@@ -9845,6 +9845,9 @@ rule MALWARE_Win_LummaStealer {
9845
9845
meta :
9846
9846
author = " ditekSHen "
9847
9847
description = " Detects Lumma Stealer "
9848
+ snort1 = " 2023813001 "
9849
+ snort2 = " 2023813002 "
9850
+ clamav1 = " MALWARE.Win.Trojan.LummaStealer "
9848
9851
strings :
9849
9852
$ x1 = /Lum [ 0 - 9 ] {3 } xedmaC2, \s Build / ascii
9850
9853
$ x2 = /LID \( Lu [ 0 - 9 ] {3 } xedmma \s ID \) : / ascii
@@ -10825,3 +10828,65 @@ rule MALWARE_Win_Fiber {
10825
10828
condition :
10826
10829
uint16 (0 ) == 0x5a4d and ((1 of ($ x * ) and 3 of ($ s * ) and 2 of ($ i * )) or (4 of ($ s * ) and 4 of ($ i * )) or (2 of ($ s * ) and 6 of ($ i * )) or (1 of ($ x * ) and 3 of ($ v * )) or (all of ($ v * )))
10827
10830
}
10831
+
10832
+ rule MALWARE_Win_Unknown_PackedLoader_01 {
10833
+ meta :
10834
+ author = " ditekShen "
10835
+ description = " Detects unknown loader / packer. Observed running LummaStealer "
10836
+ strings :
10837
+ $ s1 = " Error at hooking API \" %S \" " wide
10838
+ $ s2 = " Dumping first %d bytes: " wide
10839
+ $ s3 = " Error at initialization of bundled DLL: %s " wide
10840
+ $ s4 = " GetMemoryForDLL() " ascii
10841
+ $ s5 = " type=activation&code= " ascii
10842
+ $ s6 = " activation.php?code= " ascii
10843
+ $ s7 = " &hwid= " ascii
10844
+ $ s8 = " &hash= " ascii
10845
+ $ s9 = " type=deactivation&hash= " ascii
10846
+ $ s10 = " deactivation.php?hash= " ascii
10847
+ $ s11 = " BANNED " fullword ascii
10848
+ $ s12 = " GetAdaptersInfo " ascii
10849
+ condition :
10850
+ uint16 (0 ) == 0x5a4d and 11 of them
10851
+ }
10852
+
10853
+ rule MALWARE_Win_LOLKEK {
10854
+ meta :
10855
+ author = " ditekShen "
10856
+ description = " Detects LOLKEK / GlobeImposter ransowmare "
10857
+ strings :
10858
+ $ s1 = " $Recycle.bin " fullword wide
10859
+ $ s2 = " \\\\ ? \\ %c: " fullword wide
10860
+ $ s3 = " .MMM " fullword wide
10861
+ $ s4 = " ReadMe.txt " fullword wide
10862
+ $ s5 = " select * from Win32_ShadowCopy " fullword wide
10863
+ $ s6 = " Win32_ShadowCopy.ID='%s' " fullword wide
10864
+ $ s7 = " W3CRYPTO LOCKER " ascii
10865
+ $ s8 = " http://mmcb " ascii
10866
+ $ s9 = " yip.su/2QstD5 " ascii
10867
+ $ s10 = " C: \\ Windows \\ Microsoft.NET \\ Framework \\ v4.0.30319 \\ AddInProcess32.exe " ascii
10868
+ condition :
10869
+ uint16 (0 ) == 0x5a4d and 7 of them
10870
+ }
10871
+
10872
+ rule MALWARE_Win_Spacecolon {
10873
+ meta :
10874
+ author = " ditekSHen "
10875
+ description = " Detects Spacecolon ransomware "
10876
+ strings :
10877
+ $ s1 = " eraseext " fullword ascii
10878
+ $ s2 = " *.encrypted " fullword ascii
10879
+ $ s3 = " TIMATOMA# " fullword wide
10880
+ $ s4 = " .Encrypted " fullword wide
10881
+ $ s5 = " Already Encrypted " wide
10882
+ $ s6 = " note.txt " fullword wide
10883
+ $ s7 = " HOW TO RECOVERY FILES.TXT " fullword wide
10884
+ $ s8 = " taskkill /f /im \" " wide nocase
10885
+ $ s9 = " \\ kill.bat " wide
10886
+ $ s10 = " Search cancelled - " fullword wide
10887
+ $ s11 = " %d folder(s) searched and %d file(s) found - %.3f second(s) " fullword wide
10888
+ $ s12 = " Our TOX ID : " ascii
10889
+ $ s13 = " tufhackteam@gmail.com " ascii
10890
+ condition :
10891
+ uint16 (0 ) == 0x5a4d and 8 of them
10892
+ }
0 commit comments