(YARA) YARA_XOR_Hunt

Download Raw

rule XOR_hunt
{
  meta:
    author = "Thomas Roccia | @fr0gger_"
    description = "100DaysOfYara - An attempt to catch malicious/suspicious pe file using xor for some data"
    status = "experimental"

  strings:
    $s1 = "http://" xor
    $s2 = "https://" xor
    $s3 = "ftp://" xor
    $s4 = "This program cannot be run in DOS mode" xor
    $s5 = "Mozilla/5.0" xor
    $s6 = "cmd /c" xor
    $s7 = "-ep bypass" xor

  condition:
     uint16(0) == 0x5A4D and any of them
}

Associated Techniques

Technique Name Technique ID's Snippet(s) OS
XOR Operation U0701 E1027.m02

Matching Samples 10 most recent

Sample Name Matching Techniques First Seen Last Seen
Real Ghost Hollowing Test Notepad Calc.exe 6 2025-07-05 10 minutes ago
TuAnhPro.exe 2 2025-07-04 1 day, 12 hours ago
Клиент.exe 9 2025-07-01 4 days, 2 hours ago
libcrypto-1_1.dll 7 2025-07-01 4 days, 2 hours ago
Gift_For_Ohanuna_Better.exe 3 2025-07-01 4 days, 3 hours ago
binary2.exe 7 2025-06-28 1 week ago
test.exe 7 2025-06-20 2 weeks, 1 day ago
ArtifactDLL.x64.dll 5 2025-06-20 2 weeks, 1 day ago
Artifact.exe 5 2025-06-20 2 weeks, 1 day ago
Bootstrapper_v2,23.exe 3 2025-06-19 2 weeks, 1 day ago
View All

Created

January 4, 2024

Last Revised

January 4, 2024