File tree Expand file tree Collapse file tree 8 files changed +117
-5
lines changed
Expand file tree Collapse file tree 8 files changed +117
-5
lines changed Original file line number Diff line number Diff line change 1- 1b8b09eff1eaccd062993a31469158fdb5c34a06
1+ 9315b430b0dbbb0db4da9196373ec8e26a538608
Original file line number Diff line number Diff line change 1+ rule Lazarus_OtterCookie_downloader {
2+ meta :
3+ description = " OtterCookie downloader "
4+ author = " JPCERT/CC Incident Response Group "
5+ created_date = " 2025-04-02 "
6+ updated_date = " 2025-04-02 "
7+ hash = " 62f796ddbbd7670d7a58ecfde9a5440e4e07ca7c7fa23e6a164746ef7c55fce2 "
8+ hash = " 4ca9ff33010f1f48b3a59c603fc7491071414fb4c6101215aab8b4b88a6b5cbf "
9+
10+ strings :
11+ $ str1 = { 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 20 3d 20 20 7b 20 64 6f 6d 61 69 6e 2c 20 73 75 62 64 6f 6d 61 69 6e 2c 20 69 64 20 7d }
12+ $ str2 = " const domain = " ascii
13+ $ str3 = " const subdomain = " ascii
14+
15+ condition :
16+ all of them
17+ }
18+
19+ rule Lazarus_OtterCookie_js {
20+ meta :
21+ description = " OtterCookie downloader js "
22+ author = " JPCERT/CC Incident Response Group "
23+ created_date = " 2025-04-02 "
24+ updated_date = " 2025-04-02 "
25+ hash = " 71d2fd0c71b44331e08f11a254e7acc2cec3067dbd8f4848d5ef11e5a59ea253 "
26+
27+ strings :
28+ $ str1 = " const GET_RPCNODE_URL = `${domain}/${subdomain}/${id}`; " ascii
29+ $ str2 = " axios.get(GET_RPCNODE_URL) " ascii
30+ $ str3 = " catch(err=>eval(err.response.data)); " ascii
31+
32+ condition :
33+ all of them
34+ }
Original file line number Diff line number Diff line change 1+ rule malware_GETRdoor {
2+ meta :
3+ description = " ELF backdoor targeting FortiGate "
4+ author = " JPCERT/CC Incident Response Group "
5+ hash = " 9da731d152c57e90cc95bc58aa55c0873005a747fda0d45529e964bdbc9dc18c "
6+ created_date = " 2025-11-14 "
7+ updated_date = " 2025-11-14 "
8+
9+ strings :
10+ $ s1 = " do_upload: file open failed " ascii
11+ $ s2 = " /bin/snifferd " ascii
12+ $ s3 = " tcp[(tcp[12]>>2):%d] = 0x%s " ascii
13+ $ s4 = {00 34 37 34 35 35 34 35 32 00 } // 47455452
14+ $ s5 = " diagnose debug crashlog clear " ascii
15+ $ s6 = {00 0A 30 78 30 30 30 30 00 } // \n0x0000
16+
17+ condition :
18+ 3 of them
19+ }
Original file line number Diff line number Diff line change 11
22rule malware_Pangolin8RAT {
33 meta :
4- description = " Hunt GobLoaderScript "
4+ description = " Hunt Pangolin8RAT "
55 author = " JPCERT/CC Incident Response Group "
66 hash = " F95441B1CD6399887E99DBE6AA0CEB0CA907E8175192E71F8F1A4CCA49E8FC82 "
77
Original file line number Diff line number Diff line change 1+ rule malware_STONEMITE {
2+ meta :
3+ description = " STONEMITE RAT "
4+ author = " JPCERT/CC Incident Response Group "
5+ hash = " da1b52f8f3d2f99abf17790a2eb932f7db3c70bb71af89a5eff2e59540c9f78c "
6+ created_date = " 2025-11-14 "
7+ updated_date = " 2025-11-14 "
8+
9+ strings :
10+ $ s1 = {3D 27 07 00 00 75 ?? 6A 00 6A 00 68 28 07 00 00 FF 75 ?? E8 }
11+ $ s2 = " POST /%s HTTP/1.1 " ascii
12+ $ s3 = " User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.90 Safari/537.36 " ascii
13+
14+ condition :
15+ all of them
16+ }
Original file line number Diff line number Diff line change 1+ rule malware_VeletrixLoader {
2+ meta :
3+ description = " Veletrix Loader "
4+ author = " JPCERT/CC Incident Response Group "
5+ hash = " 253ff072d71caeb02ed596fd6aa266e625f51a09d49d82726a11b66218bdd6c3 "
6+ created_date = " 2025-10-16 "
7+ updated_date = " 2025-10-16 "
8+
9+ strings :
10+ $ logfile = {
11+ C7 45 ?? 6C 6F 67 5F
12+ 48 8D 4D ??
13+ C7 45 ?? 64 65 2E 00
14+ C7 85 ?? ?? ?? ?? 6C 6F 67 00
15+ }
16+
17+ $ xor_decode = {
18+ 41 8D 0C 30
19+ 45 03 C6
20+ 80 34 39 99
21+ 44 3B C0
22+ }
23+
24+ condition :
25+ all of them
26+ }
27+
28+ rule malware_VeletrixLoader_python {
29+ meta :
30+ description = " Veletrix Loader "
31+ author = " JPCERT/CC Incident Response Group "
32+ hash = " 96fe34f367423a1ca75e0e0b293ef4918ca30f5efcb36c9b67dec746493f3b37 "
33+ created_date = " 2025-10-16 "
34+ updated_date = " 2025-10-16 "
35+
36+ strings :
37+ $ msg = " 执行 Shellcode (生产环境需极度谨慎!) " ascii
38+ $ func = " def run_shellcode(shellcode) " ascii
39+ $ shell = " \\ x64 \\ x65 \\ x2e \\ x00 \\ xc7 " ascii
40+
41+ condition :
42+ 2 of them
43+ }
Original file line number Diff line number Diff line change 1- 5f691e0d7d423a58d2217d5c08fa2f1c00b75a93
1+ a88bd98592ea6dd57da61bbcb8de76eb8cbf33b6
Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ private rule isLNK
88 version = " 1.0 "
99 creation_date = " 2020-01-01 "
1010 first_imported = " 2021-12-30 "
11- last_modified = " 2021-12-30 "
11+ last_modified = " 2025-11-14 "
1212 status = " RELEASED "
1313 sharing = " TLP:WHITE "
1414 source = " BARTBLAZE "
@@ -54,7 +54,7 @@ rule PS_in_LNK
5454 $ = " bypass " ascii wide nocase
5555
5656 condition :
57- isLNK and any of them
57+ isLNK and 2 of them
5858 }
5959
6060rule Script_in_LNK
You can’t perform that action at this time.
0 commit comments