DefenderYara/TrojanDownloader/Win32/Banload/TrojanDownloader_Win32_Banl...

22 lines
2.8 KiB
Plaintext

rule TrojanDownloader_Win32_Banload_EN{
meta:
description = "TrojanDownloader:Win32/Banload.EN,SIGNATURE_TYPE_PEHSTR,ffffffe8 00 ffffffe8 00 0c 00 00 "
strings :
$a_01_0 = {4d 53 56 42 56 4d 36 30 2e 44 4c 4c } //100 MSVBVM60.DLL
$a_01_1 = {42 00 6c 00 61 00 63 00 6b 00 41 00 67 00 65 00 6e 00 74 00 20 00 32 00 2e 00 30 00 } //100 BlackAgent 2.0
$a_01_2 = {5c 00 62 00 6c 00 63 00 6b 00 78 00 2e 00 65 00 78 00 65 00 } //10 \blckx.exe
$a_01_3 = {5c 00 73 00 65 00 72 00 76 00 65 00 72 00 2e 00 65 00 78 00 65 00 } //10 \server.exe
$a_01_4 = {5c 00 50 00 72 00 6f 00 6a 00 65 00 63 00 74 00 31 00 2e 00 76 00 62 00 70 00 } //10 \Project1.vbp
$a_01_5 = {63 00 6d 00 64 00 20 00 2f 00 63 00 20 00 74 00 61 00 73 00 6b 00 6b 00 69 00 6c 00 6c 00 20 00 2f 00 66 00 20 00 2f 00 69 00 6d 00 20 00 77 00 69 00 6e 00 72 00 61 00 72 00 2e 00 65 00 78 00 65 00 20 00 } //1 cmd /c taskkill /f /im winrar.exe
$a_01_6 = {63 00 6d 00 64 00 20 00 2f 00 63 00 20 00 72 00 65 00 67 00 20 00 61 00 64 00 64 00 20 00 48 00 4b 00 45 00 59 00 5f 00 4c 00 4f 00 43 00 41 00 4c 00 5f 00 4d 00 41 00 43 00 48 00 49 00 4e 00 45 00 5c 00 53 00 4f 00 46 00 54 00 57 00 41 00 52 00 45 00 5c 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 5c 00 57 00 69 00 6e 00 64 00 6f 00 77 00 73 00 5c 00 43 00 75 00 72 00 72 00 65 00 6e 00 74 00 56 00 65 00 72 00 73 00 69 00 6f 00 6e 00 5c 00 52 00 75 00 6e 00 4f 00 6e 00 63 00 65 00 5c 00 20 00 2f 00 76 00 20 00 6d 00 73 00 63 00 6f 00 6e 00 66 00 69 00 67 00 20 00 2f 00 74 00 20 00 52 00 45 00 47 00 5f 00 53 00 5a 00 20 00 2f 00 64 00 } //1 cmd /c reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ /v msconfig /t REG_SZ /d
$a_01_7 = {63 00 6d 00 64 00 20 00 2f 00 63 00 20 00 6e 00 65 00 74 00 20 00 73 00 74 00 6f 00 70 00 20 00 22 00 53 00 68 00 61 00 72 00 65 00 64 00 41 00 63 00 63 00 65 00 73 00 73 00 22 00 } //1 cmd /c net stop "SharedAccess"
$a_01_8 = {63 00 6d 00 64 00 20 00 2f 00 63 00 20 00 6e 00 65 00 74 00 20 00 73 00 74 00 6f 00 70 00 20 00 22 00 77 00 73 00 63 00 73 00 76 00 63 00 22 00 } //1 cmd /c net stop "wscsvc"
$a_01_9 = {5c 00 64 00 72 00 69 00 76 00 65 00 72 00 73 00 5c 00 73 00 76 00 63 00 68 00 6f 00 73 00 74 00 2e 00 65 00 78 00 65 00 } //1 \drivers\svchost.exe
$a_01_10 = {5c 00 64 00 72 00 69 00 76 00 65 00 72 00 73 00 5c 00 72 00 75 00 6e 00 64 00 6c 00 6c 00 33 00 32 00 2e 00 65 00 78 00 65 00 } //1 \drivers\rundll32.exe
$a_01_11 = {5c 00 64 00 72 00 69 00 76 00 65 00 72 00 73 00 5c 00 63 00 74 00 66 00 6d 00 6f 00 6e 00 2e 00 65 00 78 00 65 00 } //1 \drivers\ctfmon.exe
condition:
((#a_01_0 & 1)*100+(#a_01_1 & 1)*100+(#a_01_2 & 1)*10+(#a_01_3 & 1)*10+(#a_01_4 & 1)*10+(#a_01_5 & 1)*1+(#a_01_6 & 1)*1+(#a_01_7 & 1)*1+(#a_01_8 & 1)*1+(#a_01_9 & 1)*1+(#a_01_10 & 1)*1+(#a_01_11 & 1)*1) >=232
}