DefenderYara/TrojanSpy/BAT/Smets/TrojanSpy_BAT_Smets_gen_A.yar

16 lines
1.3 KiB
Plaintext

rule TrojanSpy_BAT_Smets_gen_A{
meta:
description = "TrojanSpy:BAT/Smets.gen!A,SIGNATURE_TYPE_PEHSTR_EXT,0e 00 0e 00 06 00 00 0a 00 "
strings :
$a_01_0 = {57 00 65 00 62 00 73 00 69 00 74 00 65 00 3a 00 20 00 7b 00 30 00 7d 00 20 00 7b 00 33 00 7d 00 55 00 73 00 65 00 72 00 6e 00 61 00 6d 00 65 00 3a 00 20 00 7b 00 31 00 7d 00 20 00 7b 00 33 00 7d 00 50 00 61 00 73 00 73 00 77 00 6f 00 72 00 64 00 3a 00 7b 00 32 00 7d 00 } //01 00 Website: {0} {3}Username: {1} {3}Password:{2}
$a_01_1 = {65 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 73 00 73 00 77 00 6f 00 72 00 64 00 } //01 00 encryptedPassword
$a_01_2 = {6d 6f 7a 73 71 6c 69 74 65 33 } //01 00 mozsqlite3
$a_01_3 = {75 00 73 00 65 00 72 00 33 00 32 00 3a 00 53 00 65 00 74 00 57 00 69 00 6e 00 64 00 6f 00 77 00 73 00 48 00 6f 00 6f 00 6b 00 45 00 78 00 } //01 00 user32:SetWindowsHookEx
$a_01_4 = {75 00 73 00 65 00 72 00 33 00 32 00 3a 00 43 00 61 00 6c 00 6c 00 4e 00 65 00 78 00 74 00 48 00 6f 00 6f 00 6b 00 45 00 78 00 } //01 00 user32:CallNextHookEx
$a_01_5 = {75 00 73 00 65 00 72 00 33 00 32 00 3a 00 55 00 6e 00 68 00 6f 00 6f 00 6b 00 57 00 69 00 6e 00 64 00 6f 00 77 00 73 00 48 00 6f 00 6f 00 6b 00 45 00 78 00 } //00 00 user32:UnhookWindowsHookEx
condition:
any of ($a_*)
}