DefenderYara/Backdoor/Win32/Amerced/Backdoor_Win32_Amerced_A.yar

22 lines
1.7 KiB
Plaintext

rule Backdoor_Win32_Amerced_A{
meta:
description = "Backdoor:Win32/Amerced.A,SIGNATURE_TYPE_PEHSTR_EXT,0b 00 0b 00 0c 00 00 "
strings :
$a_01_0 = {28 00 52 00 69 00 67 00 68 00 74 00 20 00 41 00 72 00 72 00 6f 00 77 00 29 00 } //1 (Right Arrow)
$a_01_1 = {28 00 42 00 61 00 63 00 6b 00 73 00 70 00 61 00 63 00 65 00 29 00 } //1 (Backspace)
$a_01_2 = {70 00 77 00 64 00 63 00 68 00 61 00 6e 00 67 00 65 00 64 00 } //1 pwdchanged
$a_01_3 = {65 00 72 00 72 00 6f 00 6c 00 64 00 70 00 77 00 64 00 } //1 erroldpwd
$a_01_4 = {57 00 69 00 6e 00 64 00 6f 00 77 00 73 00 20 00 4d 00 69 00 6c 00 6c 00 65 00 6e 00 6e 00 69 00 75 00 6d 00 } //1 Windows Millennium
$a_01_5 = {48 00 69 00 67 00 68 00 20 00 43 00 6f 00 6c 00 6f 00 72 00 20 00 28 00 } //1 High Color (
$a_01_6 = {53 00 68 00 65 00 6c 00 6c 00 5f 00 54 00 72 00 61 00 79 00 57 00 6e 00 64 00 } //1 Shell_TrayWnd
$a_01_7 = {69 00 64 00 3d 00 22 00 61 00 74 00 6f 00 6d 00 28 00 77 00 69 00 7a 00 61 00 72 00 64 00 72 00 6f 00 6f 00 74 00 29 00 22 00 3e 00 } //1 id="atom(wizardroot)">
$a_01_8 = {73 00 6e 00 69 00 66 00 72 00 65 00 74 00 } //1 snifret
$a_01_9 = {73 00 79 00 73 00 74 00 65 00 6d 00 64 00 72 00 69 00 76 00 65 00 } //1 systemdrive
$a_01_10 = {53 00 63 00 72 00 69 00 70 00 74 00 69 00 6e 00 67 00 2e 00 46 00 69 00 6c 00 65 00 53 00 79 00 73 00 74 00 65 00 6d 00 4f 00 62 00 6a 00 65 00 63 00 74 00 } //1 Scripting.FileSystemObject
$a_01_11 = {44 61 65 6d 6f 6e 2e 56 6f 6c 75 6d 65 43 6f 6e 74 72 6f 6c } //1 Daemon.VolumeControl
condition:
((#a_01_0 & 1)*1+(#a_01_1 & 1)*1+(#a_01_2 & 1)*1+(#a_01_3 & 1)*1+(#a_01_4 & 1)*1+(#a_01_5 & 1)*1+(#a_01_6 & 1)*1+(#a_01_7 & 1)*1+(#a_01_8 & 1)*1+(#a_01_9 & 1)*1+(#a_01_10 & 1)*1+(#a_01_11 & 1)*1) >=11
}