ascii
$s5 = "<meta http-equiv=\"Content-Type\" content=\"text/html; charset=gb2312\"><BODY>" fullword ascii
$s6 = "<input type=text name=\".CMD\" size=45 value=\"<%= szCMD %>\">" fullword ascii
$s8 = "Call oScript.Run (\"cmd.exe /c \" & szCMD & \" > \" & szTempFile, 0, True)" fullword ascii
$s15 = "szCMD = Request.Form(\".CMD\")" fullword ascii
condition:
3 of them
}
rule EditServer {
meta:
description = "Disclosed hacktool set (old stuff) - file EditServer.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "87b29c9121cac6ae780237f7e04ee3bc1a9777d3"
strings:
$s0 = "%s Server.exe" fullword ascii
$s1 = "Service Port: %s" fullword ascii
$s2 = "The Port Must Been >0 & <65535" fullword ascii
$s8 = "3--Set Server Port" fullword ascii
$s9 = "The Server Password Exceeds 32 Characters" fullword ascii
$s13 = "Service Name: %s" fullword ascii
$s14 = "Server Password: %s" fullword ascii
$s17 = "Inject Process Name: %s" fullword ascii
$x1 = "WinEggDrop Shell Congirator" fullword ascii
condition:
5 of ($s*) or $x1
}
rule sig_238_letmein {
meta:
description = "Disclosed hacktool set (old stuff) - file letmein.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "74d223a56f97b223a640e4139bb9b94d8faa895d"
strings:
$s1 = "Error get globalgroup memebers: NERR_InvalidComputer" fullword ascii
$s6 = "Error get users from server!" fullword ascii
$s7 = "get in nt by name and null" fullword ascii
$s16 = "get something from nt, hold by killusa." fullword ascii
condition:
all of them
}
rule sig_238_token {
meta:
description = "Disclosed hacktool set (old stuff) - file token.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "c52bc6543d4281aa75a3e6e2da33cfb4b7c34b14"
strings:
$s0 = "Logon.exe" fullword ascii
$s1 = "Domain And User:" fullword ascii
$s2 = "PID=Get Addr$(): One" fullword ascii
$s3 = "Process " fullword ascii
$s4 = "psapi.dllK" fullword ascii
condition:
all of them
}
rule sig_238_TELNET {
meta:
description = "Disclosed hacktool set (old stuff) - file TELNET.EXE from Windows ME"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "50d02d77dc6cc4dc2674f90762a2622e861d79b1"
strings:
$s0 = "TELNET [host [port]]" fullword wide
$s2 = "TELNET.EXE" fullword wide
$s4 = "Microsoft(R) Windows(R) Millennium Operating System" fullword wide
$s14 = "Software\\Microsoft\\Telnet" fullword wide
condition:
all of them
}
rule snifferport {
meta:
description = "Disclosed hacktool set (old stuff) - file snifferport.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "d14133b5eaced9b7039048d0767c544419473144"
strings:
$s0 = "iphlpapi.DLL" fullword ascii
$s5 = "ystem\\CurrentCorolSet\\" fullword ascii
$s11 = "Port.TX" fullword ascii
$s12 = "32Next" fullword ascii
$s13 = "V1.2 B" fullword ascii
condition:
all of them
}
rule sig_238_webget {
meta:
description = "Disclosed hacktool set (old stuff) - file webget.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "36b5a5dee093aa846f906bbecf872a4e66989e42"
strings:
$s0 = "Packed by exe32pack" ascii
$s1 = "GET A HTTP/1.0" fullword ascii
$s2 = " error " fullword ascii
$s13 = "Downloa" ascii
condition:
all of them
}
rule XYZCmd_zip_Folder_XYZCmd {
meta:
description = "Disclosed hacktool set (old stuff) - file XYZCmd.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "bbea5a94950b0e8aab4a12ad80e09b630dd98115"
strings:
$s0 = "Executes Command Remotely" fullword wide
$s2 = "XYZCmd.exe" fullword wide
$s6 = "No Client Software" fullword wide
$s19 = "XYZCmd V1.0 For NT S" fullword ascii
condition:
all of them
}
rule ASPack_Chinese {
meta:
description = "Disclosed hacktool set (old stuff) - file ASPack Chinese.ini"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "02a9394bc2ec385876c4b4f61d72471ac8251a8e"
strings:
$s0 = "= Click here if you want to get your registered copy of ASPack" fullword ascii
$s1 = "; For beginning of translate - copy english.ini into the yourlanguage.ini" fullword ascii
$s2 = "E-Mail: shinlan@km169.net" fullword ascii
$s8 = "; Please, translate text only after simbol '='" fullword ascii
$s19 = "= Compress with ASPack" fullword ascii
condition:
all of them
}
rule aspbackdoor_EDIR {
meta:
description = "Disclosed hacktool set (old stuff) - file EDIR.ASP"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "03367ad891b1580cfc864e8a03850368cbf3e0bb"
strings:
$s1 = "response.write \"<a href='index.asp'>" fullword ascii
$s3 = "if Request.Cookies(\"password\")=\"" ascii
$s6 = "whichdir=server.mappath(Request(\"path\"))" fullword ascii
$s7 = "Set fs = CreateObject(\"Scripting.FileSystemObject\")" fullword ascii
$s19 = "whichdir=Request(\"path\")" fullword ascii
condition:
all of them
}
rule ByPassFireWall_zip_Folder_Ie {
meta:
description = "Disclosed hacktool set (old stuff) - file Ie.dll"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "d1b9058f16399e182c9b78314ad18b975d882131"
strings:
$s0 = "d:\\documents and settings\\loveengeng\\desktop\\source\\bypass\\lcc\\ie.dll" fullword ascii
$s1 = "LOADER ERROR" fullword ascii
$s5 = "The procedure entry point %s could not be located in the dynamic link library %s" fullword ascii
$s7 = "The ordinal %u could not be located in the dynamic link library %s" fullword ascii
condition:
all of them
}
rule EditKeyLogReadMe {
meta:
description = "Disclosed hacktool set (old stuff) - file EditKeyLogReadMe.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "dfa90540b0e58346f4b6ea12e30c1404e15fbe5a"
strings:
$s0 = "editKeyLog.exe KeyLog.exe," fullword ascii
$s1 = "WinEggDrop.DLL" fullword ascii
$s2 = "nc.exe" fullword ascii
$s3 = "KeyLog.exe" fullword ascii
$s4 = "EditKeyLog.exe" fullword ascii
$s5 = "wineggdrop" fullword ascii
condition:
3 of them
}
rule PassSniffer_zip_Folder_readme {
meta:
description = "Disclosed hacktool set (old stuff) - file readme.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "a52545ae62ddb0ea52905cbb61d895a51bfe9bcd"
strings:
$s0 = "PassSniffer.exe" fullword ascii
$s1 = "POP3/FTP Sniffer" fullword ascii
$s2 = "Password Sniffer V1.0" fullword ascii
condition:
1 of them
}
rule sig_238_gina {
meta:
description = "Disclosed hacktool set (old stuff) - file gina.reg"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "324acc52566baf4afdb0f3e4aaf76e42899e0cf6"
strings:
$s0 = "\"gina\"=\"gina.dll\"" fullword ascii
$s1 = "REGEDIT4" fullword ascii
$s2 = "[HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon]" fullword ascii
condition:
all of them
}
rule splitjoin {
meta:
description = "Disclosed hacktool set (old stuff) - file splitjoin.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "e4a9ef5d417038c4c76b72b5a636769a98bd2f8c"
strings:
$s0 = "Not for distribution without the authors permission" fullword wide
$s2 = "Utility to split and rejoin files.0" fullword wide
$s5 = "Copyright (c) Angus Johnson 2001-2002" fullword wide
$s19 = "SplitJoin" fullword wide
condition:
all of them
}
rule EditKeyLog {
meta:
description = "Disclosed hacktool set (old stuff) - file EditKeyLog.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "a450c31f13c23426b24624f53873e4fc3777dc6b"
strings:
$s1 = "Press Any Ke" fullword ascii
$s2 = "Enter 1 O" fullword ascii
$s3 = "Bon >0 & <65535L" fullword ascii
$s4 = "--Choose " fullword ascii
condition:
all of them
}
rule PassSniffer {
meta:
description = "Disclosed hacktool set (old stuff) - file PassSniffer.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "dcce4c577728e8edf7ed38ac6ef6a1e68afb2c9f"
strings:
$s2 = "Sniff" fullword ascii
$s3 = "GetLas" fullword ascii
$s4 = "VersionExA" fullword ascii
$s10 = " Only RuntUZ" fullword ascii
$s12 = "emcpysetprintf\\" fullword ascii
$s13 = "WSFtartup" fullword ascii
condition:
all of them
}
rule aspfile2 {
meta:
description = "Disclosed hacktool set (old stuff) - file aspfile2.asp"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "14efbc6cb01b809ad75a535d32b9da4df517ff29"
strings:
$s0 = "response.write \"command completed success!\" " fullword ascii
$s1 = "for each co in foditems " fullword ascii
$s3 = "<input type=text name=text6 value=\"<%= szCMD6 %>\"><br> " fullword ascii
$s19 = "<title>Hello! Welcome </title>" fullword ascii
condition:
all of them
}
rule UnPack_rar_Folder_InjectT {
meta:
description = "Disclosed hacktool set (old stuff) - file InjectT.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "80f39e77d4a34ecc6621ae0f4d5be7563ab27ea6"
strings:
$s0 = "%s -Install -->To Install The Service" fullword ascii
$s1 = "Explorer.exe" fullword ascii
$s2 = "%s -Start -->To Start The Service" fullword ascii
$s3 = "%s -Stop -->To Stop The Service" fullword ascii
$s4 = "The Port Is Out Of Range" fullword ascii
$s7 = "Fail To Set The Port" fullword ascii
$s11 = "\\psapi.dll" fullword ascii
$s20 = "TInject.Dll" fullword ascii
$x1 = "Software\\Microsoft\\Internet Explorer\\WinEggDropShell" fullword ascii
$x2 = "injectt.exe" fullword ascii
condition:
( 1 of ($x*) ) and ( 3 of ($s*) )
}
rule Jc_WinEggDrop_Shell {
meta:
description = "Disclosed hacktool set (old stuff) - file Jc.WinEggDrop Shell.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "820674b59f32f2cf72df50ba4411d7132d863ad2"
strings:
$s0 = "Sniffer.dll" fullword ascii
$s4 = ":Execute net.exe user Administrator pass" fullword ascii
$s5 = "Fport.exe or mport.exe " fullword ascii
$s6 = ":Password Sniffering Is Running |Not Running " fullword ascii
$s9 = ": The Terminal Service Port Has Been Set To NewPort" fullword ascii
$s15 = ": Del www.exe " fullword ascii
$s20 = ":Dir *.exe " fullword ascii
condition:
2 of them
}
rule aspbackdoor_asp1 {
meta:
description = "Disclosed hacktool set (old stuff) - file asp1.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "9ef9f34392a673c64525fcd56449a9fb1d1f3c50"
strings:
$s0 = "param = \"driver={Microsoft Access Driver (*.mdb)}\" " fullword ascii
$s1 = "conn.Open param & \";dbq=\" & Server.MapPath(\"scjh.mdb\") " fullword ascii
$s6 = "set rs=conn.execute (sql)%> " fullword ascii
$s7 = "<%set Conn = Server.CreateObject(\"ADODB.Connection\") " fullword ascii
$s10 = "<%dim ktdh,scph,scts,jhqtsj,yhxdsj,yxj,rwbh " fullword ascii
$s15 = "sql=\"select * from scjh\" " fullword ascii
condition:
all of them
}
rule QQ_zip_Folder_QQ {
meta:
description = "Disclosed hacktool set (old stuff) - file QQ.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "9f8e3f40f1ac8c1fa15a6621b49413d815f46cfb"
strings:
$s0 = "EMAIL:haoq@neusoft.com" fullword wide
$s1 = "EMAIL:haoq@neusoft.com" fullword wide
$s4 = "QQ2000b.exe" fullword wide
$s5 = "haoq@neusoft.com" fullword ascii
$s9 = "QQ2000b.exe" fullword ascii
$s10 = "\\qq2000b.exe" fullword ascii
$s12 = "WINDSHELL STUDIO[WINDSHELL " fullword wide
$s17 = "SOFTWARE\\HAOQIANG\\" fullword ascii
condition:
5 of them
}
rule UnPack_rar_Folder_TBack {
meta:
description = "Disclosed hacktool set (old stuff) - file TBack.DLL"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "30fc9b00c093cec54fcbd753f96d0ca9e1b2660f"
strings:
$s0 = "Redirect SPort RemoteHost RPort -->Port Redirector" fullword ascii
$s1 = "http://IP/a.exe a.exe -->Download A File" fullword ascii
$s2 = "StopSniffer -->Stop Pass Sniffer" fullword ascii
$s3 = "TerminalPort Port -->Set New Terminal Port" fullword ascii
$s4 = "Example: Http://12.12.12.12/a.exe abc.exe" fullword ascii
$s6 = "Create Password Sniffering Thread Successfully. Status:Logging" fullword ascii
$s7 = "StartSniffer NIC -->Start Sniffer" fullword ascii
$s8 = "Shell -->Get A Shell" fullword ascii
$s11 = "DeleteService ServiceName -->Delete A Service" fullword ascii
