From 140a5188f1acad49d247d271e761262b8898dd1c Mon Sep 17 00:00:00 2001 From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com> Date: Fri, 3 Jul 2020 16:14:16 +0200 Subject: [PATCH] Create Yara_Rule_APT_Muddywater_June_2020_1.yar --- .../Yara_Rule_APT_Muddywater_June_2020_1.yar | 60 +++++++++++++++++++ 1 file changed, 60 insertions(+) create mode 100644 Iran/APT/Muddywater/2020-07-02/Yara_Rule_APT_Muddywater_June_2020_1.yar diff --git a/Iran/APT/Muddywater/2020-07-02/Yara_Rule_APT_Muddywater_June_2020_1.yar b/Iran/APT/Muddywater/2020-07-02/Yara_Rule_APT_Muddywater_June_2020_1.yar new file mode 100644 index 0000000..600caba --- /dev/null +++ b/Iran/APT/Muddywater/2020-07-02/Yara_Rule_APT_Muddywater_June_2020_1.yar @@ -0,0 +1,60 @@ +import "pe" + +rule Mal_MoriAgent_June_2020_1 { + meta: + description = "Detect MoriAgent malware (June 2020)" + author = "Arkbird_SOLG" + reference = "https://github.com/StrangerealIntel/CyberThreatIntel/tree/master/Iran/APT/Muddywater/2020-07-02/Analysis.md" + date = "2020-07-02" + hash1 = "72f487068c704b6d636ddd87990e25ce8cd5940244e581063f4c54afa4438212" + hash2 = "92cb75c15da69fd6ef9368c03fd5001778d5fa1f7b024d63c84c13f501d5acd5" + hash3 = "7408075bbf433da260d2823213ddde1b2d47b5c89419bab4c6f1480f9d7976c8" + strings: + $s1 = "Host: " fullword ascii + $s2 = "host unreachable" fullword ascii + $s3 = "ReflectiveLoader" fullword ascii + $s4 = "ShellExecuteA" fullword ascii + $s5 = "operator<=>" fullword ascii + $s6 = "operator co_await" fullword ascii + $s7 = "Content-Type: application/json\r\n" fullword ascii + $s8 = "Token: " fullword ascii + $s9 = "File Access Transfer Field" fullword ascii + $s10 = "WinHttpGetIEProxyConfigForCurrentUser" fullword ascii + $s11 = ".pdf"fullword ascii + $s12 = "Port" fullword ascii + $s13 = "Domain" fullword wide + $s14 = "HTTP/1.1\r\n" fullword ascii + $s15 = "Transfer-Encoding" fullword ascii + $s16 = "Content-Length" fullword ascii + $s17 = "_VERSION_INFO" fullword ascii + condition: + uint16(0) == 0x5a4d and filesize < 100KB and (pe.imphash() == "7675f471383189358ce7a96a307693b0" or pe.imphash() == "625815b34998001fcf431881c99e191c" or 14 of them ) +} + +rule Mal_MoriAgent_January_2020_1 { + meta: + description = "Detect MoriAgent malware (January 2020)" + author = "Arkbird_SOLG" + reference = "https://github.com/StrangerealIntel/CyberThreatIntel/tree/master/Iran/APT/Muddywater/2020-07-02/Analysis.md" + date = "2020-07-02" + hash1 = "84809eff629da3722a181a19f52c4c27e8355b6b916c367212085743c06cfcea" + hash2 = "ed23566a10b372028d3a275a8332ef76754976848c9357a66d1a9c320b131092" + strings: + $s1 = "Host: " fullword ascii + $s2 = "host unreachable" fullword ascii + $s3 = "DllRegisterServer" fullword ascii + $s4 = ".old" fullword ascii + $s5 = "Content-Length: " fullword ascii + $s6 = "operator co_await" fullword ascii + $s7 = "Content-Type: application/json\r\n" fullword ascii + $s8 = "Unable to parse token length" fullword ascii + $s9 = { 6d 00 69 00 6e 00 6b 00 65 00 72 00 6e 00 65 00 6c 00 5c 00 63 00 72 00 74 00 73 00 5c 00 75 00 63 00 72 00 74 00 5c 00 69 00 6e 00 63 00 5c 00 63 00 6f 00 72 00 65 00 63 00 72 00 74 00 5f 00 69 00 6e 00 74 00 65 00 72 00 6e 00 61 00 6c 00 5f 00 73 00 74 00 72 00 74 00 6f 00 78 00 2e 00 68 } /* minkernel\\crts\\ucrt\\inc\\corecrt_internal_strtox.h */ + $s10 = "WinHttpGetIEProxyConfigForCurrentUser" fullword ascii + $s11 = "SOfTWARE\\NFC\\"fullword ascii + $s12 = "Port" fullword ascii + $s13 = "Domain" fullword wide + $s14 = "HTTP/1.1\r\n" fullword ascii + $s15 = "Transfer-Encoding" fullword ascii + $s16 = { 49 6e 66 6f 00 00 00 00 3f 69 3d 00 43 3a 5c 00 53 79 73 74 65 6d 44 72 69 76 65 00 5c 00 00 00 49 64 } /* Info?i=C:\\SystemDrive\\Id */ + condition: + uint16(0) == 0x5a4d and filesize < 200KB and (pe.imphash() == "3bcc46e3f517ddf9666020895796153f" or 14 of them )