Skip to content

Commit 33a1aba

Browse files
committedAug 13, 2023
Add Yara detection against LOLKEK,Spacecolon and ClamAV and Snort detecction against LummaStealer
1 parent acbc315 commit 33a1aba

File tree

4 files changed

+70
-2
lines changed

4 files changed

+70
-2
lines changed
 

‎README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ A set of interrelated network and host detection rules with the aim of improving
44

55
## Supported Rules
66

7-
Currently, Snort, Yara and ClamAV rules are supported. Additional singatures and formats are work in progress.
7+
Currently, Snort 3, Yara and ClamAV rules are supported. Additional singatures and formats are work in progress.
88

99
## Scripts
1010

‎clamav/clamav.ldb

+1
Original file line numberDiff line numberDiff line change
@@ -143,3 +143,4 @@ ditekSHen.MALWARE.Linux.Trojan.GolangBypassAV;Engine:51-255,Target:6;0;2f476f6c6
143143
ditekSHen.MALWARE.Win.Trojan.GolangBypassAV;Engine:51-255,Target:1;0;2f476f6c616e6742797061737341562f67656e2f
144144
ditekSHen.MALWARE.Linux.Trojan.GetShell;Engine:51-255,Target:6;((0&1)|(2&3))&(4|5|6|7|8|9)>2;636174203c286563686f2027407265626f6f74206563686f20736f636b73355f6261636b636f6e6e656374;2863642020262620292729203c2873656420272f736f636b73355f6261636b636f6e6e656374;636174203c286563686f202740;2863642020262620292729203c287365642027;7061636b65646970;7173656374696f6e706f7374;7175657279686561646572;636f707964617461;73796e73656e64;62635f636f6e6e656374
145145
ditekSHen.MALWARE.Win.Trojan.RookIE-Downloader;Engine:51-255,Target:1;0&1&2&3;7368656c6c3a3a3a7b32353539613166332d323164372d313164342d626461662d3030633034663630623966307d;7461736b6b696c6c202f66202f696d2068682e657865;526f6f6b49452f312e30;233332373730
146+
ditekSHen.MALWARE.Win.Trojan.LummaStealer;Engine:51-255,Target:1;(0|1)&(3|4|5)&(6|7|8);6332736f636b::w;6332636f6e66::w;2d20436f6d70757465724e616d65446e73486f73746e616d653a;2d20436f6d70757465724e616d654e657442494f533a;2d20506879736963616c20496e7374616c6c6564204d656d6f72793a;2a2e656d6c::w;5465736c6142726f77736572::w;6c69643d2573;534f4654574152455c4d6963726f736f66745c57696e646f77735c43757272656e7456657273696f6e5c556e696e7374616c6c::w

‎snort/snort3.rules

+3-1
Original file line numberDiff line numberDiff line change
@@ -304,6 +304,8 @@ alert http $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS ( msg:"PUA-ADWARE Win.Adwa
304304
alert http $HOME_NET any -> $EXTERNAL_NET any ( msg:"MALWARE-CNC Win.Trojan.Vulturi infostealer outbound connection detected"; flow:to_server,established; http_uri; content:"/fetch_options?username=",fast_pattern; http_header; content:!"User-Agent"; metadata:ruleset community; classtype:trojan-activity; sid:920282; rev:1; )
305305
alert http $HOME_NET any -> $EXTERNAL_NET any ( msg:"MALWARE-CNC Win.Trojan.Vulturi infostealer outbound connection detected"; flow:to_server,established; http_uri; content:"/send_report?username=",fast_pattern; content:"&cookie"; content:"&password"; metadata:ruleset community; classtype:trojan-activity; sid:920283; rev:1; )
306306
alert http $HOME_NET any -> $EXTERNAL_NET any ( msg:"MALWARE-CNC Win.Trojan.NPlus cryptocurrency miner outbound connection detected"; flow:to_server,established; http_header:field user-agent; content:"NPlusMiner/",fast_pattern; metadata:ruleset community; rem:"yara:MALWARE_Win_NPlusMiner"; classtype:trojan-activity; sid:920284; rev:1; )
307+
alert http $HOME_NET any -> $EXTERNAL_NET any ( msg:"MALWARE-CNC Win.Trojan.LummaStealer outbound connection detected"; flow:to_server,established; http_uri; content:"/c2conf",fast_pattern; bufferlen:7; http_client_body; content:"lid="; http_header; content:!"User-Agent"; http_method; content:"POST"; metadata:ruleset community, service http; rem:"yara:MALWARE_Win_LummaStealer, clamav:MALWARE.Win.Trojan.LummaStealer"; classtype:trojan-activity; sid:2023813001; rev:1; )
308+
alert http $HOME_NET any -> $EXTERNAL_NET any ( msg:"MALWARE-CNC Win.Trojan.LummaStealer outbound connection detected"; flow:to_server,established; http_uri; content:"/c2sock",fast_pattern; bufferlen:7; http_header; http_header:field user-agent; content:"TeslaBrowser/"; http_method; content:"POST"; metadata:ruleset community, service http; rem:"yara:MALWARE_Win_LummaStealer, clamav:MALWARE.Win.Trojan.LummaStealer"; classtype:trojan-activity; sid:2023813002; rev:1; )
307309
################################################
308310
# INDICATOR PACKED
309311
################################################
@@ -375,4 +377,4 @@ alert tcp $HOME_NET any -> $EXTERNAL_NET any ( msg:"POLICY-OTHER Remote Administ
375377
alert tcp $EXTERNAL_NET any -> $HOME_NET any ( msg:"POLICY-OTHER Remote Administration Tool detected - RemoteUtilities"; flow:to_client,established; content:"<rman_message version=",fast_pattern; content:"<code>3</code>"; content:"</rman_message>",distance 0; metadata:ruleset community; classtype:policy-violation; sid:950001; rev:1;)
376378
alert tcp $HOME_NET any -> $EXTERNAL_NET any ( msg:"POLICY-OTHER Remote Administration Tool detected - Imminent"; flow:to_server,established; dsize:10; content:"|06 00 00 00 81 13 14 6E 5B 69|",fast_pattern; metadata:ruleset community; classtype:policy-violation; sid:950002; rev:1;)
377379
alert tcp $EXTERNAL_NET any -> $HOME_NET any ( msg:"POLICY-OTHER Remote Administration Tool detected - Imminent"; flow:to_client,established; dsize:48; content:"|2C 00 00 00 02 00 00 00 01|",fast_pattern; content:"$",distance 2; metadata:ruleset community; classtype:policy-violation; sid:950003; rev:1;)
378-
alert http $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS ( msg:"POLICY-OTHER Iluminati proxy/anonymizer download/upgrade detected"; flow:to_server,established; http_uri; content:"/admin/rmt/luminati.io/",fast_pattern; metadata:ruleset community, service http; classtype:trojan-activity; sid:950004; rev:1;)
380+
alert http $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS ( msg:"POLICY-OTHER Iluminati proxy/anonymizer download/upgrade detected"; flow:to_server,established; http_uri; content:"/admin/rmt/luminati.io/",fast_pattern; metadata:ruleset community, service http; classtype:trojan-activity; sid:950004; rev:1;)

