DefenderYara/Backdoor/Win32/Agent/Backdoor_Win32_Agent_YZ.yar

18 lines
1.7 KiB
Plaintext

rule Backdoor_Win32_Agent_YZ{
meta:
description = "Backdoor:Win32/Agent.YZ,SIGNATURE_TYPE_PEHSTR,08 00 08 00 08 00 00 01 00 "
strings :
$a_01_0 = {61 00 76 00 70 00 2e 00 65 00 78 00 65 00 } //01 00 avp.exe
$a_01_1 = {73 00 65 00 74 00 75 00 70 00 2e 00 65 00 78 00 65 00 } //01 00 setup.exe
$a_01_2 = {2f 00 70 00 32 00 70 00 2f 00 } //01 00 /p2p/
$a_01_3 = {4f 00 4b 00 20 00 43 00 6c 00 6f 00 73 00 65 00 64 00 20 00 61 00 63 00 63 00 65 00 70 00 74 00 65 00 64 00 20 00 73 00 6f 00 63 00 6b 00 65 00 74 00 3a 00 20 00 } //01 00 OK Closed accepted socket:
$a_01_4 = {2a 00 5c 00 41 00 43 00 3a 00 5c 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 73 00 20 00 61 00 6e 00 64 00 20 00 53 00 65 00 74 00 74 00 69 00 6e 00 67 00 73 00 5c 00 46 00 61 00 6b 00 75 00 6e 00 64 00 6f 00 5c 00 4d 00 69 00 73 00 20 00 64 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 6f 00 73 00 5c 00 45 00 79 00 65 00 20 00 43 00 72 00 79 00 70 00 74 00 65 00 72 00 20 00 56 00 34 00 5c 00 53 00 74 00 75 00 62 00 5c 00 50 00 72 00 6f 00 6a 00 65 00 63 00 74 00 31 00 2e 00 76 00 62 00 70 00 } //01 00 *\AC:\Documents and Settings\Fakundo\Mis documentos\Eye Crypter V4\Stub\Project1.vbp
$a_01_5 = {4f 00 4b 00 20 00 44 00 65 00 73 00 74 00 72 00 6f 00 79 00 65 00 64 00 20 00 61 00 63 00 63 00 65 00 70 00 74 00 20 00 63 00 6f 00 6c 00 6c 00 65 00 63 00 74 00 69 00 6f 00 6e 00 } //01 00 OK Destroyed accept collection
$a_01_6 = {43 00 53 00 6f 00 63 00 6b 00 65 00 74 00 4d 00 61 00 73 00 74 00 65 00 72 00 2e 00 43 00 6f 00 6e 00 6e 00 65 00 63 00 74 00 } //01 00 CSocketMaster.Connect
$a_01_7 = {6f 00 70 00 65 00 6e 00 3d 00 73 00 65 00 74 00 75 00 70 00 2e 00 65 00 78 00 65 00 } //00 00 open=setup.exe
condition:
any of ($a_*)
}