$s12 = "Disconnect ThreadNumber|All -->Disconnect Others" fullword ascii
$s13 = "Online -->List All Connected IP" fullword ascii
$s15 = "Getting The UserName(%c%s%c)-->ID(0x%s) Successfully" fullword ascii
$s16 = "Example: Set REG_SZ Test Trojan.exe" fullword ascii
$s18 = "Execute Program -->Execute A Program" fullword ascii
$s19 = "Reboot -->Reboot The System" fullword ascii
$s20 = "Password Sniffering Is Not Running" fullword ascii
condition:
4 of them
}
rule sig_238_cmd_2 {
meta:
description = "Disclosed hacktool set (old stuff) - file cmd.jsp"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "be4073188879dacc6665b6532b03db9f87cfc2bb"
strings:
$s0 = "Process child = Runtime.getRuntime().exec(" ascii
$s1 = "InputStream in = child.getInputStream();" fullword ascii
$s2 = "String cmd = request.getParameter(\"" ascii
$s3 = "while ((c = in.read()) != -1) {" fullword ascii
$s4 = "<%@ page import=\"java.io.*\" %>" fullword ascii
condition:
all of them
}
rule RangeScan {
meta:
description = "Disclosed hacktool set (old stuff) - file RangeScan.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "bace2c65ea67ac4725cb24aa9aee7c2bec6465d7"
strings:
$s0 = "RangeScan.EXE" fullword wide
$s4 = "<br><p align=\"center\"><b>RangeScan " fullword ascii
$s9 = "Produced by isn0" fullword ascii
$s10 = "RangeScan" fullword wide
$s20 = "%d-%d-%d %d:%d:%d" fullword ascii
condition:
3 of them
}
rule XYZCmd_zip_Folder_Readme {
meta:
description = "Disclosed hacktool set (old stuff) - file Readme.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "967cb87090acd000d22e337b8ce4d9bdb7c17f70"
strings:
$s3 = "3.xyzcmd \\\\RemoteIP /user:Administrator /pwd:1234 /nowait trojan.exe" fullword ascii
$s20 = "XYZCmd V1.0" fullword ascii
condition:
all of them
}
rule ByPassFireWall_zip_Folder_Inject {
meta:
description = "Disclosed hacktool set (old stuff) - file Inject.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "34f564301da528ce2b3e5907fd4b1acb7cb70728"
strings:
$s6 = "Fail To Inject" fullword ascii
$s7 = "BtGRemote Pro; V1.5 B/{" fullword ascii
$s11 = " Successfully" fullword ascii
condition:
all of them
}
rule sig_238_sqlcmd {
meta:
description = "Disclosed hacktool set (old stuff) - file sqlcmd.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 40
hash = "b6e356ce6ca5b3c932fa6028d206b1085a2e1a9a"
strings:
$s0 = "Permission denial to EXEC command.:(" fullword ascii
$s3 = "by Eyas<cooleyas@21cn.com>" fullword ascii
$s4 = "Connect to %s MSSQL server success.Enjoy the shell.^_^" fullword ascii
$s5 = "Usage: %s <host> <uid> <pwd>" fullword ascii
$s6 = "SqlCmd2.exe Inside Edition." fullword ascii
$s7 = "Http://www.patching.net 2000/12/14" fullword ascii
$s11 = "Example: %s 192.168.0.1 sa \"\"" fullword ascii
condition:
4 of them
}
rule ASPack_ASPACK {
meta:
description = "Disclosed hacktool set (old stuff) - file ASPACK.EXE"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "c589e6fd48cfca99d6335e720f516e163f6f3f42"
strings:
$s0 = "ASPACK.EXE" fullword wide
$s5 = "CLOSEDFOLDER" fullword wide
$s10 = "ASPack compressor" fullword wide
condition:
all of them
}
rule sig_238_2323 {
meta:
description = "Disclosed hacktool set (old stuff) - file 2323.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "21812186a9e92ee7ddc6e91e4ec42991f0143763"
strings:
$s0 = "port - Port to listen on, defaults to 2323" fullword ascii
$s1 = "Usage: srvcmd.exe [/h] [port]" fullword ascii
$s3 = "Failed to execute shell" fullword ascii
$s5 = "/h - Hide Window" fullword ascii
$s7 = "Accepted connection from client at %s" fullword ascii
$s9 = "Error %d: %s" fullword ascii
condition:
all of them
}
rule Jc_ALL_WinEggDropShell_rar_Folder_Install_2 {
meta:
description = "Disclosed hacktool set (old stuff) - file Install.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "95866e917f699ee74d4735300568640ea1a05afd"
strings:
$s1 = "http://go.163.com/sdemo" fullword wide
$s2 = "Player.tmp" fullword ascii
$s3 = "Player.EXE" fullword wide
$s4 = "mailto:sdemo@263.net" fullword ascii
$s5 = "S-Player.exe" fullword ascii
$s9 = "http://www.BaiXue.net (" fullword wide
condition:
all of them
}
rule sig_238_TFTPD32 {
meta:
description = "Disclosed hacktool set (old stuff) - file TFTPD32.EXE"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "5c5f8c1a2fa8c26f015e37db7505f7c9e0431fe8"
strings:
$s0 = " http://arm.533.net" fullword ascii
$s1 = "Tftpd32.hlp" fullword ascii
$s2 = "Timeouts and Ports should be numerical and can not be 0" fullword ascii
$s3 = "TFTPD32 -- " fullword wide
$s4 = "%d -- %s" fullword ascii
$s5 = "TIMEOUT while waiting for Ack block %d. file <%s>" fullword ascii
$s12 = "TftpPort" fullword ascii
$s13 = "Ttftpd32BackGround" fullword ascii
$s17 = "SOFTWARE\\TFTPD32" fullword ascii
condition:
all of them
}
rule sig_238_iecv {
meta:
description = "Disclosed hacktool set (old stuff) - file iecv.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "6e6e75350a33f799039e7a024722cde463328b6d"
strings:
$s1 = "Edit The Content Of Cookie " fullword wide
$s3 = "Accessories\\wordpad.exe" fullword ascii
$s4 = "gorillanation.com" fullword ascii
$s5 = "Before editing the content of a cookie, you should close all windows of Internet" ascii
$s12 = "http://nirsoft.cjb.net" fullword ascii
condition:
all of them
}
rule Antiy_Ports_1_21 {
meta:
description = "Disclosed hacktool set (old stuff) - file Antiy Ports 1.21.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "ebf4bcc7b6b1c42df6048d198cbe7e11cb4ae3f0"
strings:
$s0 = "AntiyPorts.EXE" fullword wide
$s7 = "AntiyPorts MFC Application" fullword wide
$s20 = " @Stego:" fullword ascii
condition:
all of them
}
rule perlcmd_zip_Folder_cmd {
meta:
description = "Disclosed hacktool set (old stuff) - file cmd.cgi"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "21b5dc36e72be5aca5969e221abfbbdd54053dd8"
strings:
$s0 = "syswrite(STDOUT, \"Content-type: text/html\\r\\n\\r\\n\", 27);" fullword ascii
$s1 = "s/%20/ /ig;" fullword ascii
$s2 = "syswrite(STDOUT, \"\\r\\n</PRE></HTML>\\r\\n\", 17);" fullword ascii
$s4 = "open(STDERR, \">&STDOUT\") || die \"Can't redirect STDERR\";" fullword ascii
$s5 = "$_ = $ENV{QUERY_STRING};" fullword ascii
$s6 = "$execthis = $_;" fullword ascii
$s7 = "system($execthis);" fullword ascii
$s12 = "s/%2f/\\//ig;" fullword ascii
condition:
6 of them
}
rule aspbackdoor_asp3 {
meta:
description = "Disclosed hacktool set (old stuff) - file asp3.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "e5588665ca6d52259f7d9d0f13de6640c4e6439c"
strings:
$s0 = "<form action=\"changepwd.asp\" method=\"post\"> " fullword ascii
$s1 = " Set oUser = GetObject(\"WinNT://ComputerName/\" & UserName) " fullword ascii
$s2 = " value=\"<%=Request.ServerVariables(\"LOGIN_USER\")%>\"> " fullword ascii
$s14 = " Windows NT " fullword ascii
$s16 = " WIndows 2000 " fullword ascii
$s18 = "OldPwd = Request.Form(\"OldPwd\") " fullword ascii
$s19 = "NewPwd2 = Request.Form(\"NewPwd2\") " fullword ascii
$s20 = "NewPwd1 = Request.Form(\"NewPwd1\") " fullword ascii
condition:
all of them
}
rule sig_238_FPipe {
meta:
description = "Disclosed hacktool set (old stuff) - file FPipe.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "41d57d356098ff55fe0e1f0bcaa9317df5a2a45c"
strings:
$s0 = "made to port 80 of the remote machine at 192.168.1.101 with the" fullword ascii
$s1 = "Unable to resolve hostname \"%s\"" fullword ascii
$s2 = "source port for that outbound connection being set to 53 also." fullword ascii
$s3 = " -s - outbound source port number" fullword ascii
$s5 = "http://www.foundstone.com" fullword ascii
$s20 = "Attempting to connect to %s port %d" fullword ascii
condition:
all of them
}
rule sig_238_concon {
meta:
description = "Disclosed hacktool set (old stuff) - file concon.com"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "816b69eae66ba2dfe08a37fff077e79d02b95cc1"
strings:
$s0 = "Usage: concon \\\\ip\\sharename\\con\\con" fullword ascii
condition:
all of them
}
rule aspbackdoor_regdll {
meta:
description = "Disclosed hacktool set (old stuff) - file regdll.asp"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "5c5e16a00bcb1437bfe519b707e0f5c5f63a488d"
strings:
$s1 = "exitcode = oShell.Run(\"c:\\WINNT\\system32\\regsvr32.exe /u/s \" & strFile, 0, " ascii
$s3 = "oShell.Run \"c:\\WINNT\\system32\\regsvr32.exe /u/s \" & strFile, 0, False" fullword ascii
$s4 = "EchoB(\"regsvr32.exe exitcode = \" & exitcode)" fullword ascii
$s5 = "Public Property Get oFS()" fullword ascii
condition:
all of them
}
rule CleanIISLog {
meta:
description = "Disclosed hacktool set (old stuff) - file CleanIISLog.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "827cd898bfe8aa7e9aaefbe949d26298f9e24094"
strings:
$s1 = "CleanIP - Specify IP Address Which You Want Clear." fullword ascii
$s2 = "LogFile - Specify Log File Which You Want Process." fullword ascii
$s8 = "CleanIISLog Ver" fullword ascii
$s9 = "msftpsvc" fullword ascii
$s10 = "Fatal Error: MFC initialization failed" fullword ascii
$s11 = "Specified \"ALL\" Will Process All Log Files." fullword ascii
$s12 = "Specified \".\" Will Clean All IP Record." fullword ascii
$s16 = "Service %s Stopped." fullword ascii
$s20 = "Process Log File %s..." fullword ascii
condition:
5 of them
}
rule sqlcheck {
meta:
description = "Disclosed hacktool set (old stuff) - file sqlcheck.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "5a5778ac200078b627db84fdc35bf5bcee232dc7"
strings:
$s0 = "Power by eyas<cooleyas@21cn.com>" fullword ascii
$s3 = "\\ipc$ \"\" /user:\"\"" fullword ascii
$s4 = "SQLCheck can only scan a class B network. Try again." fullword ascii
$s14 = "Example: SQLCheck 192.168.0.1 192.168.0.254" fullword ascii
$s20 = "Usage: SQLCheck <StartIP> <EndIP>" fullword ascii
condition:
3 of them
}
rule sig_238_RunAsEx {
meta:
description = "Disclosed hacktool set (old stuff) - file RunAsEx.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "a22fa4e38d4bf82041d67b4ac5a6c655b2e98d35"
strings:
$s0 = "RunAsEx By Assassin 2000. All Rights Reserved. http://www.netXeyes.com" fullword ascii
$s8 = "cmd.bat" fullword ascii
$s9 = "Note: This Program Can'nt Run With Local Machine." fullword ascii
$s11 = "%s Execute Succussifully." fullword ascii
$s12 = "winsta0" fullword ascii
$s15 = "Usage: RunAsEx <UserName> <Password> <Execute File> [\"Execute Option\"]" fullword ascii
condition:
4 of them
}
rule sig_238_nbtdump {
meta:
description = "Disclosed hacktool set (old stuff) - file nbtdump.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "cfe82aad5fc4d79cf3f551b9b12eaf9889ebafd8"
strings:
$s0 = "Creation of results file - \"%s\" failed." fullword ascii
$s1 = "c:\\>nbtdump remote-machine" fullword ascii
$s7 = "Cerberus NBTDUMP" fullword ascii
$s11 = "<CENTER><H1>Cerberus Internet Scanner</H1>" fullword ascii
$s18 = "<P><H3>Account Information</H3><PRE>" fullword wide
$s19 = "%s's password is %s</H3>" fullword wide
$s20 = "%s's password is blank</H3>" fullword wide
condition:
5 of them
}
rule sig_238_Glass2k {
meta:
description = "Disclosed hacktool set (old stuff) - file Glass2k.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "b05455a1ecc6bc7fc8ddef312a670f2013704f1a"
strings:
$s0 = "Portions Copyright (c) 1997-1999 Lee Hasiuk" fullword ascii
$s1 = "C:\\Program Files\\Microsoft Visual Studio\\VB98" fullword ascii
$s3 = "WINNT\\System32\\stdole2.tlb" fullword ascii
$s4 = "Glass2k.exe" fullword wide
$s7 = "NeoLite Executable File Compressor" fullword ascii
condition:
