signature-base/yara/crime_andromeda_jun17.yar

37 lines
1.6 KiB
Plaintext

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-06-30
Identifier: WORM_RETADUP
Reference: http://blog.trendmicro.com/trendlabs-security-intelligence/information-stealer-found-hitting-israeli-hospitals/
*/
/* Rule Set ----------------------------------------------------------------- */
rule Andromeda_MalBot_Jun_1A {
meta:
description = "Detects a malicious Worm Andromeda / RETADUP"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://blog.trendmicro.com/trendlabs-security-intelligence/information-stealer-found-hitting-israeli-hospitals/"
date = "2017-06-30"
hash1 = "3c223bbf83ac2f91c79383a53ed15b0c8ffe2caa1bf52b26c17fd72278dc7ef9"
hash2 = "73cecc67bb12cf5a837af9fba15b7792a6f1a746b246b34f8ed251c4372f1a98"
hash3 = "66035cc81e811735beab573013950153749b02703eae58b90430646f6e3e3eb4"
hash4 = "42a02e6cf7c424c12f078fca21805de072842ec52a25ea87bd7d53e7feb536ed"
strings:
$x1 = "%temp%\\FolderN\\name.exe" fullword wide
$x2 = "%temp%\\FolderN\\name.exe.lnk" fullword wide
$x3 = "\\Startup\\name.exe" fullword wide
$x4 = "firefox.exe.exe" fullword wide
$x5 = "\\Desktop\\New folder\\dark.exe" fullword wide
$x6 = "\\x86\\Release\\word.pdb" fullword ascii
$x7 = "\\obj\\Release\\botkill.pdb" fullword ascii
$s1 = "4System.Web.Services.Protocols.SoapHttpClientProtocol" fullword ascii
$s2 = "svhost.exe" fullword wide
condition:
uint16(0) == 0x5a4d and filesize < 2000KB and ( 1 of ($x*) or 2 of them )
}