mirror of
https://github.com/valitydev/signature-base.git
synced 2024-11-06 18:15:20 +00:00
d6a2d00cb7
https://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/
66 lines
2.8 KiB
Plaintext
66 lines
2.8 KiB
Plaintext
|
|
/*
|
|
YARA Rule Set
|
|
Author: Florian Roth
|
|
Date: 2018-09-18
|
|
Identifier: Xbash
|
|
License: https://creativecommons.org/licenses/by-nc/4.0/
|
|
Reference: https://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/
|
|
*/
|
|
|
|
/* Rule Set ----------------------------------------------------------------- */
|
|
|
|
rule MAL_Xbash_PY_Sep18 {
|
|
meta:
|
|
description = "Detects Xbash malware"
|
|
author = "Florian Roth"
|
|
reference = "https://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"
|
|
license = "https://creativecommons.org/licenses/by-nc/4.0/"
|
|
date = "2018-09-18"
|
|
hash1 = "7a18c7bdf0c504832c8552766dcfe0ba33dd5493daa3d9dbe9c985c1ce36e5aa"
|
|
strings:
|
|
$s1 = { 73 58 62 61 73 68 00 00 00 00 00 00 00 00 } /* sXbash\x00\x00\x00\x00\x00\x00 */
|
|
condition:
|
|
uint16(0) == 0x457f and filesize < 10000KB and 1 of them
|
|
}
|
|
|
|
rule MAL_Xbash_SH_Sep18 {
|
|
meta:
|
|
description = "Detects Xbash malware"
|
|
author = "Florian Roth"
|
|
reference = "https://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"
|
|
license = "https://creativecommons.org/licenses/by-nc/4.0/"
|
|
date = "2018-09-18"
|
|
hash1 = "a27acc07844bb751ac33f5df569fd949d8b61dba26eb5447482d90243fc739af"
|
|
hash2 = "de63ce4a42f06a5903b9daa62b67fcfbdeca05beb574f966370a6ae7fd21190d"
|
|
strings:
|
|
$s1 = "echo \"*/5 * * * * curl -fsSL" fullword ascii
|
|
$s2 = ".sh|sh\" > /var/spool/cron/root" fullword ascii
|
|
$s3 = "#chmod +x /tmp/hawk" fullword ascii
|
|
$s4 = "if [ ! -f \"/tmp/root.sh\" ]" fullword ascii
|
|
$s5 = ".sh > /tmp/lower.sh" fullword ascii
|
|
$s6 = "chmod 777 /tmp/root.sh" fullword ascii
|
|
$s7 = "-P /tmp && chmod +x /tmp/pools.txt" fullword ascii
|
|
$s8 = "-C /tmp/pools.txt>/dev/null 2>&1" ascii
|
|
condition:
|
|
uint16(0) == 0x2123 and filesize < 3KB and 1 of them
|
|
}
|
|
|
|
rule MAL_Xbash_JS_Sep18 {
|
|
meta:
|
|
description = "Detects XBash malware"
|
|
author = "Florian Roth"
|
|
reference = "https://researchcenter.paloaltonetworks.com/2018/09/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/"
|
|
license = "https://creativecommons.org/licenses/by-nc/4.0/"
|
|
date = "2018-09-18"
|
|
hash1 = "f888dda9ca1876eba12ffb55a7a993bd1f5a622a30045a675da4955ede3e4cb8"
|
|
strings:
|
|
$s1 = "var path=WSHShell" fullword ascii
|
|
$s2 = "var myObject= new ActiveXObject(" fullword ascii
|
|
$s3 = "window.resizeTo(0,0)" fullword ascii
|
|
$s4 = "<script language=\"JScript\">" fullword ascii /* Goodware String - occured 4 times */
|
|
condition:
|
|
uint16(0) == 0x483c and filesize < 5KB and
|
|
8 of them
|
|
}
|