all of them
}
rule SplitJoin_V1_3_3_rar_Folder_3 {
meta:
description = "Disclosed hacktool set (old stuff) - file splitjoin.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "21409117b536664a913dcd159d6f4d8758f43435"
strings:
$s2 = "ie686@sohu.com" fullword ascii
$s3 = "splitjoin.exe" fullword ascii
$s7 = "SplitJoin" fullword ascii
condition:
all of them
}
rule aspbackdoor_EDIT {
meta:
description = "Disclosed hacktool set (old stuff) - file EDIT.ASP"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "12196cf62931cde7b6cb979c07bb5cc6a7535cbb"
strings:
$s1 = "<meta HTTP-EQUIV=\"Content-Type\" CONTENT=\"text/html;charset=gb_2312-80\">" fullword ascii
$s2 = "Set thisfile = fs.GetFile(whichfile)" fullword ascii
$s3 = "response.write \"<a href='index.asp'>" fullword ascii
$s5 = "if Request.Cookies(\"password\")=\"juchen\" then " fullword ascii
$s6 = "Set thisfile = fs.OpenTextFile(whichfile, 1, False)" fullword ascii
$s7 = "color: rgb(255,0,0); text-decoration: underline }" fullword ascii
$s13 = "if Request(\"creat\")<>\"yes\" then" fullword ascii
condition:
5 of them
}
rule aspbackdoor_entice {
meta:
description = "Disclosed hacktool set (old stuff) - file entice.asp"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "e273a1b9ef4a00ae4a5d435c3c9c99ee887cb183"
strings:
$s0 = "<Form Name=\"FormPst\" Method=\"Post\" Action=\"entice.asp\">" fullword ascii
$s2 = "if left(trim(request(\"sqllanguage\")),6)=\"select\" then" fullword ascii
$s4 = "conndb.Execute(sqllanguage)" fullword ascii
$s5 = "<!--#include file=sqlconn.asp-->" fullword ascii
$s6 = "rstsql=\"select * from \"&rstable(\"table_name\")" fullword ascii
condition:
all of them
}
rule FPipe2_0 {
meta:
description = "Disclosed hacktool set (old stuff) - file FPipe2.0.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "891609db7a6787575641154e7aab7757e74d837b"
strings:
$s0 = "made to port 80 of the remote machine at 192.168.1.101 with the" fullword ascii
$s1 = "Unable to resolve hostname \"%s\"" fullword ascii
$s2 = " -s - outbound connection source port number" fullword ascii
$s3 = "source port for that outbound connection being set to 53 also." fullword ascii
$s4 = "http://www.foundstone.com" fullword ascii
$s19 = "FPipe" fullword ascii
condition:
all of them
}
rule InstGina {
meta:
description = "Disclosed hacktool set (old stuff) - file InstGina.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "5317fbc39508708534246ef4241e78da41a4f31c"
strings:
$s0 = "To Open Registry" fullword ascii
$s4 = "I love Candy very much!!" ascii
$s5 = "GinaDLL" fullword ascii
condition:
all of them
}
rule ArtTray_zip_Folder_ArtTray {
meta:
description = "Disclosed hacktool set (old stuff) - file ArtTray.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "ee1edc8c4458c71573b5f555d32043cbc600a120"
strings:
$s0 = "http://www.brigsoft.com" fullword wide
$s2 = "ArtTrayHookDll.dll" fullword ascii
$s3 = "ArtTray Version 1.0 " fullword wide
$s16 = "TRM_HOOKCALLBACK" fullword ascii
condition:
all of them
}
rule sig_238_findoor {
meta:
description = "Disclosed hacktool set (old stuff) - file findoor.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "cdb1ececceade0ecdd4479ecf55b0cc1cf11cdce"
strings:
$s0 = "(non-Win32 .EXE or error in .EXE image)." fullword ascii
$s8 = "PASS hacker@hacker.com" fullword ascii
$s9 = "/scripts/..%c1%1c../winnt/system32/cmd.exe" fullword ascii
$s10 = "MAIL FROM:hacker@hacker.com" fullword ascii
$s11 = "http://isno.yeah.net" fullword ascii
condition:
4 of them
}
rule aspbackdoor_ipclear {
meta:
description = "Disclosed hacktool set (old stuff) - file ipclear.vbs"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "9f8fdfde4b729516330eaeb9141fb2a7ff7d0098"
strings:
$s0 = "Set ServiceObj = GetObject(\"WinNT://\" & objNet.ComputerName & \"/w3svc\")" fullword ascii
$s1 = "wscript.Echo \"USAGE:KillLog.vbs LogFileName YourIP.\"" fullword ascii
$s2 = "Set txtStreamOut = fso.OpenTextFile(destfile, ForWriting, True)" fullword ascii
$s3 = "Set objNet = WScript.CreateObject( \"WScript.Network\" )" fullword ascii
$s4 = "Set fso = CreateObject(\"Scripting.FileSystemObject\")" fullword ascii
condition:
all of them
}
rule WinEggDropShellFinal_zip_Folder_InjectT {
meta:
description = "Disclosed hacktool set (old stuff) - file InjectT.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "516e80e4a25660954de8c12313e2d7642bdb79dd"
strings:
$s0 = "Packed by exe32pack" ascii
$s1 = "2TInject.Dll" fullword ascii
$s2 = "Windows Services" fullword ascii
$s3 = "Findrst6" fullword ascii
$s4 = "Press Any Key To Continue......" fullword ascii
condition:
all of them
}
rule gina_zip_Folder_gina {
meta:
description = "Disclosed hacktool set (old stuff) - file gina.dll"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "e0429e1b59989cbab6646ba905ac312710f5ed30"
strings:
$s0 = "NEWGINA.dll" fullword ascii
$s1 = "LOADER ERROR" fullword ascii
$s3 = "WlxActivateUserShell" fullword ascii
$s6 = "WlxWkstaLockedSAS" fullword ascii
$s13 = "WlxIsLockOk" fullword ascii
$s14 = "The procedure entry point %s could not be located in the dynamic link library %s" fullword ascii
$s16 = "WlxShutdown" fullword ascii
$s17 = "The ordinal %u could not be located in the dynamic link library %s" fullword ascii
condition:
all of them
}
rule superscan3_0 {
meta:
description = "Disclosed hacktool set (old stuff) - file superscan3.0.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "a9a02a14ea4e78af30b8b4a7e1c6ed500a36bc4d"
strings:
$s0 = "\\scanner.ini" fullword ascii
$s1 = "\\scanner.exe" fullword ascii
$s2 = "\\scanner.lst" fullword ascii
$s4 = "\\hensss.lst" fullword ascii
$s5 = "STUB32.EXE" fullword wide
$s6 = "STUB.EXE" fullword wide
$s8 = "\\ws2check.exe" fullword ascii
$s9 = "\\trojans.lst" fullword ascii
$s10 = "1996 InstallShield Software Corporation" fullword wide
condition:
all of them
}
rule sig_238_xsniff {
meta:
description = "Disclosed hacktool set (old stuff) - file xsniff.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "d61d7329ac74f66245a92c4505a327c85875c577"
strings:
$s2 = "xsiff.exe -pass -hide -log pass.log" fullword ascii
$s3 = "%s - simple sniffer for win2000" fullword ascii
$s4 = "xsiff.exe -tcp -udp -asc -addr 192.168.1.1" fullword ascii
$s5 = "HOST: %s USER: %s, PASS: %s" fullword ascii
$s7 = "http://www.xfocus.org" fullword ascii
$s9 = " -pass : Filter username/password" fullword ascii
$s18 = " -udp : Output udp packets" fullword ascii
$s19 = "Code by glacier <glacier@xfocus.org>" fullword ascii
$s20 = " -tcp : Output tcp packets" fullword ascii
condition:
6 of them
}
rule sig_238_fscan {
meta:
description = "Disclosed hacktool set (old stuff) - file fscan.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
hash = "d5646e86b5257f9c83ea23eca3d86de336224e55"
strings:
$s0 = "FScan v1.12 - Command line port scanner." fullword ascii
$s2 = " -n - no port scanning - only pinging (unless you use -q)" fullword ascii
$s5 = "Example: fscan -bp 80,100-200,443 10.0.0.1-10.0.1.200" fullword ascii
$s6 = " -z - maximum simultaneous threads to use for scanning" fullword ascii
$s12 = "Failed to open the IP list file \"%s\"" fullword ascii
$s13 = "http://www.foundstone.com" fullword ascii
$s16 = " -p - TCP port(s) to scan (a comma separated list of ports/ranges) " fullword ascii
$s18 = "Bind port number out of range. Using system default." fullword ascii
$s19 = "fscan.exe" fullword wide
condition:
4 of them
}
rule _iissample_nesscan_twwwscan {
meta:
description = "Disclosed hacktool set (old stuff) - from files iissample.exe, nesscan.exe, twwwscan.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
super_rule = 1
hash0 = "7f20962bbc6890bf48ee81de85d7d76a8464b862"
hash1 = "c0b1a2196e82eea4ca8b8c25c57ec88e4478c25b"
hash2 = "548f0d71ef6ffcc00c0b44367ec4b3bb0671d92f"
strings:
$s0 = "Connecting HTTP Port - Result: " fullword
$s1 = "No space for command line argument vector" fullword
$s3 = "Microsoft(July/1999~) http://www.microsoft.com/technet/security/current.asp" fullword
$s5 = "No space for copy of command line" fullword
$s7 = "- Windows NT,2000 Patch Method - " fullword
$s8 = "scanf : floating point formats not linked" fullword
$s12 = "hrdir_b.c: LoadLibrary != mmdll borlndmm failed" fullword
$s13 = "!\"what?\"" fullword
$s14 = "%s Port %d Closed" fullword
$s16 = "printf : floating point formats not linked" fullword
$s17 = "xxtype.cpp" fullword
condition:
all of them
}
rule _FsHttp_FsPop_FsSniffer {
meta:
description = "Disclosed hacktool set (old stuff) - from files FsHttp.exe, FsPop.exe, FsSniffer.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "23.11.14"
score = 60
super_rule = 1
hash0 = "9d4e7611a328eb430a8bb6dc7832440713926f5f"
hash1 = "ae23522a3529d3313dd883727c341331a1fb1ab9"
hash2 = "7ffc496cd4a1017485dfb571329523a52c9032d8"
strings:
$s0 = "-ERR Invalid Command, Type [Help] For Command List" fullword
$s1 = "-ERR Get SMS Users ID Failed" fullword
$s2 = "Control Time Out 90 Secs, Connection Closed" fullword
$s3 = "-ERR Post SMS Failed" fullword
$s4 = "Current.hlt" fullword
$s6 = "Histroy.hlt" fullword
$s7 = "-ERR Send SMS Failed" fullword
$s12 = "-ERR Change Password <New Password>" fullword
$s17 = "+OK Send SMS Succussifully" fullword
$s18 = "+OK Set New Password: [%s]" fullword
$s19 = "CHANGE PASSWORD" fullword
condition:
all of them
}
rule Ammyy_Admin_AA_v3 {
meta:
description = "Remote Admin Tool used by APT group Anunak (ru) - file AA_v3.4.exe and AA_v3.5.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://goo.gl/gkAg2E"
date = "2014/12/22"
score = 55
hash1 = "b130611c92788337c4f6bb9e9454ff06eb409166"
hash2 = "07539abb2623fe24b9a05e240f675fa2d15268cb"
strings:
$x1 = "S:\\Ammyy\\sources\\target\\TrService.cpp" fullword ascii
$x2 = "S:\\Ammyy\\sources\\target\\TrDesktopCopyRect.cpp" fullword ascii
$x3 = "Global\\Ammyy.Target.IncomePort" fullword ascii
$x4 = "S:\\Ammyy\\sources\\target\\TrFmFileSys.cpp" fullword ascii
$x5 = "Please enter password for accessing remote computer" fullword ascii
$s1 = "CreateProcess1()#3 %d error=%d" fullword ascii
$s2 = "CHttpClient::SendRequest2(%s, %s, %d) error: invalid host name." fullword ascii
$s3 = "ERROR: CreateProcessAsUser() error=%d, session=%d" fullword ascii
$s4 = "ERROR: FindProcessByName('explorer.exe')" fullword ascii
condition:
2 of ($x*) or all of ($s*)
}
/* Other dumper and custom hack tools */
rule LinuxHacktool_eyes_scanssh {
meta:
description = "Linux hack tools - file scanssh"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "not set"
date = "2015/01/19"
hash = "467398a6994e2c1a66a3d39859cde41f090623ad"
strings:
$s0 = "Connection closed by remote host" fullword ascii
$s1 = "Writing packet : error on socket (or connection closed): %s" fullword ascii
$s2 = "Remote connection closed by signal SIG%s %s" fullword ascii
$s4 = "Reading private key %s failed (bad passphrase ?)" fullword ascii
$s5 = "Server closed connection" fullword ascii
$s6 = "%s: line %d: list delimiter not followed by keyword" fullword ascii
$s8 = "checking for version `%s' in file %s required by file %s" fullword ascii
$s9 = "Remote host closed connection" fullword ascii
$s10 = "%s: line %d: bad command `%s'" fullword ascii
$s13 = "verifying that server is a known host : file %s not found" fullword ascii
$s14 = "%s: line %d: expected service, found `%s'" fullword ascii
$s15 = "%s: line %d: list delimiter not followed by domain" fullword ascii
$s17 = "Public key from server (%s) doesn't match user preference (%s)" fullword ascii
