signature-base/yara/apt_project_m.yar

49 lines
1.7 KiB
Plaintext

/*
Yara Rule Set
Author: Florian Roth
Date: 2016-03-26
Identifier: ProjectM
*/
/* Rule Set ----------------------------------------------------------------- */
rule ProjectM_DarkComet_1 {
meta:
description = "Detects ProjectM Malware"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/"
date = "2016-03-26"
hash = "cc488690ce442e9f98bac651218f4075ca36c355d8cd83f7a9f5230970d24157"
strings:
$x1 = "DarkO\\_2" fullword ascii
$a1 = "AVICAP32.DLL" fullword ascii
$a2 = "IDispatch4" fullword ascii
$a3 = "FLOOD/" fullword ascii
$a4 = "T<-/HTTP://" fullword ascii
$a5 = "infoes" fullword ascii
condition:
( uint16(0) == 0x5a4d and filesize < 600KB and 4 of them ) or ( all of them )
}
rule ProjectM_CrimsonDownloader {
meta:
description = "Detects ProjectM Malware"
license = "https://creativecommons.org/licenses/by-nc/4.0/"
author = "Florian Roth"
reference = "http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/"
date = "2016-03-26"
hash = "dc8bd60695070152c94cbeb5f61eca6e4309b8966f1aa9fdc2dd0ab754ad3e4c"
strings:
$x1 = "E:\\Projects\\m_project\\main\\mj shoaib"
$s1 = "\\obj\\x86\\Debug\\secure_scan.pdb" ascii
$s2 = "secure_scan.exe" fullword wide
$s3 = "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run|mswall" fullword wide
$s4 = "secure_scan|mswall" fullword wide
$s5 = "[Microsoft-Security-Essentials]" fullword wide
condition:
( uint16(0) == 0x5a4d and filesize < 400KB and $x1 ) or ( all of them )
}