Create Yara_Neutrino.yar
This commit is contained in:
parent
33206728fd
commit
1a56a4d06b
41
Additional Analysis/Neutrino/Yara/Yara_Neutrino.yar
Normal file
41
Additional Analysis/Neutrino/Yara/Yara_Neutrino.yar
Normal file
@ -0,0 +1,41 @@
|
||||
/*
|
||||
YARA Rule Set
|
||||
Author: Arkbird SOLG
|
||||
Date: 2020-02-13
|
||||
Reference: https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Additional%20Analysis/Neutrino/Analysis_2020-02-08.md
|
||||
*/
|
||||
|
||||
import "pe"
|
||||
|
||||
rule Dropper_Neutrino_Feb_20 {
|
||||
meta:
|
||||
description = "Detect the dropper used by Neutrino"
|
||||
author = "Arkbird SOLG"
|
||||
reference = "https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Additional%20Analysis/Neutrino/Analysis_2020-02-08.md"
|
||||
date = "2020-02-13"
|
||||
hash1 = "c0355c2a7241cb9f764297cf4e7e758116c82db35f909cf18091ec2085fe23ce"
|
||||
strings:
|
||||
$s1 = "@\\*.exe" fullword wide
|
||||
$s2 = "process call create %s" fullword wide
|
||||
$s3 = " /a /c %s" fullword wide
|
||||
$s4 = "netsh firewall add allowedprogram \"%s\" %s ENABLE" fullword wide
|
||||
$s5 = "netsh advfirewall firewall add rule name=\"%s\" dir=in action=allow program=\"%s\"" fullword wide
|
||||
$s6 = "QSSSSSSWS" fullword ascii
|
||||
$s7 = "+ :_`3" fullword ascii
|
||||
$s8 = "z`fFbffafVcfv`" fullword ascii
|
||||
$s9 = "mQWD5Wt" fullword ascii
|
||||
$s10 = "XjkYjaf" fullword ascii
|
||||
$s11 = "QQSVWhu" fullword ascii
|
||||
$s12 = "WFxbH|`" fullword ascii
|
||||
$s13 = "SVWjQXjmYjdf" fullword ascii
|
||||
$s14 = "VWjQXjMf" fullword ascii
|
||||
$s15 = "-QTUCTu@" fullword ascii
|
||||
$s16 = "XjmZjnf" fullword ascii
|
||||
$s17 = "VWjQXjmYjdf" fullword ascii
|
||||
$s18 = "VjQXjMf" fullword ascii
|
||||
$s19 = "x`FDbFdaFTcF^" fullword ascii
|
||||
$s20 = "jdXj2YC" fullword ascii
|
||||
condition:
|
||||
uint16(0) == 0x5a4d and filesize < 300KB and
|
||||
( pe.imphash() == "934381a85d55af4033da1a769f2cce1d" or 8 of them )
|
||||
}
|
Loading…
Reference in New Issue
Block a user