condition:
all of them
}
rule LinuxHacktool_eyes_pscan2 {
meta:
description = "Linux hack tools - file pscan2"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "not set"
date = "2015/01/19"
hash = "56b476cba702a4423a2d805a412cae8ef4330905"
strings:
$s0 = "# pscan completed in %u seconds. (found %d ips)" fullword ascii
$s1 = "Usage: %s <b-block> <port> [c-block]" fullword ascii
$s3 = "%s.%d.* (total: %d) (%.1f%% done)" fullword ascii
$s8 = "Invalid IP." fullword ascii
$s9 = "# scanning: " fullword ascii
$s10 = "Unable to allocate socket." fullword ascii
condition:
2 of them
}
rule LinuxHacktool_eyes_a {
meta:
description = "Linux hack tools - file a"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "not set"
date = "2015/01/19"
hash = "458ada1e37b90569b0b36afebba5ade337ea8695"
strings:
$s0 = "cat trueusers.txt | mail -s \"eyes\" clubby@slucia.com" fullword ascii
$s1 = "mv scan.log bios.txt" fullword ascii
$s2 = "rm -rf bios.txt" fullword ascii
$s3 = "echo -e \"# by Eyes.\"" fullword ascii
$s4 = "././pscan2 $1 22" fullword ascii
$s10 = "echo \"#cautam...\"" fullword ascii
condition:
2 of them
}
rule LinuxHacktool_eyes_mass {
meta:
description = "Linux hack tools - file mass"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "not set"
date = "2015/01/19"
hash = "2054cb427daaca9e267b252307dad03830475f15"
strings:
$s0 = "cat trueusers.txt | mail -s \"eyes\" clubby@slucia.com" fullword ascii
$s1 = "echo -e \"${BLU}Private Scanner By Raphaello , DeMMoNN , tzepelush & DraC\\n\\r" ascii
$s3 = "killall -9 pscan2" fullword ascii
$s5 = "echo \"[*] ${DCYN}Gata esti h4x0r ;-)${RES} [*]\"" fullword ascii
$s6 = "echo -e \"${DCYN}@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#@#${RES}\"" fullword ascii
condition:
1 of them
}
rule LinuxHacktool_eyes_pscan2_2 {
meta:
description = "Linux hack tools - file pscan2.c"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "not set"
date = "2015/01/19"
hash = "eb024dfb441471af7520215807c34d105efa5fd8"
strings:
$s0 = "snprintf(outfile, sizeof(outfile) - 1, \"scan.log\", argv[1], argv[2]);" fullword ascii
$s2 = "printf(\"Usage: %s <b-block> <port> [c-block]\\n\", argv[0]);" fullword ascii
$s3 = "printf(\"\\n# pscan completed in %u seconds. (found %d ips)\\n\", (time(0) - sca" ascii
$s19 = "connlist[i].addr.sin_family = AF_INET;" fullword ascii
$s20 = "snprintf(last, sizeof(last) - 1, \"%s.%d.* (total: %d) (%.1f%% done)\"," fullword ascii
condition:
2 of them
}
rule CN_Portscan : APT
{
meta:
description = "CN Port Scanner"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
release_date = "2013-11-29"
confidential = false
score = 70
strings:
$s2 = "TCP 12.12.12.12"
condition:
uint16(0) == 0x5A4D and $s2
}
rule WMI_vbs : APT
{
meta:
description = "WMI Tool - APT"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
release_date = "2013-11-29"
confidential = false
score = 70
strings:
$s3 = "WScript.Echo \" $$\\ $$\\ $$\\ $$\\ $$$$$$\\ $$$$$$$$\\ $$\\ $$\\ $$$$$$$$\\ $$$$$$"
condition:
all of them
}
rule CN_Toolset__XScanLib_XScanLib_XScanLib {
meta:
description = "Detects a Chinese hacktool from a disclosed toolset - from files XScanLib.dll, XScanLib.dll, XScanLib.dll"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://qiannao.com/ls/905300366/33834c0c/"
date = "2015/03/30"
score = 70
super_rule = 1
hash0 = "af419603ac28257134e39683419966ab3d600ed2"
hash1 = "c5cb4f75cf241f5a9aea324783193433a42a13b0"
hash2 = "135f6a28e958c8f6a275d8677cfa7cb502c8a822"
strings:
$s1 = "Plug-in thread causes an exception, failed to alert user." fullword
$s2 = "PlugGetUdpPort" fullword
$s3 = "XScanLib.dll" fullword
$s4 = "PlugGetTcpPort" fullword
$s11 = "PlugGetVulnNum" fullword
condition:
all of them
}
rule CN_Toolset_NTscan_PipeCmd {
meta:
description = "Detects a Chinese hacktool from a disclosed toolset - file PipeCmd.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://qiannao.com/ls/905300366/33834c0c/"
date = "2015/03/30"
score = 70
hash = "a931d65de66e1468fe2362f7f2e0ee546f225c4e"
strings:
$s2 = "Please Use NTCmd.exe Run This Program." fullword ascii
$s3 = "PipeCmd.exe" fullword wide
$s4 = "\\\\.\\pipe\\%s%s%d" fullword ascii
$s5 = "%s\\pipe\\%s%s%d" fullword ascii
$s6 = "%s\\ADMIN$\\System32\\%s%s" fullword ascii
$s7 = "%s\\ADMIN$\\System32\\%s" fullword ascii
$s9 = "PipeCmdSrv.exe" fullword ascii
$s10 = "This is a service executable! Couldn't start directly." fullword ascii
$s13 = "\\\\.\\pipe\\PipeCmd_communicaton" fullword ascii
$s14 = "PIPECMDSRV" fullword wide
$s15 = "PipeCmd Service" fullword ascii
condition:
4 of them
}
rule CN_Toolset_LScanPortss_2 {
meta:
description = "Detects a Chinese hacktool from a disclosed toolset - file LScanPortss.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://qiannao.com/ls/905300366/33834c0c/"
date = "2015/03/30"
score = 70
hash = "4631ec57756466072d83d49fbc14105e230631a0"
strings:
$s1 = "LScanPort.EXE" fullword wide
$s3 = "www.honker8.com" fullword wide
$s4 = "DefaultPort.lst" fullword ascii
$s5 = "Scan over.Used %dms!" fullword ascii
$s6 = "www.hf110.com" fullword wide
$s15 = "LScanPort Microsoft " fullword wide
$s18 = "L-ScanPort2.0 CooFly" fullword wide
condition:
4 of them
}
rule CN_Toolset_sig_1433_135_sqlr {
meta:
description = "Detects a Chinese hacktool from a disclosed toolset - file sqlr.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://qiannao.com/ls/905300366/33834c0c/"
date = "2015/03/30"
score = 70
hash = "8542c7fb8291b02db54d2dc58cd608e612bfdc57"
strings:
$s0 = "Connect to %s MSSQL server success. Type Command at Prompt." fullword ascii
$s11 = ";DATABASE=master" fullword ascii
$s12 = "xp_cmdshell '" fullword ascii
$s14 = "SELECT * FROM OPENROWSET('SQLOLEDB','Trusted_Connection=Yes;Data Source=myserver" ascii
condition:
all of them
}
rule DarkComet_Keylogger_File
{
meta:
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
description = "Looks like a keylogger file created by DarkComet Malware"
date = "25.07.14"
score = 50
strings:
$entry = /\n:: [A-Z]/
$timestamp = /\([0-9]?[0-9]:[0-9][0-9]:[0-9][0-9] [AP]M\)/
condition:
uint16(0) == 0x3A3A and #entry > 10 and #timestamp > 10
}
/* Mimikatz */
rule Mimikatz_Memory_Rule_1 : APT {
meta:
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "12/22/2014"
score = 70
type = "memory"
description = "Detects password dumper mimikatz in memory"
strings:
$s1 = "sekurlsa::msv" fullword ascii
$s2 = "sekurlsa::wdigest" fullword ascii
$s4 = "sekurlsa::kerberos" fullword ascii
$s5 = "sekurlsa::tspkg" fullword ascii
$s6 = "sekurlsa::livessp" fullword ascii
$s7 = "sekurlsa::ssp" fullword ascii
$s8 = "sekurlsa::logonPasswords" fullword ascii
$s9 = "sekurlsa::process" fullword ascii
$s10 = "ekurlsa::minidump" fullword ascii
$s11 = "sekurlsa::pth" fullword ascii
$s12 = "sekurlsa::tickets" fullword ascii
$s13 = "sekurlsa::ekeys" fullword ascii
$s14 = "sekurlsa::dpapi" fullword ascii
$s15 = "sekurlsa::credman" fullword ascii
condition:
1 of them
}
rule Mimikatz_Memory_Rule_2 : APT {
meta:
description = "Mimikatz Rule generated from a memory dump"
author = "Florian Roth - Florian Roth"
type = "memory"
score = 80
strings:
$s0 = "sekurlsa::" ascii
$x1 = "cryptprimitives.pdb" ascii
$x2 = "Now is t1O" ascii fullword
$x4 = "ALICE123" ascii
$x5 = "BOBBY456" ascii
condition:
$s0 and 1 of ($x*)
}
rule mimikatz
{
meta:
description = "mimikatz"
author = "Benjamin DELPY (gentilkiwi)"
tool_author = "Benjamin DELPY (gentilkiwi)"
strings:
$exe_x86_1 = { 89 71 04 89 [0-3] 30 8d 04 bd }
$exe_x86_2 = { 8b 4d e? 8b 45 f4 89 75 e? 89 01 85 ff 74 }
$exe_x64_1 = { 33 ff 4? 89 37 4? 8b f3 45 85 c? 74}
$exe_x64_2 = { 4c 8b df 49 [0-3] c1 e3 04 48 [0-3] 8b cb 4c 03 [0-3] d8 }
/*
$dll_1 = { c7 0? 00 00 01 00 [4-14] c7 0? 01 00 00 00 }
$dll_2 = { c7 0? 10 02 00 00 ?? 89 4? }
*/
$sys_x86 = { a0 00 00 00 24 02 00 00 40 00 00 00 [0-4] b8 00 00 00 6c 02 00 00 40 00 00 00 }
$sys_x64 = { 88 01 00 00 3c 04 00 00 40 00 00 00 [0-4] e8 02 00 00 f8 02 00 00 40 00 00 00 }
condition:
(all of ($exe_x86_*)) or (all of ($exe_x64_*))
// or (all of ($dll_*))
or (any of ($sys_*))
}
rule wce
{
meta:
description = "wce"
author = "Benjamin DELPY (gentilkiwi)"
tool_author = "Hernan Ochoa (hernano)"
strings:
$hex_legacy = { 8b ff 55 8b ec 6a 00 ff 75 0c ff 75 08 e8 [0-3] 5d c2 08 00 }
$hex_x86 = { 8d 45 f0 50 8d 45 f8 50 8d 45 e8 50 6a 00 8d 45 fc 50 [0-8] 50 72 69 6d 61 72 79 00 }
$hex_x64 = { ff f3 48 83 ec 30 48 8b d9 48 8d 15 [0-16] 50 72 69 6d 61 72 79 00 }
condition:
any of them
}
rule lsadump
{
meta:
description = "LSA dump programe (bootkey/syskey) - pwdump and others"
author = "Benjamin DELPY (gentilkiwi)"
strings:
$str_sam_inc = "\\Domains\\Account" ascii nocase
$str_sam_exc = "\\Domains\\Account\\Users\\Names\\" ascii nocase
$hex_api_call_1 = { 41 b8 00 00 00 02 [0-64] (68 | ba) ff 07 0f 00 }
$hex_api_call_2 = { 68 00 00 00 02 [0-64] (68 | ba) ff 07 0f 00 }
$str_msv_lsa = { 4c 53 41 53 52 56 2e 44 4c 4c 00 [0-32] 6d 73 76 31 5f 30 2e 64 6c 6c 00 }
$hex_bkey = { 4b 53 53 4d [20-70] 05 00 01 00}
$fp1 = "Sysinternals" ascii
$fp2 = "Apple Inc." ascii wide
condition:
( ($str_sam_inc and not $str_sam_exc) or $hex_api_call_1 or $hex_api_call_2 or $str_msv_lsa or $hex_bkey )
and not uint16(0) == 0x5a4d
and not 1 of ($fp*)
}
rule power_pe_injection
{
meta:
description = "PowerShell with PE Reflective Injection"
author = "Benjamin DELPY (gentilkiwi)"
strings:
$str_loadlib = "0x53, 0x48, 0x89, 0xe3, 0x48, 0x83, 0xec, 0x20, 0x66, 0x83, 0xe4, 0xc0, 0x48, 0xb9"
condition:
$str_loadlib
}
rule Mimikatz_Logfile
{
meta:
description = "Detects a log file generated by malicious hack tool mimikatz"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
score = 80
date = "2015/03/31"
strings:
$s1 = "SID :" ascii fullword
$s2 = "* NTLM :" ascii fullword
$s3 = "Authentication Id :" ascii fullword
$s4 = "wdigest :" ascii fullword
condition:
all of them
}
rule Mimikatz_Strings {
meta:
description = "Detects Mimikatz strings"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "not set"
date = "2016-06-08"
score = 65
strings:
$x1 = "sekurlsa::logonpasswords" fullword wide ascii
$x2 = "List tickets in MIT/Heimdall ccache" fullword ascii wide
$x3 = "kuhl_m_kerberos_ptt_file ; LsaCallKerberosPackage %08x" fullword ascii wide
$x4 = "* Injecting ticket :" fullword wide ascii
$x5 = "mimidrv.sys" fullword wide ascii
$x6 = "Lists LM & NTLM credentials" fullword wide ascii
$x7 = "\\_ kerberos -" fullword wide ascii
$x8 = "* unknow :" fullword wide ascii
$x9 = "\\_ *Password replace ->" fullword wide ascii
$x10 = "KIWI_MSV1_0_PRIMARY_CREDENTIALS KO" ascii wide
$x11 = "\\\\.\\mimidrv" wide ascii
$x12 = "Switch to MINIDUMP :" fullword wide ascii
$x13 = "[masterkey] with password: %s (%s user)" fullword wide
$x14 = "Clear screen (doesn't work with redirections, like PsExec)" fullword wide
$x15 = "** Session key is NULL! It means allowtgtsessionkey is not set to 1 **" fullword wide
$x16 = "[masterkey] with DPAPI_SYSTEM (machine, then user): " fullword wide
condition:
(
( uint16(0) == 0x5a4d and 1 of ($x*) ) or
( 3 of them )
)
/* exclude false positives */
and not pe.imphash() == "77eaeca738dd89410a432c6bd6459907"
}
rule AppInitHook {
meta:
description = "AppInitGlobalHooks-Mimikatz - Hide Mimikatz From Process Lists - file AppInitHook.dll"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://goo.gl/Z292v6"
date = "2015-07-15"
score = 70
hash = "e7563e4f2a7e5f04a3486db4cefffba173349911a3c6abd7ae616d3bf08cfd45"
