(YARA) YARA_XOR_Hunt

Download Raw

rule XOR_hunt
{
  meta:
    author = "Thomas Roccia | @fr0gger_"
    description = "100DaysOfYara - An attempt to catch malicious/suspicious pe file using xor for some data"
    status = "experimental"

  strings:
    $s1 = "http://" xor
    $s2 = "https://" xor
    $s3 = "ftp://" xor
    $s4 = "This program cannot be run in DOS mode" xor
    $s5 = "Mozilla/5.0" xor
    $s6 = "cmd /c" xor
    $s7 = "-ep bypass" xor

  condition:
     uint16(0) == 0x5A4D and any of them
}

Associated Techniques

Technique Name Technique ID's Snippet(s) OS
XOR Operation U0701 E1027.m02

Matching Samples 10 most recent

Sample Name Matching Techniques First Seen Last Seen
Greenshot-INSTALLER-1.2.10.6-RELEASE.exe 3 2024-11-24 2 days, 14 hours ago
avbox.exe 6 2024-12-11 1 week, 3 days ago
avbox.exe 7 2024-12-11 1 week, 3 days ago
1d460cf2b1dae2b7e400068fc384...c508faed68963df3588695be.exe 3 2024-12-10 1 week, 4 days ago
test.exe 7 2024-12-06 2 weeks, 1 day ago
EternelSuspention.exe 8 2024-12-05 2 weeks, 2 days ago
honeypot.exe 5 2024-12-04 2 weeks, 3 days ago
br1.dll 10 2024-12-03 2 weeks, 4 days ago
lnl-msfvenom.exe 7 2024-12-02 2 weeks, 5 days ago
d76d0406155a16f0.exe 4 2024-11-13 2 weeks, 6 days ago
View All

Created

January 4, 2024

Last Revised

January 4, 2024