DefenderYara/Worm/BAT/Necast/Worm_BAT_Necast_D.yar

16 lines
1.1 KiB
Plaintext

rule Worm_BAT_Necast_D{
meta:
description = "Worm:BAT/Necast.D,SIGNATURE_TYPE_PEHSTR_EXT,05 00 05 00 06 00 00 "
strings :
$a_02_0 = {20 88 13 00 00 28 ?? ?? ?? ?? 28 ?? ?? ?? ?? 13 04 16 0d 38 a3 00 00 00 11 04 09 9a 0a 06 6f } //2
$a_02_1 = {4b 00 69 00 6c 00 6c 00 40 00 [0-10] 55 00 53 00 42 00 2c 00 [0-04] 52 00 61 00 72 00 2c 00 5a 00 69 00 70 00 } //2
$a_01_2 = {50 00 43 00 20 00 49 00 6e 00 66 00 6f 00 58 00 2a 00 58 00 3d 00 3d 00 } //1 PC InfoX*X==
$a_01_3 = {53 00 65 00 72 00 76 00 65 00 72 00 20 00 49 00 6e 00 66 00 6f 00 58 00 2a 00 58 00 3d 00 3d 00 } //1 Server InfoX*X==
$a_01_4 = {46 00 69 00 72 00 65 00 77 00 61 00 6c 00 6c 00 20 00 42 00 79 00 70 00 61 00 73 00 73 00 58 00 2a 00 58 00 } //1 Firewall BypassX*X
$a_01_5 = {66 00 69 00 72 00 65 00 77 00 61 00 6c 00 6c 00 20 00 73 00 65 00 74 00 20 00 6f 00 70 00 6d 00 6f 00 64 00 65 00 20 00 64 00 69 00 73 00 61 00 62 00 6c 00 65 00 } //1 firewall set opmode disable
condition:
((#a_02_0 & 1)*2+(#a_02_1 & 1)*2+(#a_01_2 & 1)*1+(#a_01_3 & 1)*1+(#a_01_4 & 1)*1+(#a_01_5 & 1)*1) >=5
}