Advertisement
James_inthe_box

Sorano yara

May 10th, 2019
678
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.08 KB | None | 0 0
  1. Turns out this was actually #sorano stealer :(
  2.  
  3. rule Sakari_bin
  4. {
  5. meta:
  6. description = "Sorano Stealer"
  7. author = "James_inthe_box"
  8. reference = "f6031dee846b034b70bf33ba416f4244a7a34fd30c23d7bd4a2c98c2812e3c29"
  9. date = "2019/05"
  10. maltype = "Stealer"
  11.  
  12. strings:
  13. $string2 = "*.vdf" wide
  14. $string3 = "cookies" wide
  15. $string5 = "win32_logicaldisk.deviceid=" wide
  16. $string6 = "VolumeSerialNumber" wide
  17. $string7 = "[Browsers]" wide
  18. $string8 = "&ci=" wide
  19. $string9 = "&fz=" wide
  20. $string10 = "&cr=" wide
  21. $string11 = "&ds=" wide
  22. $string12 = "&dd=" wide
  23. $string13 = "&pd=" wide
  24.  
  25. condition:
  26. uint16(0) == 0x5A4D and all of ($string*) and filesize < 8000KB
  27. }
  28.  
  29. rule Sakari_mem
  30. {
  31. meta:
  32. description = "Sorano Stealer"
  33. author = "James_inthe_box"
  34. reference = "f6031dee846b034b70bf33ba416f4244a7a34fd30c23d7bd4a2c98c2812e3c29"
  35. date = "2019/05"
  36. maltype = "Stealer"
  37.  
  38. strings:
  39. $string2 = "*.vdf" wide
  40. $string3 = "cookies" wide
  41. $string5 = "win32_logicaldisk.deviceid=" wide
  42. $string6 = "VolumeSerialNumber" wide
  43. $string7 = "[Browsers]" wide
  44. $string8 = "&ci=" wide
  45. $string9 = "&fz=" wide
  46. $string10 = "&cr=" wide
  47. $string11 = "&ds=" wide
  48. $string12 = "&dd=" wide
  49. $string13 = "&pd=" wide
  50.  
  51. condition:
  52. all of ($string*) and filesize > 8000KB
  53. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement