1
+ rule malware_droplink_str {
2
+ meta :
3
+ description = " malware using dropbox api(TRANSBOX, PLUGBOX) "
4
+ author = " JPCERT/CC Incident Response Group "
5
+ hash = " bdc15b09b78093a1a5503a1a7bfb487f7ef4ca2cb8b4d1d1bdf9a54cdc87fae4 "
6
+ hash = " 6e5e2ed25155428b8da15ac78c8d87d2c108737402ecba90d70f305056aeabaa "
7
+
8
+ strings :
9
+ $ data1 = " %u/%u_%08X_%u_%u.jpg " ascii wide
10
+ $ data2 = " %u/%u.jpg " ascii wide
11
+ $ data3 = " %u/%s " ascii wide
12
+ $ data4 = " %u/%u.3_bk.jpg "
13
+ $ data5 = " %u/%u.2_bk.jpg " ascii wide
14
+ $ data6 = " %u/%u_%08X_%d.jpg " ascii wide
15
+ $ data7 = " %s \" , \" mode \" : \" overwrite " ascii wide
16
+ $ data8 = " Dropbox-API-Art-Type: " ascii wide
17
+ $ data9 = " /2/files/upload " ascii wide
18
+ $ data10 = " Dropbox-API-Arg: { \" path \" : \" / " ascii wide
19
+ $ data11 = " /oauth2/token " ascii wide
20
+ $ data12 = " LoadPlgFromRemote.dll " ascii wide
21
+ $ data13 = " FILETRANDLL.dll " ascii wide
22
+ $ data14 = " NVIDLA " ascii wide
23
+ $ data15 = " start.ini " ascii wide
24
+ $ data16 = " RunMain " ascii wide
25
+ $ data17 = " cfg.png " ascii wide
26
+ $ data18 = " DWrite.dll " ascii wide
27
+ $ pdb1 = " \\\\ daddev \\ office10 \\ 2609.0 \\ setup \\ x86 \\ ship \\ program files \\ common files \\ microsoft shared \\ office10 \\ 1033 \\ DWINTLO.PDB " ascii
28
+
29
+ condition :
30
+ uint16 (0 ) == 0x5A4D and
31
+ uint32 (uint32 (0x3c )) == 0x00004550 and
32
+ filesize < 1MB and
33
+ (1 of ($ pdb * ) or 5 of ($ data * ))
34
+ }
35
+
36
+ rule malware_RestyLink_lnk {
37
+ meta :
38
+ description = " RestyLink lnk file "
39
+ author = " JPCERT/CC Incident Response Group "
40
+ hash = " 90a223625738e398d2cf0be8d37144392cc2e7d707b096a7bfc0a52b408d98b1 "
41
+ hash = " 9aa2187dbdeef231651769ec8dc5f792c2a9a7233fbbbcf383b05ff3d6179fcf "
42
+ hash = " 3feb9275050827543292a97cbf18c50c552a1771c4423c4df4f711a39696ed93 "
43
+
44
+ strings :
45
+ $ cmd1 = " C: \\ Windows \\ System32 \\ cmd.exe " wide
46
+ $ cmd2 = " Windows \\ system32 \\ ScriptRunner.exe " wide
47
+ $ command1 = " /c set a=start winword.exe /aut&&set " wide
48
+ $ command2 = " &&set n=omation /vu /q&&cmd /c %a%%n% %m% " wide
49
+ $ command3 = " -appvscript explorer.exe https:// " wide
50
+ $ command4 = " -appvscript curl.exe -s https:// " wide
51
+
52
+ condition :
53
+ uint16 (0 ) == 0x004c and
54
+ filesize < 100KB and
55
+ 1 of ($ cmd * ) and
56
+ 1 of ($ command * )
57
+ }
0 commit comments