DefenderYara/Worm/Win32/Sersam/Worm_Win32_Sersam_A.yar

15 lines
954 B
Plaintext

rule Worm_Win32_Sersam_A{
meta:
description = "Worm:Win32/Sersam.A,SIGNATURE_TYPE_PEHSTR,05 00 05 00 05 00 00 "
strings :
$a_01_0 = {5c 00 53 00 65 00 72 00 76 00 69 00 63 00 65 00 53 00 61 00 6d 00 70 00 6c 00 65 00 2e 00 76 00 62 00 70 00 } //1 \ServiceSample.vbp
$a_01_1 = {6d 00 75 00 6e 00 45 00 5c 00 6b 00 73 00 69 00 44 00 5c 00 73 00 65 00 63 00 69 00 76 00 72 00 65 00 53 00 5c 00 31 00 30 00 30 00 74 00 65 00 53 00 6c 00 6f 00 72 00 74 00 6e 00 6f 00 43 00 5c 00 4d 00 45 00 54 00 53 00 59 00 53 00 } //1 munE\ksiD\secivreS\100teSlortnoC\METSYS
$a_01_2 = {72 00 6f 00 75 00 74 00 65 00 20 00 70 00 72 00 69 00 6e 00 74 00 20 00 3e 00 3e 00 } //1 route print >>
$a_01_3 = {6f 00 6e 00 6c 00 2e 00 70 00 68 00 70 00 } //1 onl.php
$a_01_4 = {55 00 53 00 42 00 4b 00 65 00 79 00 2e 00 65 00 78 00 65 00 } //1 USBKey.exe
condition:
((#a_01_0 & 1)*1+(#a_01_1 & 1)*1+(#a_01_2 & 1)*1+(#a_01_3 & 1)*1+(#a_01_4 & 1)*1) >=5
}