Skip to content

Commit b4df3a7

Browse files
Update third-party rules as of 2025-11-14 (#1213)
Co-authored-by: Update third-party rules <41898282+github-actions[bot]@users.noreply.github.com>
1 parent 718dd18 commit b4df3a7

File tree

8 files changed

+117
-5
lines changed

8 files changed

+117
-5
lines changed

third_party/yara/JPCERT/RELEASE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1b8b09eff1eaccd062993a31469158fdb5c34a06
1+
9315b430b0dbbb0db4da9196373ec8e26a538608
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
rule Lazarus_OtterCookie_downloader {
2+
meta:
3+
description = "OtterCookie downloader"
4+
author = "JPCERT/CC Incident Response Group"
5+
created_date = "2025-04-02"
6+
updated_date = "2025-04-02"
7+
hash = "62f796ddbbd7670d7a58ecfde9a5440e4e07ca7c7fa23e6a164746ef7c55fce2"
8+
hash = "4ca9ff33010f1f48b3a59c603fc7491071414fb4c6101215aab8b4b88a6b5cbf"
9+
10+
strings:
11+
$str1 = { 6d 6f 64 75 6c 65 2e 65 78 70 6f 72 74 73 20 3d 20 20 7b 20 64 6f 6d 61 69 6e 2c 20 73 75 62 64 6f 6d 61 69 6e 2c 20 69 64 20 7d }
12+
$str2 = "const domain =" ascii
13+
$str3 = "const subdomain =" ascii
14+
15+
condition:
16+
all of them
17+
}
18+
19+
rule Lazarus_OtterCookie_js {
20+
meta:
21+
description = "OtterCookie downloader js"
22+
author = "JPCERT/CC Incident Response Group"
23+
created_date = "2025-04-02"
24+
updated_date = "2025-04-02"
25+
hash = "71d2fd0c71b44331e08f11a254e7acc2cec3067dbd8f4848d5ef11e5a59ea253"
26+
27+
strings:
28+
$str1 = "const GET_RPCNODE_URL = `${domain}/${subdomain}/${id}`;" ascii
29+
$str2 = "axios.get(GET_RPCNODE_URL)" ascii
30+
$str3 = "catch(err=>eval(err.response.data));" ascii
31+
32+
condition:
33+
all of them
34+
}
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
rule malware_GETRdoor {
2+
meta:
3+
description = "ELF backdoor targeting FortiGate"
4+
author = "JPCERT/CC Incident Response Group"
5+
hash = "9da731d152c57e90cc95bc58aa55c0873005a747fda0d45529e964bdbc9dc18c"
6+
created_date = "2025-11-14"
7+
updated_date = "2025-11-14"
8+
9+
strings:
10+
$s1 = "do_upload: file open failed" ascii
11+
$s2 = "/bin/snifferd" ascii
12+
$s3 = "tcp[(tcp[12]>>2):%d] = 0x%s" ascii
13+
$s4 = {00 34 37 34 35 35 34 35 32 00} // 47455452
14+
$s5 = "diagnose debug crashlog clear" ascii
15+
$s6 = {00 0A 30 78 30 30 30 30 00} // \n0x0000
16+
17+
condition:
18+
3 of them
19+
}

third_party/yara/JPCERT/pangolin8rat.yara

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11

22
rule malware_Pangolin8RAT {
33
meta:
4-
description = "Hunt GobLoaderScript"
4+
description = "Hunt Pangolin8RAT"
55
author = "JPCERT/CC Incident Response Group"
66
hash = "F95441B1CD6399887E99DBE6AA0CEB0CA907E8175192E71F8F1A4CCA49E8FC82"
77

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
rule malware_STONEMITE {
2+
meta:
3+
description = "STONEMITE RAT"
4+
author = "JPCERT/CC Incident Response Group"
5+
hash = "da1b52f8f3d2f99abf17790a2eb932f7db3c70bb71af89a5eff2e59540c9f78c"
6+
created_date = "2025-11-14"
7+
updated_date = "2025-11-14"
8+
9+
strings:
10+
$s1 = {3D 27 07 00 00 75 ?? 6A 00 6A 00 68 28 07 00 00 FF 75 ?? E8}
11+
$s2 = "POST /%s HTTP/1.1" ascii
12+
$s3 = "User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.90 Safari/537.36" ascii
13+
14+
condition:
15+
all of them
16+
}
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
rule malware_VeletrixLoader {
2+
meta:
3+
description = "Veletrix Loader"
4+
author = "JPCERT/CC Incident Response Group"
5+
hash = "253ff072d71caeb02ed596fd6aa266e625f51a09d49d82726a11b66218bdd6c3"
6+
created_date = "2025-10-16"
7+
updated_date = "2025-10-16"
8+
9+
strings:
10+
$logfile = {
11+
C7 45 ?? 6C 6F 67 5F
12+
48 8D 4D ??
13+
C7 45 ?? 64 65 2E 00
14+
C7 85 ?? ?? ?? ?? 6C 6F 67 00
15+
}
16+
17+
$xor_decode = {
18+
41 8D 0C 30
19+
45 03 C6
20+
80 34 39 99
21+
44 3B C0
22+
}
23+
24+
condition:
25+
all of them
26+
}
27+
28+
rule malware_VeletrixLoader_python {
29+
meta:
30+
description = "Veletrix Loader"
31+
author = "JPCERT/CC Incident Response Group"
32+
hash = "96fe34f367423a1ca75e0e0b293ef4918ca30f5efcb36c9b67dec746493f3b37"
33+
created_date = "2025-10-16"
34+
updated_date = "2025-10-16"
35+
36+
strings:
37+
$msg = "执行Shellcode(生产环境需极度谨慎!)" ascii
38+
$func = "def run_shellcode(shellcode)" ascii
39+
$shell = "\\x64\\x65\\x2e\\x00\\xc7" ascii
40+
41+
condition:
42+
2 of them
43+
}

third_party/yara/bartblaze/RELEASE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
5f691e0d7d423a58d2217d5c08fa2f1c00b75a93
1+
a88bd98592ea6dd57da61bbcb8de76eb8cbf33b6

third_party/yara/bartblaze/generic/LNK_Ruleset.yar

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ private rule isLNK
88
version = "1.0"
99
creation_date = "2020-01-01"
1010
first_imported = "2021-12-30"
11-
last_modified = "2021-12-30"
11+
last_modified = "2025-11-14"
1212
status = "RELEASED"
1313
sharing = "TLP:WHITE"
1414
source = "BARTBLAZE"
@@ -54,7 +54,7 @@ rule PS_in_LNK
5454
$ = "bypass" ascii wide nocase
5555
5656
condition:
57-
isLNK and any of them
57+
isLNK and 2 of them
5858
}
5959

6060
rule Script_in_LNK

0 commit comments

Comments
 (0)