signature-base/yara/gen_gen_cactustorch.yar
2017-07-31 14:52:02 +02:00

44 lines
1.7 KiB
Plaintext

/*
Yara Rule Set
Author: Florian Roth
Date: 2017-07-31
Identifier: CactusTorch
Reference: https://github.com/mdsecactivebreach/CACTUSTORCH
*/
/* Rule Set ----------------------------------------------------------------- */
rule CACTUSTORCH {
meta:
description = "Detects CactusTorch Hacktool"
author = "Florian Roth"
reference = "https://github.com/mdsecactivebreach/CACTUSTORCH"
date = "2017-07-31"
hash1 = "314e6d7d863878b6dca46af165e7f08fedd42c054d7dc3828dc80b86a3a9b98c"
hash2 = "0305aa32d5f8484ca115bb4888880729af7f33ac99594ec1aa3c65644e544aea"
hash3 = "a52d802e34ac9d7d3539019d284b04ded3b8e197d5e3b38ed61f523c3d68baa7"
strings:
$x1 = "$payload = shellcode(%options[\"listener\"], \"true\", \"x86\");" fullword ascii
$x2 = "Copy the base64 encoded payload into the code variable below." fullword ascii
$x3 = " CACTUSTORCH Payload" ascii
$x4 = "ms.Write transform.TransformFinalBlock(enc.GetBytes_4(b), 0, length), 0, ((length / 4) * 3)" fullword ascii
$x5 = "' Author: Vincent Yiu (@vysecurity)" fullword ascii
$x6 = "Dim binary : binary = \"rundll32.exe\"" fullword ascii
$a1 = "code = code & \"" ascii
$a2 = "serialized_obj = serialized_obj & \"" ascii
$s1 = "binary = \"rundll32.exe\"" fullword ascii
$s2 = "EL.DataType = \"bin.hex\"" fullword ascii
$s3 = "Set stm = CreateObject(\"System.IO.MemoryStream\")" fullword ascii
$s4 = "var binary = \"rundll32.exe\";" fullword ascii
$s5 = "var serialized_obj = \"" ascii
condition:
( filesize < 800KB and
(
1 of ($x*) or
( 1 of ($a*) and 1 of ($s*) )
)
) or ( 3 of them )
}