Skip to content

Commit

Permalink
november update
Browse files Browse the repository at this point in the history
  • Loading branch information
mthcht committed Dec 8, 2024
1 parent fbfcb88 commit c069099
Show file tree
Hide file tree
Showing 193 changed files with 124,815 additions and 82,125 deletions.
94,370 changes: 48,117 additions & 46,253 deletions _utils/threathunting-keywords.csv

Large diffs are not rendered by default.

18,324 changes: 12,386 additions & 5,938 deletions yara_rules/all.yara

Large diffs are not rendered by default.

23 changes: 23 additions & 0 deletions yara_rules/greyware_tool_keyword/A-C/AVDump.yara
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
rule AVDump
{
meta:
description = "Detection patterns for the tool 'AVDump' taken from the ThreatHunting-Keywords github project"
author = "@mthcht"
reference = "https://github.com/mthcht/ThreatHunting-Keywords"
tool = "AVDump"
rule_category = "greyware_tool_keyword"

strings:
// Description: Avast AV to dump LSASS (C:\Program Files\Avast Software\Avast)
// Reference: https://rosesecurity.gitbook.io/red-teaming-ttps/windows#av-lsass-dump
$string1 = /\\AvDump\.exe\s\-\-pid\s.{0,1000}\s\-\-exception_ptr\s0/ nocase ascii wide
// Description: Avast AV to dump LSASS (C:\Program Files\Avast Software\Avast)
// Reference: https://rosesecurity.gitbook.io/red-teaming-ttps/windows#av-lsass-dump
$string2 = /AvDump\.exe\s\-\-pid\s.{0,1000}\s\-\-dump_file\s.{0,1000}\.dmp/ nocase ascii wide
// Description: Avast AV to dump LSASS (C:\Program Files\Avast Software\Avast)
// Reference: N/A
$string3 = "Dumped by AvDump" nocase ascii wide
condition:
any of them
}
17 changes: 0 additions & 17 deletions yara_rules/greyware_tool_keyword/A-C/Avast.yara

This file was deleted.

72 changes: 45 additions & 27 deletions yara_rules/greyware_tool_keyword/A-C/adfind.yara

Large diffs are not rendered by default.

107 changes: 64 additions & 43 deletions yara_rules/greyware_tool_keyword/A-C/anydesk.yara
Original file line number Diff line number Diff line change
Expand Up @@ -8,135 +8,156 @@ rule anydesk
rule_category = "greyware_tool_keyword"

strings:
// Description: command line used with anydesk in the notes of the ransomware group
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string1 = " /c echo mar3pora " nocase ascii wide
// Description: command line used with anydesk in the notes of the ransomware group
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string2 = /\s\/c\secho\sPa\$\$w0rd\s\|\sC\:\\ProgramData\\anydesk\.exe/ nocase ascii wide
// Description: command line used with anydesk in the notes of the Dispossessor ransomware group
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string3 = /\sInvoke\-WebRequest\s\-Uri\shttp\:\/\/download\.anydesk\.com\/AnyDesk\.exe/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string1 = /\/\.anydesk\/\.anydesk\.trace/ nocase ascii wide
$string4 = /\/\.anydesk\/\.anydesk\.trace/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string2 = /\/\.anydesk\/service\.conf/ nocase ascii wide
$string5 = /\/\.anydesk\/service\.conf/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string3 = /\/\.anydesk\/system\.conf/ nocase ascii wide
$string6 = /\/\.anydesk\/system\.conf/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string4 = /\/\.anydesk\/user\.conf/ nocase ascii wide
$string7 = /\/\.anydesk\/user\.conf/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string5 = /\/Anydesk\.exe/ nocase ascii wide
$string8 = /\/Anydesk\.exe/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string6 = /\/Applications\/Anydesk\.app\// nocase ascii wide
$string9 = /\/Applications\/Anydesk\.app\// nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string7 = /\/etc\/systemd\/system\/anydesk\.service/ nocase ascii wide
$string10 = /\/etc\/systemd\/system\/anydesk\.service/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string8 = /\/home\/.{0,1000}\/\.anydesk\// nocase ascii wide
$string11 = /\/home\/.{0,1000}\/\.anydesk\// nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string9 = /\/log\/anydesk\.trace/ nocase ascii wide
$string12 = /\/log\/anydesk\.trace/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string10 = "/usr/bin/anydesk" nocase ascii wide
$string13 = "/usr/bin/anydesk" nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string11 = "/usr/lib64/anydesk" nocase ascii wide
$string14 = "/usr/lib64/anydesk" nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string12 = "/usr/libexec/anydesk" nocase ascii wide
$string15 = "/usr/libexec/anydesk" nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string13 = /\\adprinterpipe/ nocase ascii wide
$string16 = /\\adprinterpipe/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string14 = /\\AnyDesk\s\(1\)\.exe/ nocase ascii wide
$string17 = /\\AnyDesk\s\(1\)\.exe/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string15 = /\\AnyDesk\.exe/ nocase ascii wide
$string18 = /\\AnyDesk\.exe/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string16 = /\\AnyDesk\.lnk/ nocase ascii wide
$string19 = /\\AnyDesk\.lnk/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string17 = /\\AnyDesk\\ad\.trace/ nocase ascii wide
$string20 = /\\AnyDesk\\ad\.trace/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string18 = /\\AnyDesk\\ad_svc\.trace/ nocase ascii wide
$string21 = /\\AnyDesk\\ad_svc\.trace/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string19 = /\\AnyDesk\\connection_trace\.txt/ nocase ascii wide
$string22 = /\\AnyDesk\\connection_trace\.txt/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string20 = /\\AnyDesk\\connection_trace\.txt/ nocase ascii wide
$string23 = /\\AnyDesk\\connection_trace\.txt/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string21 = /\\anydesk\\printer_driver/ nocase ascii wide
$string24 = /\\anydesk\\printer_driver/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string22 = /\\AnyDesk\\service\.conf/ nocase ascii wide
$string25 = /\\AnyDesk\\service\.conf/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string23 = /\\AnyDeskPrintDriver\.cat/ nocase ascii wide
$string26 = /\\AnyDeskPrintDriver\.cat/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string24 = /\\anydeskprintdriver\.inf/ nocase ascii wide
$string27 = /\\anydeskprintdriver\.inf/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string25 = /\\AppData\\Roaming\\AnyDesk\\system\.conf/ nocase ascii wide
$string28 = /\\AppData\\Roaming\\AnyDesk\\system\.conf/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string26 = /\\AppData\\Roaming\\AnyDesk\\user\.conf/ nocase ascii wide
$string29 = /\\AppData\\Roaming\\AnyDesk\\user\.conf/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string27 = /\\ControlSet001\\Services\\AnyDesk/ nocase ascii wide
$string30 = /\\ControlSet001\\Services\\AnyDesk/ nocase ascii wide
// Description: anydesk added in safeboot - abused by attackers to maintain persistence and bypass detection
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string31 = /\\CurrentControlSet\\Control\\SafeBoot\\Network\\AnyDesk/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string28 = /\\Pictures\\AnyDesk/ nocase ascii wide
$string32 = /\\Pictures\\AnyDesk/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string29 = /\\Prefetch\\ANYDESK\.EXE/ nocase ascii wide
$string33 = /\\Prefetch\\ANYDESK\.EXE/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string30 = /\\ProgramFile.{0,1000}\\previous\-version/ nocase ascii wide
$string34 = /\\ProgramFile.{0,1000}\\previous\-version/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-003/
$string31 = /\\SOFTWARE\\Clients\\Media\\AnyDesk/ nocase ascii wide
$string35 = /\\SOFTWARE\\Clients\\Media\\AnyDesk/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string32 = /\\Temp\\AnyDeskUninst/ nocase ascii wide
$string36 = /\\Temp\\AnyDeskUninst/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string33 = /\\Videos\\AnyDesk/ nocase ascii wide
$string37 = /\\Videos\\AnyDesk/ nocase ascii wide
// Description: Anydesk RMM usage - compromised certificate - https://anydesk.com/en/changelog/windows
// Reference: https://anydesk.com/
$string34 = "0DBF152DEAF0B981A8A938D53F769DB8" nocase ascii wide
$string38 = "0DBF152DEAF0B981A8A938D53F769DB8" nocase ascii wide
// Description: Anydesk RMM usage - compromised certificate - https://anydesk.com/en/changelog/windows
// Reference: https://anydesk.com/
$string35 = "9CD1DDB78ED05282353B20CDFE8FA0A4FB6C1ECE" nocase ascii wide
$string39 = "9CD1DDB78ED05282353B20CDFE8FA0A4FB6C1ECE" nocase ascii wide
// Description: Anydesk RMM usage - compromised certificate - https://anydesk.com/en/changelog/windows
// Reference: https://anydesk.com/
$string36 = "9D7620A4CEBA92370E8828B3CB1007AEFF63AB36A2CBE5F044FDDE14ABAB1EBF" nocase ascii wide
$string40 = "9D7620A4CEBA92370E8828B3CB1007AEFF63AB36A2CBE5F044FDDE14ABAB1EBF" nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string37 = "AnyDesk Software GmbH" nocase ascii wide
$string41 = "AnyDesk Software GmbH" nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string42 = /Anydesk.{0,1000}\s\-\-start\-with\-win\s\-\-silent/ nocase ascii wide
// Description: setting the AnyDesk service password manually
// Reference: https://thedfirreport.com/2023/04/03/malicious-iso-file-leads-to-domain-wide-ransomware/
$string38 = /anydesk\.exe\s\-\-set\-password/ nocase ascii wide
$string43 = /anydesk\.exe\s\-\-set\-password/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string44 = /boot\.net\.anydesk\.com/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string39 = /boot\.net\.anydesk\.com/ nocase ascii wide
$string45 = /C\:\\Program\sFiles\s\(x86\)\\AnyDesk/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string40 = /C\:\\Program\sFiles\s\(x86\)\\AnyDesk/ nocase ascii wide
$string46 = /Desktop\\AnyDesk\.lnk/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string41 = /Desktop\\AnyDesk\.lnk/ nocase ascii wide
$string47 = /download\.anydesk\.com/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string42 = /HKCR\\\.anydesk\\/ nocase ascii wide
$string48 = /HKCR\\\.anydesk\\/ nocase ascii wide
// Description: command line used with anydesk in the notes of the Dispossessor ransomware group
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string49 = /programdata\\.{0,1000}\s\-\-start\-with\-win\s\-\-remove\-first\s\-\-silent\s\-\-start\-service/ nocase ascii wide
// Description: Anydesk RMM usage
// Reference: https://anydesk.com/
$string43 = /relay\-.{0,1000}\.net\.anydesk\.com/ nocase ascii wide
$string50 = /relay\-.{0,1000}\.net\.anydesk\.com/ nocase ascii wide
condition:
any of them
Expand Down
10 changes: 8 additions & 2 deletions yara_rules/greyware_tool_keyword/A-C/attrib.yara
Original file line number Diff line number Diff line change
Expand Up @@ -32,12 +32,18 @@ rule attrib
// Description: suspicious attrib command
// Reference: https://github.com/petikvx/vx-ezine/blob/cfaf09bb089a08a9f33254929209fb32ebd52806/darkcodes/dc1/Sources/Sph1nX_Sources/DeskLock/DeskLock.txt#L13
$string8 = /attrib\s\-R\s\-S\s\-H\sC\:\\WINDOWS\\System32\\explorer\.exe/ nocase ascii wide
// Description: CleanRDP.bat script erasing RDP traces used by Dispossessor ransomware group
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string9 = "attrib -s -h %userprofile%" nocase ascii wide
// Description: CleanRDP.bat script erasing RDP traces used by Dispossessor ransomware group
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string10 = /attrib\s\-s\s\-h\s\%userprofile\%\\documents\\Default\.rdp/ nocase ascii wide
// Description: NTLM Leak via Desktop.ini
// Reference: https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Anti-Forensics.md
$string9 = /echo\s\[\.ShellClassInfo\]\s\>\sdesktop\.ini/ nocase ascii wide
$string11 = /echo\s\[\.ShellClassInfo\]\s\>\sdesktop\.ini/ nocase ascii wide
// Description: NTLM Leak via Desktop.ini
// Reference: https://github.com/RoseSecurity/Red-Teaming-TTPs/blob/main/Anti-Forensics.md
$string10 = /echo\sIconResource\=\\\\.{0,1000}\\.{0,1000}\s\>\>\sdesktop\.ini/ nocase ascii wide
$string12 = /echo\sIconResource\=\\\\.{0,1000}\\.{0,1000}\s\>\>\sdesktop\.ini/ nocase ascii wide
condition:
any of them
Expand Down
17 changes: 0 additions & 17 deletions yara_rules/greyware_tool_keyword/A-C/binwalk.yara

This file was deleted.

5 changes: 4 additions & 1 deletion yara_rules/greyware_tool_keyword/A-C/bitsadmin.yara
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,11 @@ rule bitsadmin
// Reference: N/A
$string1 = /b\^i\^t\^s\^a\^d\^min\^\s\/t\^ra\^n\^s\^f\^e\^r\^\s\^\/\^d\^o\^w\^n\^l\^o\^a\^d/ nocase ascii wide
// Description: bitsadmin suspicious transfer
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string2 = "bitsadmin /transfer " nocase ascii wide
// Description: bitsadmin suspicious transfer
// Reference: N/A
$string2 = /bitsadmin\s\/transfer\sdebjob\s\/download\s\/priority\snormal\s\\.{0,1000}\\C\$\\Windows\\.{0,1000}\.dll/ nocase ascii wide
$string3 = /bitsadmin\s\/transfer\sdebjob\s\/download\s\/priority\snormal\s\\.{0,1000}\\C\$\\Windows\\.{0,1000}\.dll/ nocase ascii wide
condition:
any of them
Expand Down
11 changes: 10 additions & 1 deletion yara_rules/greyware_tool_keyword/A-C/certutil.yara
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,18 @@ rule certutil
// Description: LOLBAS execution - downloading payload from discord with certutil
// Reference: N/A
$string1 = /certutil\.exe\s\-urlcache\s\-split\s\-f\s.{0,1000}https\:\/\/cdn\.discordapp\.com\/attachments\// nocase ascii wide
// Description: Certutil download behavior observed by the Dispossessor ransomware group
// Reference: N/A
$string2 = /certutil\.exe\s\-urlcache\s\-split\s\-f\shttp.{0,1000}\.bat\sC\:\\ProgramData\\/ nocase ascii wide
// Description: Certutil download behavior observed by the Dispossessor ransomware group
// Reference: N/A
$string3 = /certutil\.exe\s\-urlcache\s\-split\s\-f\shttp.{0,1000}\.ps1\sC\:\\ProgramData\\/ nocase ascii wide
// Description: Certutil download behavior observed by the Dispossessor ransomware group
// Reference: N/A
$string4 = /certutil\.exe\s\-urlcache\s\-split\s\-f\shttp.{0,1000}\.vbs\sC\:\\ProgramData\\/ nocase ascii wide
// Description: Certutil Download from github
// Reference: N/A
$string2 = /certutil\.exe\s\-urlcache\s\-split\s\-f\shttps\:\/\/raw\.githubusercontent\.com\// nocase ascii wide
$string5 = /certutil\.exe\s\-urlcache\s\-split\s\-f\shttps\:\/\/raw\.githubusercontent\.com\// nocase ascii wide
condition:
any of them
Expand Down
3 changes: 3 additions & 0 deletions yara_rules/greyware_tool_keyword/A-C/copy.yara
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,9 @@ rule copy
// Description: copy the NTDS.dit file from a Volume Shadow Copy which contains sensitive Active Directory data including password hashes for all domain users
// Reference: N/A
$string3 = /copy\s.{0,1000}NTDS\\NTDS\.dit.{0,1000}Temp/ nocase ascii wide
// Description: copy dll from Programdata to a remote computer
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string4 = /copy.{0,1000}C\:\\ProgramData\\.{0,1000}\.dll.{0,1000}\\c\$\\/ nocase ascii wide
condition:
any of them
Expand Down
20 changes: 20 additions & 0 deletions yara_rules/greyware_tool_keyword/D-F/Dispossessor.yara
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
rule Dispossessor
{
meta:
description = "Detection patterns for the tool 'Dispossessor' taken from the ThreatHunting-Keywords github project"
author = "@mthcht"
reference = "https://github.com/mthcht/ThreatHunting-Keywords"
tool = "Dispossessor"
rule_category = "greyware_tool_keyword"

strings:
// Description: tool used by Dispossessor ransomware group to remove AV
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string1 = /\\BEST_uninstallTool\.exe/ nocase ascii wide
// Description: powershell script to find a spn - abused by Dispossessor ransomware group
// Reference: https://vx-underground.org/Archive/Dispossessor%20Leaks
$string2 = /\\findspn\.ps1/ nocase ascii wide
condition:
any of them
}
Loading

0 comments on commit c069099

Please sign in to comment.