‎yara/malware.yar

+65
Original file line numberDiff line numberDiff line change
@@ -9845,6 +9845,9 @@ rule MALWARE_Win_LummaStealer {
98459845
meta:
98469846
author = "ditekSHen"
98479847
description = "Detects Lumma Stealer"
9848+
snort1 = "2023813001"
9849+
snort2 = "2023813002"
9850+
clamav1 = "MALWARE.Win.Trojan.LummaStealer"
98489851
strings:
98499852
$x1 = /Lum[0-9]{3}xedmaC2,\sBuild/ ascii
98509853
$x2 = /LID\(Lu[0-9]{3}xedmma\sID\):/ ascii
@@ -10825,3 +10828,65 @@ rule MALWARE_Win_Fiber {
1082510828
condition:
1082610829
uint16(0) == 0x5a4d and ((1 of ($x*) and 3 of ($s*) and 2 of ($i*)) or (4 of ($s*) and 4 of ($i*)) or (2 of ($s*) and 6 of ($i*)) or (1 of ($x*) and 3 of ($v*)) or (all of ($v*)))
1082710830
}
10831+
10832+
rule MALWARE_Win_Unknown_PackedLoader_01 {
10833+
meta:
10834+
author = "ditekShen"
10835+
description = "Detects unknown loader / packer. Observed running LummaStealer"
10836+
strings:
10837+
$s1 = "Error at hooking API \"%S\"" wide
10838+
$s2 = "Dumping first %d bytes:" wide
10839+
$s3 = "Error at initialization of bundled DLL: %s" wide
10840+
$s4 = "GetMemoryForDLL()" ascii
10841+
$s5 = "type=activation&code=" ascii
10842+
$s6 = "activation.php?code=" ascii
10843+
$s7 = "&hwid=" ascii
10844+
$s8 = "&hash=" ascii
10845+
$s9 = "type=deactivation&hash=" ascii
10846+
$s10 = "deactivation.php?hash=" ascii
10847+
$s11 = "BANNED" fullword ascii
10848+
$s12 = "GetAdaptersInfo" ascii
10849+
condition:
10850+
uint16(0) == 0x5a4d and 11 of them
10851+
}
10852+
10853+
rule MALWARE_Win_LOLKEK {
10854+
meta:
10855+
author = "ditekShen"
10856+
description = "Detects LOLKEK / GlobeImposter ransowmare"
10857+
strings:
10858+
$s1 = "$Recycle.bin" fullword wide
10859+
$s2 = "\\\\?\\%c:" fullword wide
10860+
$s3 = ".MMM" fullword wide
10861+
$s4 = "ReadMe.txt" fullword wide
10862+
$s5 = "select * from Win32_ShadowCopy" fullword wide
10863+
$s6 = "Win32_ShadowCopy.ID='%s'" fullword wide
10864+
$s7 = "W3CRYPTO LOCKER" ascii
10865+
$s8 = "http://mmcb" ascii
10866+
$s9 = "yip.su/2QstD5" ascii
10867+
$s10 = "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AddInProcess32.exe" ascii
10868+
condition:
10869+
uint16(0) == 0x5a4d and 7 of them
10870+
}
10871+
10872+
rule MALWARE_Win_Spacecolon {
10873+
meta:
10874+
author = "ditekSHen"
10875+
description = "Detects Spacecolon ransomware"
10876+
strings:
10877+
$s1 = "eraseext" fullword ascii
10878+
$s2 = "*.encrypted" fullword ascii
10879+
$s3 = "TIMATOMA#" fullword wide
10880+
$s4 = ".Encrypted" fullword wide
10881+
$s5 = "Already Encrypted" wide
10882+
$s6 = "note.txt" fullword wide
10883+
$s7 = "HOW TO RECOVERY FILES.TXT" fullword wide
10884+
$s8 = "taskkill /f /im \"" wide nocase
10885+
$s9 = "\\kill.bat" wide
10886+
$s10 = "Search cancelled -" fullword wide
10887+
$s11 = "%d folder(s) searched and %d file(s) found - %.3f second(s)" fullword wide
10888+
$s12 = "Our TOX ID :" ascii
10889+
$s13 = "tufhackteam@gmail.com" ascii
10890+
condition:
10891+
uint16(0) == 0x5a4d and 8 of them
10892+
}

0 commit comments

Comments
 (0)