![]() |
![]() | Yara Signature For new Chinese Storm Cloud Malware | ![]() |
GuitarBob
![]() |
![]() |
Below is a Yara signature for ClamWin that detects the Gimmick espionage malware from the Stormcloud Chinese espionage group. This signature is for MAC computers, but the Windows and Linux versions also use similar architecture. Yara signatures are similar to C Code, and are used by lots of malware researchers. Clam AV was modified several years ago to process Yara signatures. Yara sigs start and end with a bracket, but they usually have some identification information before the first bracket. To use a Yara signature in ClamWin, copy and paste the Yara code (make sure you get all of it), and save it in a Notepad type file in the ClamWin database folder with the malware name and a .yar extension. Do not save it as a text file--save it with an All Files designation, and make sure there is no .text extension after the .yar extension. Clam AV & ClamWin will give a scan error if the file is named with an extension other than .yar after the filename.
Name the signature file below Gimmick.yar if you save it in a separate file. After you save the signature file, run a ClamWin scan on a file somewhere to make sure there are no errors. You can put all your Yara signatures in one file--name the file YaraSigs.yar in that case and put it at the top of the signature file with a blank line before the old signatures. If you get a scan error in a single Yara file, delete the file from the ClamWin database folder. If you get a scan error in a file with multiple Yara signatures, delete the current Yara signature(s) you just made, make sure the deleted lines are gone from the file, and save the file in the ClamWin database folder again. These Yara signatures are a bit long, so in the future, I will let you know that I have a new Yara signature, and then you can email me at rscrogg at gmail dot com if you need the signature. Thanks to Veloxity for the Signature. Regards, rule apt_macOS_gimmick : StormCloud { meta: author = "threatintel@volexity.com" description = "Detects the macOS port of the GIMMICK malware." date = "2021-10-18" hash1 = "2a9296ac999e78f6c0bee8aca8bfa4d4638aa30d9c8ccc65124b1cbfc9caab5f" license = "See license at https://github.com/volexity/threat-intel/blob/main/LICENSE.txt" memory_suitable = 1 strings: // Also seen in DAZZLESPY $s1 = "http://cgi1.apnic.net/cgi-bin/my-ip.php --connect-timeout 10 -m 20" wide ascii $json1 = "base_json" ascii wide $json2 = "down_json" ascii wide $json3 = "upload_json" ascii wide $json4 = "termin_json" ascii wide $json5 = "request_json" ascii wide $json6 = "online_json" ascii wide $json7 = "work_json" ascii wide $msg1 = "bash_pid: %d, FDS_CHILD: %d, FDS_PARENT: %d" ascii wide $msg2 = "pid %d is dead" ascii wide $msg3 = "exit with code %d" ascii wide $msg4 = "recv signal %d" ascii wide $cmd1 = "ReadCmdQueue" ascii wide $cmd2 = "read_cmd_server_timer" ascii wide $cmd3 = "enableProxys" ascii wide $cmd4 = "result_block" ascii wide $cmd5 = "createDirLock" ascii wide $cmd6 = "proxyLock" ascii wide $cmd7 = "createDirTmpItem" ascii wide $cmd8 = "dowfileLock" ascii wide $cmd9 = "downFileTmpItem" ascii wide $cmd10 = "filePathTmpItem" ascii wide $cmd11 = "uploadItems" ascii wide $cmd12 = "downItems" ascii wide $cmd13 = "failUploadItems" ascii wide $cmd14 = "failDownItems" ascii wide $cmd15 = "downloadCmds" ascii wide $cmd16 = "uploadFiles" ascii wide condition: $s1 or 5 of ($json*) or 3 of ($msg*) or 9 of ($cmd*) } rule apt_win_gimmick_dotnet_base : StormCloud { meta: author = "threatintel@volexity.com" description = "Detects the base version of GIMMICK in .NET." date = "2020-03-16" hash1 = "b554bfe4c2da7d0ac42d1b4f28f4aae854331fd6d2b3af22af961f6919740234" license = "See license at https://github.com/volexity/threat-intel/blob/main/LICENSE.txt" memory_suitable = 1 strings: $other1 = "srcStr is null" wide $other2 = "srcBs is null " wide $other3 = "Key cannot be null" wide $other4 = "Faild to get target constructor, targetType=" wide $other5 = "hexMoudule(public key) cannot be null or empty." wide $other6 = "https://oauth2.googleapis.com/token" wide $magic1 = "TWljcm9zb2Z0IUAjJCVeJiooKQ==" ascii wide $magic2 = "DAE47700E8CF3DAB0@" ascii wide condition: 5 of ($other*) or any of ($magic*) } |
|||||||||||
|
![]() |
![]() | Yara Signature For new Chinese Storm Cloud Malware | ![]() |
|
||
![]() |
![]() |
Powered by phpBB © phpBB Group
Design by phpBBStyles.com | Styles Database.
Content © ClamWin Free Antivirus GNU GPL Free Software Open Source Virus Scanner. Free Windows Antivirus. Stay Virus Free with Free Software.
Design by phpBBStyles.com | Styles Database.
Content © ClamWin Free Antivirus GNU GPL Free Software Open Source Virus Scanner. Free Windows Antivirus. Stay Virus Free with Free Software.