DefenderYara/Worm/Win32/SillyShareCopy/Worm_Win32_SillyShareCopy_Q...

21 lines
1.8 KiB
Plaintext

rule Worm_Win32_SillyShareCopy_Q{
meta:
description = "Worm:Win32/SillyShareCopy.Q,SIGNATURE_TYPE_PEHSTR,28 00 27 00 0b 00 00 14 00 "
strings :
$a_01_0 = {4d 00 53 00 56 00 42 00 56 00 4d 00 36 00 30 00 2e 00 44 00 4c 00 4c 00 } //01 00 MSVBVM60.DLL
$a_01_1 = {53 00 65 00 74 00 74 00 69 00 6e 00 67 00 73 00 5c 00 41 00 6c 00 6c 00 20 00 55 00 73 00 65 00 72 00 73 00 5c 00 53 00 74 00 61 00 72 00 74 00 20 00 4d 00 65 00 6e 00 75 00 5c 00 50 00 72 00 6f 00 67 00 72 00 61 00 6d 00 73 00 5c 00 53 00 74 00 61 00 72 00 74 00 75 00 70 00 } //01 00 Settings\All Users\Start Menu\Programs\Startup
$a_01_2 = {46 00 6c 00 6f 00 70 00 70 00 79 00 20 00 28 00 41 00 3a 00 29 00 } //01 00 Floppy (A:)
$a_01_3 = {53 00 63 00 72 00 69 00 70 00 74 00 69 00 6e 00 67 00 2e 00 46 00 69 00 6c 00 65 00 53 00 79 00 73 00 74 00 65 00 6d 00 4f 00 62 00 6a 00 65 00 63 00 74 00 } //01 00 Scripting.FileSystemObject
$a_01_4 = {4e 00 4f 00 44 00 33 00 32 00 } //01 00 NOD32
$a_01_5 = {4e 00 6f 00 72 00 6d 00 61 00 6e 00 } //01 00 Norman
$a_01_6 = {73 00 65 00 6c 00 65 00 63 00 74 00 20 00 6e 00 61 00 6d 00 65 00 20 00 66 00 72 00 6f 00 6d 00 20 00 57 00 69 00 6e 00 33 00 32 00 5f 00 50 00 72 00 6f 00 63 00 65 00 73 00 73 00 20 00 77 00 68 00 65 00 72 00 65 00 20 00 6e 00 61 00 6d 00 65 00 3d 00 } //01 00 select name from Win32_Process where name=
$a_01_7 = {45 00 78 00 70 00 6c 00 6f 00 72 00 65 00 72 00 5c 00 41 00 64 00 76 00 61 00 6e 00 63 00 65 00 64 00 5c 00 48 00 69 00 64 00 64 00 65 00 6e 00 } //05 00 Explorer\Advanced\Hidden
$a_01_8 = {3a 00 5c 00 61 00 75 00 74 00 6f 00 72 00 75 00 6e 00 2e 00 69 00 6e 00 66 00 } //05 00 :\autorun.inf
$a_01_9 = {5b 00 41 00 75 00 74 00 6f 00 52 00 75 00 6e 00 5d 00 } //05 00 [AutoRun]
$a_01_10 = {6f 00 70 00 65 00 6e 00 3d 00 } //00 00 open=
condition:
any of ($a_*)
}