strings:
$s0 = "\\Release\\AppInitHook.pdb" ascii
$s1 = "AppInitHook.dll" fullword ascii
$s2 = "mimikatz.exe" fullword wide
$s3 = "]X86Instruction->OperandSize >= Operand->Length" fullword wide
$s4 = "mhook\\disasm-lib\\disasm.c" fullword wide
$s5 = "mhook\\disasm-lib\\disasm_x86.c" fullword wide
$s6 = "VoidFunc" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 500KB and 4 of them
}
rule VSSown_VBS {
meta:
description = "Detects VSSown.vbs script - used to export shadow copy elements like NTDS to take away and crack elsewhere"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "2015-10-01"
score = 75
strings:
$s0 = "Select * from Win32_Service Where Name ='VSS'" ascii
$s1 = "Select * From Win32_ShadowCopy" ascii
$s2 = "cmd /C mklink /D " ascii
$s3 = "ClientAccessible" ascii
$s4 = "WScript.Shell" ascii
$s5 = "Win32_Process" ascii
condition:
all of them
}
rule Netview_Hacktool {
meta:
description = "Network domain enumeration tool - often used by attackers - file Nv.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/mubix/netview"
date = "2016-03-07"
score = 60
hash = "52cec98839c3b7d9608c865cfebc904b4feae0bada058c2e8cdbd561cfa1420a"
strings:
$s1 = "[+] %ws - Target user found - %s\\%s" fullword wide
$s2 = "[*] -g used without group specified - using \"Domain Admins\"" fullword ascii
$s3 = "[*] -i used without interval specified - ignoring" fullword ascii
$s4 = "[+] %ws - Session - %s from %s - Active: %d - Idle: %d" fullword wide
$s5 = "[+] %ws - Backup Domain Controller" fullword wide
$s6 = "[-] %ls - Share - Error: %ld" fullword wide
$s7 = "[-] %ls - Session - Error: %ld" fullword wide
$s8 = "[+] %s - OS Version - %d.%d" fullword ascii
$s9 = "Enumerating Logged-on Users" fullword ascii
$s10 = ": Specifies a domain to pull a list of hosts from" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 500KB and 2 of them ) or 3 of them
}
rule Netview_Hacktool_Output {
meta:
description = "Network domain enumeration tool output - often used by attackers - file filename.txt"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/mubix/netview"
date = "2016-03-07"
score = 60
strings:
$s1 = "[*] Using interval:" fullword
$s2 = "[*] Using jitter:" fullword
$s3 = "[+] Number of hosts:" fullword
condition:
2 of them
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2016-03-09
Identifier: PSattack
*/
/* Rule Set ----------------------------------------------------------------- */
rule PSAttack_EXE {
meta:
description = "PSAttack - Powershell attack tool - file PSAttack.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/gdssecurity/PSAttack/releases/"
date = "2016-03-09"
score = 100
hash = "ad05d75640c850ee7eeee26422ba4f157be10a4e2d6dc6eaa19497d64cf23715"
strings:
$x1 = "\\Release\\PSAttack.pdb" fullword
$s1 = "set-executionpolicy bypass -Scope process -Force" fullword wide
$s2 = "PSAttack.Modules." ascii
$s3 = "PSAttack.PSAttackProcessing" fullword ascii
$s4 = "PSAttack.Modules.key.txt" fullword wide
condition:
( uint16(0) == 0x5a4d and ( $x1 or 2 of ($s*) ) ) or 3 of them
}
rule Powershell_Attack_Scripts {
meta:
description = "Powershell Attack Scripts"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
date = "2016-03-09"
score = 70
strings:
$s1 = "PowershellMafia\\Invoke-Shellcode.ps1" ascii
$s2 = "Nishang\\Do-Exfiltration.ps1" ascii
$s3 = "PowershellMafia\\Invoke-Mimikatz.ps1" ascii
$s4 = "Inveigh\\Inveigh.ps1" ascii
condition:
1 of them
}
rule PSAttack_ZIP {
meta:
description = "PSAttack - Powershell attack tool - file PSAttack.zip"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/gdssecurity/PSAttack/releases/"
date = "2016-03-09"
score = 100
hash = "3864f0d44f90404be0c571ceb6f95bbea6c527bbfb2ec4a2b4f7d92e982e15a2"
strings:
$s0 = "PSAttack.exe" fullword ascii
condition:
uint16(0) == 0x4b50 and all of them
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2016-04-01
Identifier: Linux Hacktool Shark
*/
/* Super Rules ------------------------------------------------------------- */
rule Linux_Portscan_Shark_1 {
meta:
description = "Detects Linux Port Scanner Shark"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Virustotal Research - see https://github.com/Neo23x0/Loki/issues/35"
date = "2016-04-01"
super_rule = 1
hash1 = "4da0e535c36c0c52eaa66a5df6e070c52e7ddba13816efc3da5691ea2ec06c18"
hash2 = "e395ca5f932419a4e6c598cae46f17b56eb7541929cdfb67ef347d9ec814dea3"
strings:
$s0 = "rm -rf scan.log session.txt" fullword ascii
$s17 = "*** buffer overflow detected ***: %s terminated" fullword ascii
$s18 = "*** stack smashing detected ***: %s terminated" fullword ascii
condition:
( uint16(0) == 0x7362 and all of them )
}
rule Linux_Portscan_Shark_2 {
meta:
description = "Detects Linux Port Scanner Shark"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Virustotal Research - see https://github.com/Neo23x0/Loki/issues/35"
date = "2016-04-01"
super_rule = 1
hash1 = "5f80bd2db608a47e26290f3385eeb5bfc939d63ba643f06c4156704614def986"
hash2 = "90af44cbb1c8a637feda1889d301d82fff7a93b0c1a09534909458a64d8d8558"
strings:
$s1 = "usage: %s <fisier ipuri> <fisier useri:parole> <connect timeout> <fail2ban wait> <threads> <outfile> <port>" fullword ascii
$s2 = "Difference between server modulus and host modulus is only %d. It's illegal and may not work" fullword ascii
$s3 = "rm -rf scan.log" fullword ascii
condition:
all of them
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2016-05-15
Identifier: dnscat2
*/
rule dnscat2_Hacktool {
meta:
description = "Detects dnscat2 - from files dnscat, dnscat2.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://downloads.skullsecurity.org/dnscat2/"
date = "2016-05-15"
super_rule = 1
hash1 = "8bc8d6c735937c9c040cbbdcfc15f17720a7ecef202a19a7bf43e9e1c66fe66a"
hash2 = "4a882f013419695c8c0ac41d8a0fde1cf48172a89e342c504138bc6f1d13c7c8"
strings:
$s1 = "--exec -e <process> Execute the given process and link it to the stream." fullword ascii
$s2 = "Sawlog" fullword ascii
$s3 = "COMMAND_EXEC [request] :: request_id: 0x%04x :: name: %s :: command: %s" fullword ascii
$s4 = "COMMAND_SHELL [request] :: request_id: 0x%04x :: name: %s" fullword ascii
$s5 = "[Tunnel %d] connection to %s:%d closed by the server!" fullword ascii
condition:
( ( uint16(0) == 0x457f or uint16(0) == 0x5a4d ) and filesize < 400KB and ( 2 of ($s*) ) ) or ( all of them )
}
rule WCE_in_memory {
meta:
description = "Detects Windows Credential Editor (WCE) in memory (and also on disk)"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
score = 80
date = "2016-08-28"
strings:
$s1 = "wkKUSvflehHr::o:t:s:c:i:d:a:g:" fullword ascii
$s2 = "wceaux.dll" fullword ascii
condition:
all of them
}
rule pstgdump {
meta:
description = "Detects a tool used by APT groups - file pstgdump.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://goo.gl/igxLyF"
date = "2016-09-08"
hash1 = "65d48a2f868ff5757c10ed796e03621961954c523c71eac1c5e044862893a106"
strings:
$x1 = "\\Release\\pstgdump.pdb" ascii
$x2 = "Failed to dump all protected storage items - see previous messages for details" fullword ascii
$x3 = "ptsgdump [-h][-q][-u Username][-p Password]" fullword ascii
$x4 = "Attempting to impersonate domain user '%s' in domain '%s'" fullword ascii
$x5 = "Failed to impersonate user (ImpersonateLoggedOnUser failed): error %d" fullword ascii
$x6 = "Unable to obtain handle to PStoreCreateInstance in pstorec.dll" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and 1 of ($x*) ) or ( 3 of them )
}
rule lsremora {
meta:
description = "Detects a tool used by APT groups"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://goo.gl/igxLyF"
date = "2016-09-08"
hash1 = "efa66f6391ec471ca52cd053159c8a8778f11f921da14e6daf76387f8c9afcd5"
hash2 = "e0327c1218fd3723e20acc780e20135f41abca35c35e0f97f7eccac265f4f44e"
strings:
$x1 = "Target: Failed to load primary SAM functions." fullword ascii
$x2 = "lsremora64.dll" fullword ascii
$x3 = "PwDumpError:999999" fullword wide
$x4 = "PwDumpError" fullword wide
$x5 = "lsremora.dll" fullword ascii
$s1 = ":\\\\.\\pipe\\%s" fullword ascii
$s2 = "x%s_history_%d:%d" fullword wide
$s3 = "Using pipe %s" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and 1 of ($x*) ) or ( 3 of them )
}
rule servpw {
meta:
description = "Detects a tool used by APT groups - file servpw.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://goo.gl/igxLyF"
date = "2016-09-08"
hash1 = "97b39ac28794a7610ed83ad65e28c605397ea7be878109c35228c126d43e2f46"
hash2 = "0f340b471ef34c69f5413540acd3095c829ffc4df38764e703345eb5e5020301"
strings:
$s1 = "Unable to open target process: %d, pid %d" fullword ascii
$s2 = "LSASS.EXE" fullword wide
$s3 = "WriteProcessMemory failed: %d" fullword ascii
$s4 = "lsremora64.dll" fullword ascii
$s5 = "CreateRemoteThread failed: %d" fullword ascii
$s6 = "Thread code: %d, path: %s" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and 3 of them ) or ( all of them )
}
rule fgexec {
meta:
description = "Detects a tool used by APT groups - file fgexec.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://goo.gl/igxLyF"
date = "2016-09-08"
hash1 = "8697897bee415f213ce7bc24f22c14002d660b8aaffab807490ddbf4f3f20249"
strings:
$x1 = "\\Release\\fgexec.pdb" ascii
$x2 = "fgexec Remote Process Execution Tool" fullword ascii
$x3 = "fgexec CallNamedPipe failed" fullword ascii
$x4 = "fizzgig and the mighty foofus.net team" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 100KB and 1 of ($x*) ) or ( 3 of them )
}
rule cachedump {
meta:
description = "Detects a tool used by APT groups - from files cachedump.exe, cachedump64.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://goo.gl/igxLyF"
date = "2016-09-08"
super_rule = 1
hash1 = "cf58ca5bf8c4f87bb67e6a4e1fb9e8bada50157dacbd08a92a4a779e40d569c4"
hash2 = "e38edac8c838a043d0d9d28c71a96fe8f7b7f61c5edf69f1ce0c13e141be281f"
strings:
$s1 = "Failed to open key SECURITY\\Cache in RegOpenKeyEx. Is service running as SYSTEM ? Do you ever log on domain ? " fullword ascii
$s2 = "Unable to open LSASS.EXE process" fullword ascii
$s3 = "Service not found. Installing CacheDump Service (%s)" fullword ascii
$s4 = "CacheDump service successfully installed." fullword ascii
$s5 = "Kill CacheDump service (shouldn't be used)" fullword ascii
$s6 = "cacheDump [-v | -vv | -K]" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 500KB and 1 of them ) or ( 3 of them )
}
rule PwDump_B {
meta:
description = "Detects a tool used by APT groups - file PwDump.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://goo.gl/igxLyF"
date = "2016-09-08"
hash1 = "3c796092f42a948018c3954f837b4047899105845019fce75a6e82bc99317982"
strings:
$x1 = "Usage: %s [-x][-n][-h][-o output_file][-u user][-p password][-s share] machineName" fullword ascii
$x2 = "pwdump6 Version %s by fizzgig and the mighty group at foofus.net" fullword ascii
$x3 = "where -x targets a 64-bit host" fullword ascii
$x4 = "Couldn't delete target executable from remote machine: %d" fullword ascii
$s1 = "lsremora64.dll" fullword ascii
$s2 = "lsremora.dll" fullword ascii
$s3 = "servpw.exe" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 400KB and 1 of ($x*) ) or ( 3 of them )
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2016-10-07
Identifier: MSBuild Katz-XML
*/
/* Rule Set ----------------------------------------------------------------- */
rule MSBuild_Mimikatz_Execution_via_XML {
meta:
description = "Detects an XML that executes Mimikatz on an endpoint via MSBuild"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://gist.github.com/subTee/c98f7d005683e616560bda3286b6a0d8#file-katz-xml"
date = "2016-10-07"
strings:
$x1 = "<Project ToolsVersion=" ascii
$x2 = "</SharpLauncher>" fullword ascii
$s1 = "\"TVqQAAMAAAA" ascii
$s2 = "System.Convert.FromBase64String(" ascii
$s3 = ".Invoke(" ascii
$s4 = "Assembly.Load(" ascii
$s5 = ".CreateInstance(" ascii
condition:
all of them
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-01-06
Identifier: Fscan
*/
/* Rule Set ----------------------------------------------------------------- */
rule Fscan_Portscanner {
meta:
description = "Fscan port scanner scan output / strings"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://twitter.com/JamesHabben/status/817112447970480128"
date = "2017-01-06"
strings:
$s1 = "Time taken:" fullword ascii
$s2 = "Scan finished at" fullword ascii
$s3 = "Scan started at" fullword ascii
condition:
filesize < 20KB and 3 of them
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-03-15
Identifier: Windows Password Recovery
*/
/* Rule Set ----------------------------------------------------------------- */
rule WPR_loader_EXE {
meta:
description = "Windows Password Recovery - file loader.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-03-15"
hash1 = "e7d158d27d9c14a4f15a52ee5bf8aa411b35ad510b1b93f5e163ae7819c621e2"
strings:
$s1 = "Failed to get system process ID" fullword wide
$s2 = "gLSASS.EXE" fullword wide
$s3 = "WriteProcessMemory failed" fullword wide
$s4 = "wow64 process NOT created" fullword wide
$s5 = "\\ast.exe" fullword wide
$s6 = "Exit code=%s, status=%d" fullword wide
$s7 = "VirtualProtect failed" fullword wide
$s8 = "nSeDebugPrivilege" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 100KB and 3 of them )
}
rule WPR_loader_DLL {
meta:
description = "Windows Password Recovery - file loader64.dll"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-03-15"
hash1 = "7b074cb99d45fc258e0324759ee970467e0f325e5d72c0b046c4142edc6776f6"
hash2 = "a1f27f7fd0e03601a11b66d17cfacb202eacf34f94de3c4e9d9d39ea8d1a2612"
strings:
$x1 = "loader64.dll" fullword ascii
$x2 = "loader.dll" fullword ascii
$s1 = "TUlDUk9TT0ZUX0FVVEhFTlRJQ0FUSU9OX1BBQ0tBR0VfVjFfMA==" fullword ascii /* base64 encoded string 'MICROSOFT_AUTHENTICATION_PACKAGE_V1_0' */
$s2 = "UmVtb3RlRGVza3RvcEhlbHBBc3Npc3RhbnRBY2NvdW50" fullword ascii /* base64 encoded string 'RemoteDesktopHelpAssistantAccount' */
$s3 = "U2FtSVJldHJpZXZlUHJpbWFyeUNyZWRlbnRpYWxz" fullword ascii /* base64 encoded string 'SamIRetrievePrimaryCredentials' */
$s4 = "VFM6SW50ZXJuZXRDb25uZWN0b3JQc3dk" fullword ascii /* base64 encoded string 'TS:InternetConnectorPswd' */
$s5 = "TCRVRUFjdG9yQWx0Q3JlZFByaXZhdGVLZXk=" fullword ascii /* base64 encoded string 'L$UEActorAltCredPrivateKey' */
$s6 = "YXNwbmV0X1dQX1BBU1NXT1JE" fullword ascii /* base64 encoded string 'aspnet_WP_PASSWORD' */
$s7 = "TCRBTk1fQ1JFREVOVElBTFM=" fullword ascii /* base64 encoded string 'L$ANM_CREDENTIALS' */
$s8 = "RGVmYXVsdFBhc3N3b3Jk" fullword ascii /* base64 encoded string 'DefaultPassword' */
$op0 = { 48 8b cd e8 e0 e8 ff ff 48 89 07 48 85 c0 74 72 } /* Opcode */
$op1 = { e8 ba 23 00 00 33 c9 ff 15 3e 82 } /* Opcode */
$op2 = { 48 83 c4 28 e9 bc 55 ff ff 48 8d 0d 4d a7 00 00 } /* Opcode */
condition:
uint16(0) == 0x5a4d and
filesize < 400KB and
(
( 1 of ($x*) and 1 of ($s*) ) or
( 1 of ($s*) and all of ($op*) )
)
}
rule WPR_Passscape_Loader {
meta:
description = "Windows Password Recovery - file ast.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-03-15"
hash1 = "f6f2d4b9f19f9311ec419f05224a1c17cf2449f2027cb7738294479eea56e9cb"
strings:
$s1 = "SYSTEM\\CurrentControlSet\\Services\\PasscapeLoader64" fullword wide
$s2 = "ast64.dll" fullword ascii
$s3 = "\\loader64.exe" fullword wide
$s4 = "Passcape 64-bit Loader Service" fullword wide
$s5 = "PasscapeLoader64" fullword wide
$s6 = "ast64 {msg1GkjN7Sh8sg2Al7ker63f}" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and 2 of them )
}
rule WPR_Asterisk_Hook_Library {
meta:
description = "Windows Password Recovery - file ast64.dll"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-03-15"
hash1 = "225071140e170a46da0e57ce51f0838f4be00c8f14e9922c6123bee4dffde743"
hash2 = "95ec84dc709af990073495082d30309c42d175c40bd65cad267e6f103852a02d"
strings:
$s1 = "ast64.dll" fullword ascii
$s2 = "ast.dll" fullword wide
$s3 = "c:\\%s.lvc" fullword ascii
$s4 = "c:\\%d.lvc" fullword ascii
$s5 = "Asterisk Hook Library" fullword wide
$s6 = "?Ast_StartRd64@@YAXXZ" fullword ascii
$s7 = "Global\\{1374821A-281B-9AF4-%04X-12345678901234}" fullword ascii
$s8 = "2004-2013 Passcape Software" fullword wide
$s9 = "Global\\Passcape#6712%04X" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 300KB and 3 of them )
}
rule WPR_WindowsPasswordRecovery_EXE {
meta:
description = "Windows Password Recovery - file wpr.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-03-15"
hash1 = "c1c64cba5c8e14a1ab8e9dd28828d036581584e66ed111455d6b4737fb807783"
strings:
$x1 = "UuPipe" fullword ascii
$x2 = "dbadllgl" fullword ascii
$x3 = "UkVHSVNUUlkgTU9O" fullword ascii /* base64 encoded string 'REGISTRY MON' */
$x4 = "RklMRSBNT05JVE9SIC0gU1l" fullword ascii /* base64 encoded string 'FILE MONITOR - SY' */
$s1 = "WPR.exe" fullword wide
$s2 = "Windows Password Recovery" fullword wide
$op0 = { 5f df 27 17 89 } /* Opcode */
$op1 = { 5f 00 00 f2 e5 cb 97 } /* Opcode */
$op2 = { e8 ed 00 f0 cc e4 00 a0 17 } /* Opcode */
condition:
uint16(0) == 0x5a4d and
filesize < 20000KB and
(
1 of ($x*) or
all of ($s*) or
all of ($op*)
)
}
rule WPR_WindowsPasswordRecovery_EXE_64 {
meta:
description = "Windows Password Recovery - file ast64.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-03-15"
hash1 = "4e1ea81443b34248c092b35708b9a19e43a1ecbdefe4b5180d347a6c8638d055"
strings:
$s1 = "%B %d %Y - %H:%M:%S" fullword wide
$op0 = { 48 8d 8c 24 50 22 00 00 e8 bf eb ff ff 4c 8b c7 } /* Opcode */
$op1 = { ff 15 16 25 01 00 f7 d8 1b } /* Opcode */
$op2 = { e8 c2 26 00 00 83 20 00 83 c8 ff 48 8b 5c 24 30 } /* Opcode */
condition:
( uint16(0) == 0x5a4d and filesize < 300KB and all of them )
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-03-17
Identifier: BeyondExec Remote Access Tool
*/
/* Rule Set ----------------------------------------------------------------- */
rule BeyondExec_RemoteAccess_Tool {
meta:
description = "Detects BeyondExec Remote Access Tool - file rexesvr.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://goo.gl/BvYurS"
date = "2017-03-17"
hash1 = "3d3e3f0708479d951ab72fa04ac63acc7e5a75a5723eb690b34301580747032c"
strings:
$x1 = "\\BeyondExecV2\\Server\\Release\\Pipes.pdb" ascii
$x2 = "\\\\.\\pipe\\beyondexec%d-stdin" fullword ascii
$x3 = "Failed to create dispatch pipe. Do you have another instance running?" fullword ascii
$op1 = { 83 e9 04 72 0c 83 e0 03 03 c8 ff 24 85 80 6f 40 } /* Opcode */
$op2 = { 6a 40 33 c0 59 bf e0 d8 40 00 f3 ab 8d 0c 52 c1 } /* Opcode */
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and ( 1 of ($x*) or all of ($op*) ) ) or ( 3 of them )
}
rule Mimikatz_Gen_Strings {
meta:
description = "Detects Mimikatz by using some special strings"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-06-19"
super_rule = 1
hash1 = "058cc8b3e4e4055f3be460332a62eb4cbef41e3a7832aceb8119fd99fea771c4"
hash2 = "eefd4c038afa0e80cf6521c69644e286df08c0883f94245902383f50feac0f85"
hash3 = "f35b589c1cc1c98c4c4a5123fd217bdf0d987c00d2561992cbfb94bd75920159"
strings:
$s1 = "[*] '%s' service already started" fullword wide
$s2 = "** Security Callback! **" fullword wide
$s3 = "Try to export a software CA to a crypto (virtual)hardware" fullword wide
$s4 = "enterpriseadmin" fullword wide
$s5 = "Ask debug privilege" fullword wide
$s6 = "Injected =)" fullword wide
$s7 = "** SAM ACCOUNT **" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 12000KB and 1 of them )
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-07-07
Identifier: 0day
Reference: Disclosed 0day Repos
*/
/* Rule Set ----------------------------------------------------------------- */
rule Disclosed_0day_POCs_lpe {
meta:
description = "Detects POC code from disclosed 0day hacktool set"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Disclosed 0day Repos"
date = "2017-07-07"
hash1 = "e10ee278f4c86d6ee1bd93a7ed71d4d59c0279381b00eb6153aedfb3a679c0b5"
hash2 = "a5916cefa0f50622a30c800e7f21df481d7a3e1e12083fef734296a22714d088"
hash3 = "5b701a5b5bbef7027711071cef2755e57984bfdff569fe99efec14a552d8ee43"
strings:
$x1 = "msiexec /f c:\\users\\%username%\\downloads\\" fullword ascii
$x2 = "c:\\users\\%username%\\downloads\\bat.bat" fullword ascii
$x3 = "\\payload.msi /quiet" ascii
$x4 = "\\payload2\\WindowsTrustedRTProxy.sys" fullword wide
$x5 = "\\payload2" fullword wide
$x6 = "\\payload" fullword wide
$x7 = "WindowsTrustedRTProxy.sys /grant:r administrators:RX" ascii
condition:
( uint16(0) == 0x5a4d and filesize < 70KB and 1 of them )
}
rule Disclosed_0day_POCs_exploit {
meta:
description = "Detects POC code from disclosed 0day hacktool set"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Disclosed 0day Repos"
date = "2017-07-07"
hash1 = "632d35a0bac27c9b2f3f485d43ebba818089cf72b3b8c4d2e87ce735b2e67d7e"
strings:
$x1 = "\\Release\\exploit.pdb" ascii
$x2 = "\\favorites\\stolendata.txt" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and 1 of them )
}
rule Disclosed_0day_POCs_InjectDll {
meta:
description = "Detects POC code from disclosed 0day hacktool set"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Disclosed 0day Repos"
date = "2017-07-07"
hash1 = "173d3f78c9269f44d069afbd04a692f5ae42d5fdc9f44f074599ec91e8a29aa2"
strings:
$x1 = "\\Release\\InjectDll.pdb" fullword ascii
$x2 = "Specify -l to list all IE processes running in the current session" fullword ascii
$x3 = "Usage: InjectDll -l|pid PathToDll" fullword ascii
$x4 = "Injecting DLL: %ls into PID: %d" fullword ascii
$x5 = "Error adjusting privilege %d" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 300KB and 1 of them )
}
rule Disclosed_0day_POCs_payload_MSI {
meta:
description = "Detects POC code from disclosed 0day hacktool set"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Disclosed 0day Repos"
date = "2017-07-07"
hash1 = "a7c498a95850e186b7749a96004a98598f45faac2de9b93354ac93e627508a87"
strings:
$s1 = "WShell32.dll" fullword wide
$s2 = "Target empty, so account name translation begins on the local system." fullword wide
$s3 = "\\custact\\x86\\AICustAct.pdb" fullword ascii
condition:
( uint16(0) == 0xcfd0 and filesize < 1000KB and all of them )
}
rule Disclosed_0day_POCs_injector {
meta:
description = "Detects POC code from disclosed 0day hacktool set"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Disclosed 0day Repos"
date = "2017-07-07"
hash1 = "ba0e2119b2a6bad612e86662b643a404426a07444d476472a71452b7e9f94041"
strings:
$x1 = "\\Release\\injector.pdb" ascii
$x2 = "Cannot write the shellcode in the process memory, error: " fullword ascii
$x3 = "/s shellcode_file PID: shellcode injection." fullword ascii
$x4 = "/d dll_file PID: dll injection via LoadLibrary()." fullword ascii
$x5 = "/s shellcode_file PID" fullword ascii
$x6 = "Shellcode copied in memory: OK" fullword ascii
$x7 = "Usage of the injector. " fullword ascii
$x8 = "KO: cannot obtain the SeDebug privilege." fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 90KB and 1 of them ) or 3 of them
}
rule Disclosed_0day_POCs_lpe_2 {
meta:
description = "Detects POC code from disclosed 0day hacktool set"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Disclosed 0day Repos"
date = "2017-07-07"
hash1 = "b4f3787a19b71c47bc4357a5a77ffb456e2f71fd858079d93e694a6a79f66533"
strings:
$s1 = "\\cmd.exe\" /k wusa c:\\users\\" ascii
$s2 = "D:\\gitpoc\\UAC\\src\\x64\\Release\\lpe.pdb" fullword ascii
$s3 = "Folder Created: " fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 700KB and 2 of them )
}
rule Disclosed_0day_POCs_shellcodegenerator {
meta:
description = "Detects POC code from disclosed 0day hacktool set"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Disclosed 0day Repos"
date = "2017-07-07"
hash1 = "55c4073bf8d38df7d392aebf9aed2304109d92229971ffac6e1c448986a87916"
strings:
$x1 = "\\Release\\shellcodegenerator.pdb" ascii
condition:
( uint16(0) == 0x5a4d and filesize < 40KB and all of them )
}
rule SecurityXploded_Producer_String {
meta:
description = "Detects hacktools by SecurityXploded"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://securityxploded.com/browser-password-dump.php"
date = "2017-07-13"
score = 60
hash1 = "d57847db5458acabc87daee6f30173348ac5956eb25e6b845636e25f5a56ac59"
strings:
$x1 = "http://securityxploded.com" fullword ascii
condition:
( uint16(0) == 0x5a4d and all of them )
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-07-21
Identifier: Kekeo
Reference: https://github.com/gentilkiwi/kekeo/releases
*/
/* Rule Set ----------------------------------------------------------------- */
rule Kekeo_Hacktool {
meta:
description = "Detects Kekeo Hacktool"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/gentilkiwi/kekeo/releases"
date = "2017-07-21"
hash1 = "ce92c0bcdf63347d84824a02b7a448cf49dd9f44db2d02722d01c72556a2b767"
hash2 = "49d7fec5feff20b3b57b26faccd50bc05c71f1dddf5800eb4abaca14b83bba8c"
strings:
$x1 = "[ticket %u] session Key is NULL, maybe a TGT without enough rights when WCE dumped it." fullword wide
$x2 = "ERROR kuhl_m_smb_time ; Invalid! Command: %02x - Status: %08x" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 2000KB and ( 1 of ($x*) ) )
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-07-27
Identifier: AllTheThings
Reference: https://github.com/subTee/AllTheThings
*/
/* Rule Set ----------------------------------------------------------------- */
rule AllTheThings {
meta:
description = "Detects AllTheThings"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/subTee/AllTheThings"
date = "2017-07-27"
hash1 = "5a0e9a9ce00d843ea95bd5333b6ab50cc5b1dbea648cc819cfe48482513ce842"
strings:
$x1 = "\\obj\\Debug\\AllTheThings.pdb" fullword ascii
$x2 = "AllTheThings.exe" fullword wide
$x3 = "\\AllTheThings.dll" fullword ascii
$x4 = "Hello From Main...I Don't Do Anything" fullword wide
$x5 = "I am a basic COM Object" fullword wide
$x6 = "I shouldn't really execute either." fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 50KB and 1 of them )
}
rule Impacket_Keyword {
meta:
description = "Detects Impacket Keyword in Executable"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-08-04"
score = 60
hash1 = "9388c78ea6a78dbea307470c94848ae2481481f593d878da7763e649eaab4068"
hash2 = "2f6d95e0e15174cfe8e30aaa2c53c74fdd13f9231406b7103da1e099c08be409"
strings:
$s1 = "impacket.smb(" fullword ascii
$s2 = "impacket.ntlm(" fullword ascii
$s3 = "impacket.nmb(" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 14000KB and 1 of them )
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-08-27
Reference: PasswordPro
*/
/* Rule Set ----------------------------------------------------------------- */
import "pe"
rule PasswordsPro {
meta:
description = "Auto-generated rule - file PasswordsPro.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "PasswordPro"
date = "2017-08-27"
hash1 = "5b3d6654e6d9dc49ee1136c0c8e8122cb0d284562447abfdc05dfe38c79f95bf"
strings:
$s1 = "No users marked for attack or all marked users already have passwords found!" fullword ascii
$s2 = "%s\\PasswordsPro.ini.Dictionaries(%d)" fullword ascii
$s3 = "Passwords processed since attack start:" fullword ascii
condition:
( uint16(0) == 0x5a4d and
filesize < 2000KB and
1 of them
)
}
rule PasswordPro_NTLM_DLL {
meta:
description = "Auto-generated rule - file NTLM.dll"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "PasswordPro"
date = "2017-08-27"
hash1 = "47d4755d31bb96147e6230d8ea1ecc3065da8e557e8176435ccbcaea16fe50de"
strings:
$s1 = "NTLM.dll" fullword ascii
$s2 = "Algorithm: NTLM" fullword ascii
condition:
( uint16(0) == 0x5a4d and
filesize < 20KB and
pe.exports("GetHash") and pe.exports("GetInfo") and
( all of them )
)
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-08-29
Identifier: KeeTheft
Reference: https://github.com/HarmJ0y/KeeThief
*/
/* Rule Set ----------------------------------------------------------------- */
rule KeeThief_PS {
meta:
description = "Detects component of KeeTheft - KeePass dump tool - file KeeThief.ps1"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/HarmJ0y/KeeThief"
date = "2017-08-29"
hash1 = "a3b976279ded8e64b548c1d487212b46b03aaec02cb6e199ea620bd04b8de42f"
strings:
$x1 = "$WMIProcess = Get-WmiObject win32_process -Filter \"ProcessID = $($KeePassProcess.ID)\"" fullword ascii
$x2 = "if($KeePassProcess.FileVersion -match '^2\\.') {" fullword ascii
condition:
( uint16(0) == 0x7223 and
filesize < 1000KB and
( 1 of ($x*) )
)
}
rule KeeTheft_EXE {
meta:
description = "Detects component of KeeTheft - KeePass dump tool - file KeeTheft.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/HarmJ0y/KeeThief"
date = "2017-08-29"
hash1 = "f06789c3e9fe93c165889799608e59dda6b10331b931601c2b5ae06ede41dc22"
strings:
$x1 = "Error: Could not create a thread for the shellcode" fullword wide
$x2 = "Could not find address marker in shellcode" fullword wide
$x3 = "GenerateDecryptionShellCode" fullword ascii
$x4 = "KeePassLib.Keys.KcpPassword" fullword wide
$x5 = "************ Found a CompositeKey! **********" fullword wide
$x6 = "*** Interesting... there are multiple .NET runtimes loaded in KeePass" fullword wide
$x7 = "GetKcpPasswordInfo" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 200KB and 2 of them )
}
rule KeeTheft_Out_Shellcode {
meta:
description = "Detects component of KeeTheft - KeePass dump tool - file Out-Shellcode.ps1"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/HarmJ0y/KeeThief"
date = "2017-08-29"
hash1 = "2afb1c8c82363a0ae43cad9d448dd20bb7d2762aa5ed3672cd8e14dee568e16b"
strings:
$x1 = "Write-Host \"Shellcode length: 0x$(($ShellcodeLength + 1).ToString('X4'))\"" fullword ascii
$x2 = "$TextSectionInfo = @($MapContents | Where-Object { $_ -match '\\.text\\W+CODE' })[0]" fullword ascii
condition:
( filesize < 2KB and 1 of them )
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-09-23
Identifier: Sharpire
Reference: https://github.com/0xbadjuju/Sharpire
*/
rule Sharpire {
meta:
description = "Auto-generated rule - file Sharpire.exe"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/0xbadjuju/Sharpire"
date = "2017-09-23"
hash1 = "327a1dc2876cd9d7f6a5b3777373087296fc809d466e42861adcf09986c6e587"
strings:
$x1 = "\\obj\\Debug\\Sharpire.pdb" fullword ascii
$x2 = "[*] Upload of $fileName successful" fullword wide
$s1 = "no shell command supplied" fullword wide
$s2 = "/login/process.php" fullword wide
$s3 = "invokeShellCommand" fullword ascii
$s4 = "..Command execution completed." fullword wide
$s5 = "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko" fullword wide
$s6 = "/admin/get.php" fullword wide
$s7 = "[!] Error in stopping job: " fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 100KB and ( 1 of ($x*) and 3 of them ) )
}
/*
Yara Rule Set
Author: Florian Roth
Date: 2017-09-23
Identifier: Invoke-Metasploit
Reference: https://github.com/jaredhaight/Invoke-MetasploitPayload/blob/master/Invoke-MetasploitPayload.ps1
*/
rule Invoke_Metasploit {
meta:
description = "Detects Invoke-Metasploit Payload"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/jaredhaight/Invoke-MetasploitPayload/blob/master/Invoke-MetasploitPayload.ps1"
date = "2017-09-23"
hash1 = "b36d3ca7073741c8a48c578edaa6d3b6a8c3c4413e961a83ad08ad128b843e0b"
strings:
$s1 = "[*] Looks like we're 64bit, using regular powershell.exe" ascii wide
$s2 = "[*] Kicking off download cradle in a new process"
$s3 = "Proxy.Credentials=[Net.CredentialCache]::DefaultCredentials;Invoke-Expression $client.downloadstring('''+$url+''');'"
condition:
( filesize < 20KB and 1 of them )
}
rule PowerShell_Mal_HackTool_Gen {
meta:
description = "Detects PowerShell hack tool samples - generic PE loader"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-11-02"
hash1 = "d442304ca839d75b34e30e49a8b9437b5ab60b74d85ba9005642632ce7038b32"
strings:
$x1 = "$PEBytes32 = 'TVqQAAMAAAAEAAAA" wide
$x2 = "Write-BytesToMemory -Bytes $Shellcode1 -MemoryAddress $GetCommandLineWAddrTemp" fullword wide
$x3 = "@($PEBytes64, $PEBytes32, \"Void\", 0, \"\", $ExeArgs)" fullword wide
$x4 = "(Shellcode: LoadLibraryA.asm)" fullword wide
condition:
filesize < 8000KB and 1 of them
}
rule Sig_RemoteAdmin_1 {
meta:
description = "Detects strings from well-known APT malware"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2017-12-03"
score = 45
strings:
$ = "Radmin, Remote Administrator" wide
$ = "Radmin 3.0" wide
condition:
uint16(0) == 0x5a4d and filesize < 3000KB and 1 of them
}
rule RemCom_RemoteCommandExecution {
meta:
description = "Detects strings from RemCom tool"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://goo.gl/tezXZt"
date = "2017-12-28"
score = 55
strings:
$ = "\\\\.\\pipe\\%s%s%d"
$ = "%s\\pipe\\%s%s%d%s"
$ = "\\ADMIN$\\System32\\%s%s"
condition:
1 of them
}
rule Crackmapexec_EXE {
meta:
description = "Detects CrackMapExec hack tool"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2018-04-06"
score = 85
hash1 = "371f104b7876b9080c519510879235f36edb6668097de475949b84ab72ee9a9a"
strings:
$s1 = "core.scripts.secretsdump(" fullword ascii
$s2 = "core.scripts.samrdump(" fullword ascii
$s3 = "core.uacdump(" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 10000KB and 2 of them
}
rule SUSP_Imphash_PassRevealer_PY_EXE {
meta:
description = "Detects an imphash used by password revealer and hack tools"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2018-04-06"
score = 40
hash1 = "371f104b7876b9080c519510879235f36edb6668097de475949b84ab72ee9a9a"
strings:
$fp1 = "Assmann Electronic GmbH" ascii wide
$fp2 = "Oculus VR" ascii wide
condition:
uint16(0) == 0x5a4d and filesize < 10000KB
and pe.imphash() == "ed61beebc8d019dd9bec823e2d694afd"
and not 1 of ($fp*)
}
rule MAL_Unknown_PWDumper_Apr18_3 {
meta:
description = "Detects sample from unknown sample set - IL origin"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "Internal Research"
date = "2018-04-06"
hash1 = "d435e7b6f040a186efeadb87dd6d9a14e038921dc8b8658026a90ae94b4c8b05"
hash2 = "8c35c71838f34f7f7a40bf06e1d2e14d58d9106e6d4e6f6e9af732511a126276"
strings:
$s1 = "loaderx86.dll" fullword ascii
$s2 = "tcpsvcs.exe" fullword wide
$s3 = "%Program Files, Common FOLDER%" fullword wide
$s4 = "%AllUsers, ApplicationData FOLDER%" fullword wide
$s5 = "loaderx86" fullword ascii
$s6 = "TNtDllHook$" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 3000KB and all of them
}
rule ProcessInjector_Gen {
meta:
description = "Detects a process injection utility that can be used ofr good and bad purposes"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "https://github.com/cuckoosandbox/monitor/blob/master/bin/inject.c"
