(YARA) Detect XOR Encoded Malicious Patterns
rule XOR_hunt
{
meta:
author = "Thomas Roccia | @fr0gger_"
description = "100DaysOfYara - An attempt to catch malicious/suspicious pe file using xor for some data"
status = "experimental"
strings:
$s1 = "http://" xor
$s2 = "https://" xor
$s3 = "ftp://" xor
$s4 = "This program cannot be run in DOS mode" xor
$s5 = "Mozilla/5.0" xor
$s6 = "cmd /c" xor
$s7 = "-ep bypass" xor
condition:
uint16(0) == 0x5A4D and any of them
}
Associated Techniques
| Technique Name | Technique ID's | Categories | Snippet(s) |
|---|---|---|---|
| XOR Operation | U0701 E1027.m02 |
|
Matching Samples 10 most recent
| Sample Name | Matching Techniques | First Seen | Last Seen |
|---|---|---|---|
| JIUN.DSP.dll | 2 | 2026-04-16 | 12 hours, 8 minutes ago |
| CVE-2026-20817_PoC.exe | 8 | 2026-04-09 | 1 week ago |
| Raid.exe | 7 | 2026-04-08 | 1 week, 1 day ago |
| b2a17fbdf536bd79dba9eb5e4ea3...0fdd7eb07ca6c5bdf73de001.exe | 11 | 2026-04-07 | 1 week, 2 days ago |
| VehicalLogger.dll | 5 | 2026-04-06 | 1 week, 3 days ago |
| XClient1.exe | 4 | 2026-04-04 | 1 week, 5 days ago |
| Client-built.exe | 5 | 2026-04-02 | 2 weeks ago |
| agent.exe | 7 | 2026-04-01 | 2 weeks ago |
| FilterKeysSetter.exe | 5 | 2026-03-28 | 2 weeks, 5 days ago |
| 2_5339247083163523934.exe | 6 | 2026-03-27 | 2 weeks, 6 days ago |
Created
January 4, 2024
Last Revised
March 27, 2026