(YARA) Detect XOR Encoded Malicious Patterns

Download Raw

rule XOR_hunt
{
  meta:
    author = "Thomas Roccia | @fr0gger_"
    description = "100DaysOfYara - An attempt to catch malicious/suspicious pe file using xor for some data"
    status = "experimental"

  strings:
    $s1 = "http://" xor
    $s2 = "https://" xor
    $s3 = "ftp://" xor
    $s4 = "This program cannot be run in DOS mode" xor
    $s5 = "Mozilla/5.0" xor
    $s6 = "cmd /c" xor
    $s7 = "-ep bypass" xor

  condition:
     uint16(0) == 0x5A4D and any of them
}

Associated Techniques

Technique Name Technique ID's Categories Snippet(s)
XOR Operation U0701 E1027.m02

Matching Samples 10 most recent

Sample Name Matching Techniques First Seen Last Seen
JIUN.DSP.dll 2 2026-04-16 12 hours, 8 minutes ago
CVE-2026-20817_PoC.exe 8 2026-04-09 1 week ago
Raid.exe 7 2026-04-08 1 week, 1 day ago
b2a17fbdf536bd79dba9eb5e4ea3...0fdd7eb07ca6c5bdf73de001.exe 11 2026-04-07 1 week, 2 days ago
VehicalLogger.dll 5 2026-04-06 1 week, 3 days ago
XClient1.exe 4 2026-04-04 1 week, 5 days ago
Client-built.exe 5 2026-04-02 2 weeks ago
agent.exe 7 2026-04-01 2 weeks ago
FilterKeysSetter.exe 5 2026-03-28 2 weeks, 5 days ago
2_5339247083163523934.exe 6 2026-03-27 2 weeks, 6 days ago
View All

Created

January 4, 2024

Last Revised

March 27, 2026