CyberThreatIntel/Additional Analysis/Neutrino/Yara/Yara_Neutrino.yar

42 lines
1.6 KiB
Plaintext
Raw Permalink Normal View History

2020-02-13 12:14:44 +00:00
/*
YARA Rule Set
Author: Arkbird SOLG
Date: 2020-02-13
Reference: https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Additional%20Analysis/Neutrino/Analysis_2020-02-08.md
*/
import "pe"
rule Dropper_Neutrino_Feb_20 {
meta:
description = "Detect the dropper used by Neutrino"
author = "Arkbird SOLG"
reference = "https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Additional%20Analysis/Neutrino/Analysis_2020-02-08.md"
date = "2020-02-13"
hash1 = "c0355c2a7241cb9f764297cf4e7e758116c82db35f909cf18091ec2085fe23ce"
strings:
$s1 = "@\\*.exe" fullword wide
$s2 = "process call create %s" fullword wide
$s3 = " /a /c %s" fullword wide
$s4 = "netsh firewall add allowedprogram \"%s\" %s ENABLE" fullword wide
$s5 = "netsh advfirewall firewall add rule name=\"%s\" dir=in action=allow program=\"%s\"" fullword wide
$s6 = "QSSSSSSWS" fullword ascii
$s7 = "+ :_`3" fullword ascii
$s8 = "z`fFbffafVcfv`" fullword ascii
$s9 = "mQWD5Wt" fullword ascii
$s10 = "XjkYjaf" fullword ascii
$s11 = "QQSVWhu" fullword ascii
$s12 = "WFxbH|`" fullword ascii
$s13 = "SVWjQXjmYjdf" fullword ascii
$s14 = "VWjQXjMf" fullword ascii
$s15 = "-QTUCTu@" fullword ascii
$s16 = "XjmZjnf" fullword ascii
$s17 = "VWjQXjmYjdf" fullword ascii
$s18 = "VjQXjMf" fullword ascii
$s19 = "x`FDbFdaFTcF^" fullword ascii
$s20 = "jdXj2YC" fullword ascii
condition:
2020-08-29 14:48:56 +00:00
uint16(0) == 0x5a4d and filesize > 300KB and
2020-02-13 12:14:44 +00:00
( pe.imphash() == "934381a85d55af4033da1a769f2cce1d" or 8 of them )
}