date = "2018-04-23"
score = 60
hash1 = "456c1c25313ce2e2eedf24fdcd4d37048bcfff193f6848053cbb3b5e82cd527d"
strings:
$x1 = "Error injecting remote thread in process:" fullword ascii
$s5 = "[-] Error getting access to process: %ld!" fullword ascii
$s6 = "--process-name <name> Process name to inject" fullword ascii
$s12 = "No injection target has been provided!" fullword ascii
$s17 = "[-] An app path is required when not injecting!" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 50KB and (
pe.imphash() == "d27e0fa013d7ae41be12aaf221e41f9b" or
1 of them
) or 3 of them
}
rule Lazagne_PW_Dumper {
meta:
description = "Detects Lazagne PW Dumper"
author = "Markus Neis / Florian Roth"
reference = "https://github.com/AlessandroZ/LaZagne/releases/"
date = "2018-03-22"
score = 70
strings:
$s1 = "Crypto.Hash" fullword ascii
$s2 = "laZagne" fullword ascii
$s3 = "impacket.winregistry" fullword ascii
condition:
3 of them
}
rule HKTL_shellpop_TCLsh {
meta:
description = "Detects suspicious TCLsh popshell"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "9f49d76d70d14bbe639a3c16763d3b4bee92c622ecb1c351cb4ea4371561e133"
strings:
$s1 = "{ puts -nonewline $s \"shell>\";flush $s;gets $s c;set e \"exec $c\";if" ascii
condition:
filesize < 1KB and 1 of them
}
rule HKTL_shellpop_ruby {
meta:
description = "Detects suspicious ruby shellpop"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "6b425b37f3520fd8c778928cc160134a293db0ce6d691e56a27894354b04f783"
strings:
$x1 = ");while(cmd=c.gets);IO.popen(cmd,'r'){" ascii
condition:
filesize < 1KB and all of them
}
rule HKTL_shellpop_awk {
meta:
description = "Detects suspicious AWK Shellpop"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "7513a0a0ba786b0e22a9a7413491b4011f60af11253c596fa6857fb92a6736fc"
strings:
$s1 = "awk 'BEGIN {s = \"/inet/tcp/0/" ascii
$s2 = "; while(42) " ascii
condition:
filesize < 1KB and 1 of them
}
rule HKTL_shellpop_Netcat_UDP {
meta:
description = "Detects suspicious netcat popshell"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "d823ad91b315c25893ce8627af285bcf4e161f9bbf7c070ee2565545084e88be"
strings:
$s1 = "mkfifo fifo ; nc.traditional -u" ascii
$s2 = "< fifo | { bash -i; } > fifo" fullword ascii
condition:
filesize < 1KB and 1 of them
}
rule HKTL_shellpop_socat {
meta:
description = "Detects suspicious socat popshell"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "267f69858a5490efb236628260b275ad4bbfeebf4a83fab8776e333ca706a6a0"
strings:
$s1 = "socat tcp-connect" ascii
$s2 = ",pty,stderr,setsid,sigint,sane" ascii
condition:
filesize < 1KB and 2 of them
}
rule HKTL_shellpop_Perl {
meta:
description = "Detects Shellpop Perl script"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "32c3e287969398a070adaad9b819ee9228174c9cb318d230331d33cda51314eb"
strings:
$ = "perl -e 'use IO::Socket::INET;$|=1;my ($s,$r);" ascii
$ = ";STDIN->fdopen(\\$c,r);$~->fdopen(\\$c,w);s" ascii
condition:
filesize < 2KB and 1 of them
}
rule HKTL_shellpop_Python {
meta:
description = "Detects malicious python shell"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "aee1c9e45a1edb5e462522e266256f68313e2ff5956a55f0a84f33bc6baa980b"
strings:
$ = "os.putenv('HISTFILE', '/dev/null');" ascii
condition:
filesize < 2KB and 1 of them
}
rule HKTL_shellpop_PHP_TCP {
meta:
description = "Detects malicious PHP shell"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "0412e1ab9c672abecb3979a401f67d35a4a830c65f34bdee3f87e87d060f0290"
strings:
$x1 = "php -r \"\\$sock=fsockopen" ascii
$x2 = ";exec('/bin/sh -i <&3 >&3 2>&3');\"" ascii
condition:
filesize < 3KB and all of them
}
rule HKTL_shellpop_Powershell_TCP {
meta:
description = "Detects malicious powershell"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "8328806700696ffe8cc37a0b81a67a6e9c86bb416364805b8aceaee5db17333f"
strings:
$ = "Something went wrong with execution of command on the target" ascii
$ = ";[byte[]]$bytes = 0..65535|%{0};$sendbytes =" ascii
condition:
filesize < 3KB and 1 of them
}
rule SUSP_Powershell_ShellCommand_May18_1 {
meta:
description = "Detects a supcicious powershell commandline"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "8328806700696ffe8cc37a0b81a67a6e9c86bb416364805b8aceaee5db17333f"
strings:
$x1 = "powershell -nop -ep bypass -Command" ascii
condition:
filesize < 3KB and 1 of them
}
rule HKTL_shellpop_Telnet_TCP {
meta:
description = "Detects malicious telnet shell"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "cf5232bae0364606361adafab32f19cf56764a9d3aef94890dda9f7fcd684a0e"
strings:
$x1 = "if [ -e /tmp/f ]; then rm /tmp/f;" ascii
$x2 = "0</tmp/f|/bin/bash 1>/tmp/f" fullword ascii
condition:
filesize < 3KB and 1 of them
}
rule SUSP_shellpop_Bash {
meta:
description = "Detects susupicious bash command"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "36fad575a8bc459d0c2e3ad626e97d5cf4f5f8bedc56b3cc27dd2f7d88ed889b"
strings:
$ = "/bin/bash -i >& /dev/tcp/" ascii
condition:
1 of them
}
rule HKTL_shellpop_netcat {
meta:
description = "Detects suspcious netcat shellpop"
author = "Tobias Michalski"
reference = "https://github.com/0x00-0x00/ShellPop"
date = "2018-05-18"
hash1 = "98e3324f4c096bb1e5533114249a9e5c43c7913afa3070488b16d5b209e015ee"
strings:
$s1 = "if [ -e /tmp/f ]; then rm /tmp/f;" ascii
$s2 = "fi;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc" ascii
$s4 = "mknod /tmp/f p && nc" ascii
$s5 = "</tmp/f|/bin/bash 1>/tmp/f" ascii
condition:
filesize < 2KB and 1 of them
}
rule HKTL_beRootexe {
meta:
description = "Detects beRoot.exe which checks common Windows missconfigurations"
author = "yarGen Rule Generator"
reference = "https://github.com/AlessandroZ/BeRoot/tree/master/Windows"
date = "2018-07-25"
hash1 = "865b3b8ec9d03d3475286c3030958d90fc72b21b0dca38e5bf8e236602136dd7"
strings:
$s1 = "checks.webclient.secretsdump(" fullword ascii
$s2 = "beroot.modules" fullword ascii
$s3 = "beRoot.exe.manifest" fullword ascii
condition:
( uint16(0) == 0x5a4d and
filesize < 18000KB and
1 of them)
}
rule HKTL_beRootexe_output {
meta:
description = "Detects the output of beRoot.exe"
author = "Tobias Michalski"
reference = "https://github.com/AlessandroZ/BeRoot/tree/master/Windows"
date = "2018-07-25"
strings:
$s1 = "permissions: {'change_config'" fullword wide
$s2 = "Full path: C:\\Windows\\system32\\msiexec.exe /V" fullword wide
$s3 = "Full path: C:\\Windows\\system32\\svchost.exe -k DevicesFlow" fullword wide
$s4 = "! BANG BANG !" fullword wide
condition:
filesize < 400KB and 3 of them
}
rule HKTL_EmbeddedPDF {
meta:
description = "Detects Embedded PDFs which can start malicious content"
author = "Tobias Michalski"
reference = "https://twitter.com/infosecn1nja/status/1021399595899731968?s=12"
date = "2018-07-25"
strings:
$x1 = "/Type /Action\n /S /JavaScript\n /JS (this.exportDataObject({" fullword ascii
$s1 = "(This PDF document embeds file" fullword ascii
$s2 = "/Names << /EmbeddedFiles << /Names" fullword ascii
$s3 = "/Type /EmbeddedFile" fullword ascii
condition:
uint16(0) == 0x5025 and
2 of ($s*) and $x1
}
rule HTKL_BlackBone_DriverInjector {
meta:
description = "Detects BlackBone Driver injector"
author = "Florian Roth"
reference = "https://github.com/DarthTon/Blackbone"
date = "2018-09-11"
score = 60
hash1 = "8062a4284c719412270614458150cb4abbdf77b2fc35f770ce9c45d10ccb1f4d"
hash2 = "2d2fc27200c22442ac03e2f454b6e1f90f2bbc17017f05b09f7824fac6beb14b"
hash3 = "e45da157483232d9c9c72f44b13fca2a0d268393044db00104cc1afe184ca8d1"
strings:
$s1 = "=INITtH=PAGEtA" fullword ascii
$s2 = "BBInjectDll" fullword ascii
$s3 = "LdrLoadDll" fullword ascii
$s4 = "\\??\\pipe\\%ls" fullword wide
$s5 = "Failed to retrieve Kernel base address. Aborting" fullword ascii
$x2 = "BlackBone: %s: APC injection failed with status 0x%X" fullword ascii
$x3 = "BlackBone: PDE_BASE/PTE_BASE not found " fullword ascii
$x4 = "%s: Invalid injection type specified - %d" fullword ascii
$x6 = "Trying to map C:\\windows\\system32\\cmd.exe into current process" fullword wide
$x7 = "\\BlackBoneDrv\\bin\\" ascii
$x8 = "DosDevices\\BlackBone" wide
condition:
uint16(0) == 0x5a4d and filesize < 8000KB and ( 3 of them or 1 of ($x*) )
}
rule HKTL_SqlMap {
meta:
description = "Detects sqlmap hacktool"
author = "Florian Roth"
reference = "https://github.com/sqlmapproject/sqlmap"
date = "2018-10-09"
hash1 = "9444478b03caf7af853a64696dd70083bfe67f76aa08a16a151c00aadb540fa8"
strings:
$x1 = "if cmdLineOptions.get(\"sqlmapShell\"):" fullword ascii
$x2 = "if conf.get(\"dumper\"):" fullword ascii
condition:
filesize < 50KB and 1 of them
}
rule HKTL_SqlMap_backdoor {
meta:
description = "Detects SqlMap backdoors"
author = "Florian Roth"
reference = "https://github.com/sqlmapproject/sqlmap"
date = "2018-10-09"
condition:
( uint32(0) == 0x8e859c07 or
uint32(0) == 0x2d859c07 or
uint32(0) == 0x92959c07 or
uint32(0) == 0x929d9c07 or
uint32(0) == 0x29959c07 or
uint32(0) == 0x2b8d9c07 or
uint32(0) == 0x2b859c07 or
uint32(0) == 0x28b59c07 ) and filesize < 2KB
}
rule HKTL_Lazagne_PasswordDumper_Dec18_1 {
meta:
description = "Detects password dumper Lazagne often used by middle eastern threat groups"
author = "Florian Roth"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
reference = "https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group"
date = "2018-12-11"
score = 85
hash1 = "1205f5845035e3ee30f5a1ced5500d8345246ef4900bcb4ba67ef72c0f79966c"
hash2 = "884e991d2066163e02472ea82d89b64e252537b28c58ad57d9d648b969de6a63"
hash3 = "bf8f30031769aa880cdbe22bc0be32691d9f7913af75a5b68f8426d4f0c7be50"
strings:
$s1 = "softwares.opera(" fullword ascii
$s2 = "softwares.mozilla(" fullword ascii
$s3 = "config.dico(" fullword ascii
$s4 = "softwares.chrome(" fullword ascii
$s5 = "softwares.outlook(" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 17000KB and 1 of them
}
rule HKTL_Lazagne_Gen_18 {
meta:
description = "Detects Lazagne password extractor hacktool"
author = "Florian Roth"
reference = "https://github.com/AlessandroZ/LaZagne"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
date = "2018-12-11"
score = 80
hash1 = "51121dd5fbdfe8db7d3a5311e3e9c904d644ff7221b60284c03347938577eecf"
strings:
$x1 = "lazagne.config.powershell_execute(" fullword ascii
$x2 = "creddump7.win32." ascii
$x3 = "lazagne.softwares.windows.hashdump" ascii
$x4 = ".softwares.memory.libkeepass.common(" ascii
condition:
2 of them
}
rule HKTL_NoPowerShell {
meta:
description = "Detects NoPowerShell hack tool"
author = "Florian Roth"
reference = "https://github.com/bitsadmin/nopowershell"
date = "2018-12-28"
hash1 = "2dad091dd00625762a7590ce16c3492cbaeb756ad0e31352a42751deb7cf9e70"
strings:
$x1 = "\\NoPowerShell.pdb" fullword ascii
$x2 = "Invoke-WmiMethod -Class Win32_Process -Name Create \"cmd" fullword wide
$x3 = "ls C:\\Windows\\System32 -Include *.exe | select -First 10 Name,Length" fullword wide
$x4 = "ls -Recurse -Force C:\\Users\\ -Include *.kdbx" fullword wide
$x5 = "NoPowerShell.exe" fullword wide
condition:
1 of them
}
rule htran_go {
meta:
author = "Jeff Beley"
hash1 = "4acbefb9f7907c52438ebb3070888ddc8cddfe9e3849c9d0196173a422b9035f"
description = "detects go based htran variant"
date = "2019-01-09"
strings:
$s1 = "https://github.com/cw1997/NATBypass" fullword ascii
$s2 = "-slave ip1:port1 ip2:port2" fullword ascii
$s3 = "optional argument:" fullword ascii
$s4 = "-tran port1 ip:port2" fullword ascii
condition:
uint16(0) == 0x5a4d and filesize < 7000KB and all of them
}