DefenderYara/PseudoThreat_c00009cc/_PseudoThreat_c00009cc.yar

17 lines
1.0 KiB
Plaintext

rule _PseudoThreat_c00009cc{
meta:
description = "!PseudoThreat_c00009cc,SIGNATURE_TYPE_PEHSTR_EXT,06 00 06 00 07 00 00 01 00 "
strings :
$a_00_0 = {48 6f 73 74 3a 20 64 6f 77 6e 6c 6f 61 64 2e 25 73 2e 63 6f 6d } //01 00 Host: download.%s.com
$a_00_1 = {43 3a 5c 57 69 6e 64 6f 77 73 5c 78 70 75 70 64 61 74 65 2e 65 78 65 } //01 00 C:\Windows\xpupdate.exe
$a_01_2 = {57 69 6e 64 6f 77 73 20 75 70 64 61 74 65 20 6c 6f 61 64 65 72 } //01 00 Windows update loader
$a_00_3 = {43 3a 5c 49 6e 73 74 61 6c 6c } //01 00 C:\Install
$a_01_4 = {53 4f 46 54 57 41 52 45 5c 4d 69 63 72 6f 73 6f 66 74 5c 49 6e 74 65 72 6e 65 74 20 45 78 70 6c 6f 72 65 72 5c 44 65 73 6b 74 6f 70 5c 47 65 6e 65 72 61 6c } //01 00 SOFTWARE\Microsoft\Internet Explorer\Desktop\General
$a_02_5 = {47 45 54 20 2f 90 02 08 2e 70 68 70 3f 26 61 64 76 69 64 3d 90 00 } //01 00
$a_02_6 = {47 45 54 20 68 74 74 70 3a 2f 2f 64 6f 77 6e 6c 6f 61 64 2e 25 73 2e 63 6f 6d 2f 90 02 08 2e 70 68 70 3f 26 61 64 76 69 64 3d 90 00 } //00 00
condition:
any of ($a_*)
}