ClamWin Free Antivirus Forum Index
ClamWin Free Antivirus
Support and Discussion Forums
Reply to topic
Yara Signature For new Chinese Storm Cloud Malware
GuitarBob


Joined: 09 Jul 2006
Posts: 4935
Location: USA
Reply with quote
Below is a Yara signature for ClamWin that detects the Gimmick espionage malware from the Stormcloud Chinese espionage group. This signature is for MAC computers, but the Windows and Linux versions also use similar architecture. Yara signatures are similar to C Code, and are used by lots of malware researchers. Clam AV was modified several years ago to process Yara signatures. Yara sigs start and end with a bracket, but they usually have some identification information before the first bracket. To use a Yara signature in ClamWin, copy and paste the Yara code (make sure you get all of it), and save it in a Notepad type file in the ClamWin database folder with the malware name and a .yar extension. Do not save it as a text file--save it with an All Files designation, and make sure there is no .text extension after the .yar extension. Clam AV & ClamWin will give a scan error if the file is named with an extension other than .yar after the filename.

Name the signature file below Gimmick.yar if you save it in a separate file. After you save the signature file, run a ClamWin scan on a file somewhere to make sure there are no errors. You can put all your Yara signatures in one file--name the file YaraSigs.yar in that case and put it at the top of the signature file with a blank line before the old signatures. If you get a scan error in a single Yara file, delete the file from the ClamWin database folder. If you get a scan error in a file with multiple Yara signatures, delete the current Yara signature(s) you just made, make sure the deleted lines are gone from the file, and save the file in the ClamWin database folder again.

These Yara signatures are a bit long, so in the future, I will let you know that I have a new Yara signature, and then you can email me at rscrogg at gmail dot com if you need the signature.

Thanks to Veloxity for the Signature.

Regards,

rule apt_macOS_gimmick : StormCloud
{
meta:
author = "threatintel@volexity.com"
description = "Detects the macOS port of the GIMMICK malware."
date = "2021-10-18"
hash1 = "2a9296ac999e78f6c0bee8aca8bfa4d4638aa30d9c8ccc65124b1cbfc9caab5f"
license = "See license at https://github.com/volexity/threat-intel/blob/main/LICENSE.txt"
memory_suitable = 1

strings:
// Also seen in DAZZLESPY
$s1 = "http://cgi1.apnic.net/cgi-bin/my-ip.php --connect-timeout 10 -m 20" wide ascii

$json1 = "base_json" ascii wide
$json2 = "down_json" ascii wide
$json3 = "upload_json" ascii wide
$json4 = "termin_json" ascii wide
$json5 = "request_json" ascii wide
$json6 = "online_json" ascii wide
$json7 = "work_json" ascii wide

$msg1 = "bash_pid: %d, FDS_CHILD: %d, FDS_PARENT: %d" ascii wide
$msg2 = "pid %d is dead" ascii wide
$msg3 = "exit with code %d" ascii wide
$msg4 = "recv signal %d" ascii wide

$cmd1 = "ReadCmdQueue" ascii wide
$cmd2 = "read_cmd_server_timer" ascii wide
$cmd3 = "enableProxys" ascii wide
$cmd4 = "result_block" ascii wide
$cmd5 = "createDirLock" ascii wide
$cmd6 = "proxyLock" ascii wide
$cmd7 = "createDirTmpItem" ascii wide
$cmd8 = "dowfileLock" ascii wide
$cmd9 = "downFileTmpItem" ascii wide
$cmd10 = "filePathTmpItem" ascii wide
$cmd11 = "uploadItems" ascii wide
$cmd12 = "downItems" ascii wide
$cmd13 = "failUploadItems" ascii wide
$cmd14 = "failDownItems" ascii wide
$cmd15 = "downloadCmds" ascii wide
$cmd16 = "uploadFiles" ascii wide

condition:
$s1 or
5 of ($json*) or
3 of ($msg*) or
9 of ($cmd*)
}

rule apt_win_gimmick_dotnet_base : StormCloud
{
meta:
author = "threatintel@volexity.com"
description = "Detects the base version of GIMMICK in .NET."
date = "2020-03-16"
hash1 = "b554bfe4c2da7d0ac42d1b4f28f4aae854331fd6d2b3af22af961f6919740234"
license = "See license at https://github.com/volexity/threat-intel/blob/main/LICENSE.txt"
memory_suitable = 1

strings:
$other1 = "srcStr is null" wide
$other2 = "srcBs is null " wide
$other3 = "Key cannot be null" wide
$other4 = "Faild to get target constructor, targetType=" wide
$other5 = "hexMoudule(public key) cannot be null or empty." wide
$other6 = "https://oauth2.googleapis.com/token" wide

$magic1 = "TWljcm9zb2Z0IUAjJCVeJiooKQ==" ascii wide
$magic2 = "DAE47700E8CF3DAB0@" ascii wide

condition:
5 of ($other*) or
any of ($magic*)
}
View user's profileSend private message
Yara Signature For new Chinese Storm Cloud Malware
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Reply to topic