Go to file
roadwy@gmail.com e1b5e8cb09 init 2024-02-05 22:12:47 +08:00
#ALF/TrojanDownloader init 2024-02-05 22:12:47 +08:00
#ASRWin32ApiMacroExclusion init 2024-02-05 22:12:47 +08:00
#MpRequestHookwowM init 2024-02-05 22:12:47 +08:00
#PUA/Block init 2024-02-05 22:12:47 +08:00
#attrmatch_rescan_psif init 2024-02-05 22:12:47 +08:00
Adware init 2024-02-05 22:12:47 +08:00
Backdoor init 2024-02-05 22:12:47 +08:00
Behavior/Win32/Pryncimoklyn init 2024-02-05 22:12:47 +08:00
BrowserModifier init 2024-02-05 22:12:47 +08:00
Constructor/Win32 init 2024-02-05 22:12:47 +08:00
DDoS init 2024-02-05 22:12:47 +08:00
DoS init 2024-02-05 22:12:47 +08:00
Exploit init 2024-02-05 22:12:47 +08:00
HackTool init 2024-02-05 22:12:47 +08:00
InfrastructureShared init 2024-02-05 22:12:47 +08:00
Joke/Win32 init 2024-02-05 22:12:47 +08:00
Misleading init 2024-02-05 22:12:47 +08:00
MonitoringTool init 2024-02-05 22:12:47 +08:00
PUA init 2024-02-05 22:12:47 +08:00
PWS init 2024-02-05 22:12:47 +08:00
Program/Win32/CompromisedCert init 2024-02-05 22:12:47 +08:00
PseudoThreat_4000002a init 2024-02-05 22:12:47 +08:00
PseudoThreat_4000002b init 2024-02-05 22:12:47 +08:00
PseudoThreat_4000002c init 2024-02-05 22:12:47 +08:00
PseudoThreat_4000002d init 2024-02-05 22:12:47 +08:00
PseudoThreat_4000002e init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000020 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000021 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000022 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000023 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000024 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000025 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000026 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000027 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000028 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000029 init 2024-02-05 22:12:47 +08:00
PseudoThreat_40000031 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000afc init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000afe init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b00 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b0a init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b0b init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b0c init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b01 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b02 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b04 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b05 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b06 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b07 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b08 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000b09 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c00009d0 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c00009d1 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c00012a7 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c000095a init 2024-02-05 22:12:47 +08:00
PseudoThreat_c000095b init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000923 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000943 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000958 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0000959 init 2024-02-05 22:12:47 +08:00
PseudoThreat_c0001346 init 2024-02-05 22:12:47 +08:00
Ransom init 2024-02-05 22:12:47 +08:00
RemoteAccess/MSIL/AveMariaRAT init 2024-02-05 22:12:47 +08:00
Rogue init 2024-02-05 22:12:47 +08:00
SoftwareBundler/Win32 init 2024-02-05 22:12:47 +08:00
Spammer init 2024-02-05 22:12:47 +08:00
Spoofer/Win32/Arpspoof init 2024-02-05 22:12:47 +08:00
Spyware init 2024-02-05 22:12:47 +08:00
SupportScam init 2024-02-05 22:12:47 +08:00
Tool init 2024-02-05 22:12:47 +08:00
Trojan init 2024-02-05 22:12:47 +08:00
TrojanClicker init 2024-02-05 22:12:47 +08:00
TrojanDownloader init 2024-02-05 22:12:47 +08:00
TrojanDropper init 2024-02-05 22:12:47 +08:00
TrojanProxy init 2024-02-05 22:12:47 +08:00
TrojanSpy init 2024-02-05 22:12:47 +08:00
VirTool init 2024-02-05 22:12:47 +08:00
Virus init 2024-02-05 22:12:47 +08:00
Worm init 2024-02-05 22:12:47 +08:00
README.MD init 2024-02-05 22:12:47 +08:00

README.MD

DefenderYara

DefenderYara

Description

Extracted Yara rules from Defender mpavbase.vdm and mpasbase.Enjoy it.

rule HackTool_Win64_CobaltStrike_A_{
	meta:
		description = "HackTool:Win64/CobaltStrike.A!!CobaltStrike.A64,SIGNATURE_TYPE_ARHSTR_EXT,1f 00 1f 00 07 00 00 01 00 "
		
	strings :
		$a_03_0 = {00 01 00 01 00 02 90 01 02 00 02 00 01 00 02 90 00 } //01 00 
		$a_03_1 = {69 68 69 68 69 6b 90 01 02 69 6b 69 68 69 6b 90 00 } //01 00 
		$a_03_2 = {2e 2f 2e 2f 2e 2c 90 01 02 2e 2c 2e 2f 2e 2c 90 00 } //01 00 
		$a_01_3 = {4c 63 c2 4d 03 c0 42 0f 10 04 c0 48 8b c1 f3 0f 7f 01 c3 } //0a 00 
		$a_03_4 = {48 ff c0 48 3d 00 10 00 00 7c f1 90 09 04 00 80 90 01 02 90 03 01 01 2e 69 48 90 00 } //0a 00 
		$a_01_5 = {0f af d1 44 8b c8 b8 1f 85 eb 51 f7 e2 41 8b c1 44 8b c2 33 d2 41 c1 e8 05 41 f7 f0 } //0a 00 
		$a_03_6 = {b9 00 00 10 00 e8 90 02 3c ba 7f 66 04 40 8b c8 48 8b 90 02 08 89 08 48 8b 4b 20 90 00 } //00 00 
	condition:
		any of ($a_*)
 
}

The condition maby is wrong。

Reference