Advertisement
Snakelabs

Gholee Yara

Mar 9th, 2015
667
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.50 KB | None | 0 0
  1. rule gholee : v1
  2. {
  3. meta:
  4. author = “@GelosSnake”
  5. description = "http://securityaffairs.co/wordpress/28170/cyber-crime/gholee-malware.html"
  6. date = “2014-08″
  7. maltype = “Remote Access Trojan”
  8. sample_filetype = “dll”
  9. hash0 = "48573a150562c57742230583456b4c02"
  10.  
  11. strings:
  12. $a = “sandbox_avg10_vc9_SP1_2011″
  13. $b = “gholee”
  14.  
  15. condition:
  16. all of them
  17. }
  18.  
  19. rule gholee : v2
  20. {
  21. meta:
  22. author = "@GelosSnake"
  23. date = "2015-02-12"
  24. description = "http://securityaffairs.co/wordpress/28170/cyber-crime/gholee-malware.html"
  25. hash0 = "05523761ca296ec09afdf79477e5f18d"
  26. hash1 = "08e424ac42e6efa361eccefdf3c13b21"
  27. hash2 = "5730f925145f1a1cd8380197e01d9e06"
  28. hash3 = "73461c8578dd9ab86d42984f30c04610"
  29. sample_filetype = "dll"
  30. strings:
  31. $string0 = "RichHa"
  32. $string1 = " ((((( H" wide
  33. $string2 = "1$1,141<1D1L1T1\\1d1l1t1"
  34. $string3 = "<8;$O' "
  35. $string4 = "@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]"
  36. $string5 = "jYPQTVTSkllZTTXRTUiHceWda/"
  37. $string6 = "urn:schemas-microsoft-com:asm.v1"
  38. $string7 = "8.848H8O8i8s8y8"
  39. $string8 = "wrapper3" wide
  40. $string9 = "pwwwwwwww"
  41. $string10 = "Sunday"
  42. $string11 = "YYuTVWh"
  43. $string12 = "DDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDIN"
  44. $string13 = "ytMMMMMMUbbrrrrrxxxxxxxxrriUMMMMMMMMMUuzt"
  45. $string15 = "wrapper3 Version 1.0" wide
  46. $string16 = "77A779"
  47. $string17 = "<C<G<M<R<X<"
  48. $string18 = "9 9-9N9X9s9"
  49. condition:
  50. 18 of them
  51. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement