Skip to content

Commit 0a4831a

Browse files
Update third-party rules as of 2025-11-19 (#1220)
Co-authored-by: Update third-party rules <41898282+github-actions[bot]@users.noreply.github.com>
1 parent ac78b4a commit 0a4831a

File tree

3 files changed

+64
-1
lines changed

3 files changed

+64
-1
lines changed
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
rule Autumn_Backdoor
2+
{
3+
meta:
4+
id = "2kQ17alOYwTwkkTNA8vZCX"
5+
fingerprint = "v1_sha256_7a32b90fb6e962a82af808d698dc19d503c075606f5a7e52f783f0c7d71f5936"
6+
version = "2.0"
7+
date = "2025-09-26"
8+
modified = "2025-11-18"
9+
status = "RELEASED"
10+
sharing = "TLP:CLEAR"
11+
source = "BARTBLAZE"
12+
author = "@bartblaze"
13+
description = "Identifies backdoored libcef.dll (stage 1), used by a China-nexus APT, as seen in the Autumn Dragon report."
14+
category = "MALWARE"
15+
malware = "UNKNOWN"
16+
malware_type = "BACKDOOR"
17+
reference = "https://cyberarmor.tech/blog/autumn-dragon-china-nexus-apt-group-targets-south-east-asia"
18+
hash = "a3805b24b66646c0cf7ca9abad502fe15b33b53e56a04489cfb64a238616a7bf"
19+
20+
strings:
21+
$s1 = "Could not get process list."
22+
$s2 = "Please send the document now."
23+
$s3 = "Failed to create pipe."
24+
$s4 = "Failed to start process."
25+
$s5 = "Command executed but returned no output."
26+
$s6 = "Screenshot taken."
27+
$s7 = "Please send a document, not text."
28+
29+
$x1 = "No file or photo found in message."
30+
$x2 = "Error: Cannot create file on disk."
31+
$x3 = "File saved to: "
32+
$x4 = "Error receiving file:"
33+
34+
condition:
35+
4 of ($s*) or 3 of ($x*)
36+
}
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
rule Autumn_Backdoor_Loader
2+
{
3+
meta:
4+
id = "5ARAyUbFnFrLABeyLz9bWm"
5+
fingerprint = "v1_sha256_09a399531a2e2f8064b1c9862949fa1c9eca1ddab19bfb62a5ce947e002445cc"
6+
version = "1.0"
7+
date = "2025-11-18"
8+
modified = "2025-11-18"
9+
status = "RELEASED"
10+
sharing = "TLP:CLEAR"
11+
source = "BARTBLAZE"
12+
author = "@bartblaze"
13+
description = "Identifies backdoor loader (stage 2), used by a China-nexus APT, as seen in the Autumn Dragon report."
14+
category = "MALWARE"
15+
malware = "UNKNOWN"
16+
malware_type = "BACKDOOR"
17+
reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.broomstick"
18+
hash = "843fca1cf30c74edd96e7320576db5a39ebf8d0a708bde8ccfb7c12e45a7938c"
19+
hash = "d7711333c34a27aed5d38755f30d14591c147680e2b05eaa0484c958ddaae3b6"
20+
21+
strings:
22+
$pdb_dev = "\\Dev\\ApplicationDllHijacking\\"
23+
$pdb_user = "\\Users\\LG02\\Desktop\\???\\"
24+
25+
condition:
26+
any of them
27+
}

third_party/yara/bartblaze/RELEASE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
a88bd98592ea6dd57da61bbcb8de76eb8cbf33b6
1+
ca47007b188bbbaf77c2892483acdc13f456a3d3

0 commit comments

Comments
 (0)