Skip to content

Commit c792768

Browse files
Update third-party rules as of 2025-11-07 (#1203)
Co-authored-by: Update third-party rules <41898282+github-actions[bot]@users.noreply.github.com>
1 parent ab3de57 commit c792768

File tree

3 files changed

+24
-33
lines changed

3 files changed

+24
-33
lines changed

third_party/yara/elastic/RELEASE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1c9bd9ee2bea7d2684951df058705f0e3142cd40
1+
c339a4ff1c0244fc2c6e916e6551bf672a25422a

third_party/yara/elastic/Windows_Trojan_Gh0st.yar

Lines changed: 0 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -22,35 +22,3 @@ rule Windows_Trojan_Gh0st_ee6de6bc {
2222
all of them
2323
}
2424

25-
rule Windows_Trojan_Gh0st_9e4bb0ce {
26-
meta:
27-
author = "Elastic Security"
28-
id = "9e4bb0ce-b1ed-45dc-8d86-943eb76f0bb4"
29-
fingerprint = "4fb0eafc58972ef6fef87a88e43ae320420d760f545a66aab28dc3a65f629631"
30-
creation_date = "2025-05-08"
31-
last_modified = "2025-05-27"
32-
threat_name = "Windows.Trojan.Gh0st"
33-
reference_sample = "2d93a17f04bf2fcd51c2142043af3840895ae7ba43909a26420c4879d214a3c3"
34-
severity = 100
35-
arch_context = "x86"
36-
scan_context = "file, memory"
37-
license = "Elastic License v2"
38-
os = "windows"
39-
strings:
40-
$a1 = "PluginMe" ascii fullword
41-
$a2 = "\\cmd.exe -Puppet" ascii fullword
42-
$a3 = "ERROR 1" ascii fullword
43-
$a4 = "ERROR 2" ascii fullword
44-
$a5 = "AYAgent.aye" ascii fullword
45-
$a6 = "mssecess.exe" ascii fullword
46-
$a7 = "shell\\open\\command" ascii fullword
47-
$a8 = "WinSta0\\Default" ascii fullword
48-
$a9 = { C6 44 24 ?? 53 C6 44 24 ?? 74 C6 44 24 ?? 61 C6 44 24 ?? 30 C6 44 24 ?? 5C }
49-
$a10 = { C6 44 24 ?? 41 C6 44 24 ?? 6C C6 44 24 ?? 69 C6 44 24 ?? 63 C6 44 24 ?? 61 C6 44 24 ?? 74 C6 44 24 ?? 69 }
50-
$a11 = { C6 44 24 ?? 2F C6 44 24 ?? 34 C6 44 24 ?? 2E C6 44 24 ?? 30 C6 44 24 ?? 20 C6 44 24 ?? 28 C6 44 24 ?? 63 }
51-
$a12 = "%c%c%c%c%c%c" ascii fullword
52-
$a13 = { 25 2D 32 34 73 20 25 2D 31 35 00 }
53-
condition:
54-
5 of them
55-
}
56-
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
rule Windows_Trojan_RoningLoader_a4e851ac {
2+
meta:
3+
author = "Elastic Security"
4+
id = "a4e851ac-7787-4f75-9aab-32c17c253c7a"
5+
fingerprint = "42d19ba97783f3807c096c1d1d5d17052530cc734d680c5baa8fc3c50cc10eee"
6+
creation_date = "2025-10-20"
7+
last_modified = "2025-11-03"
8+
threat_name = "Windows.Trojan.RoningLoader"
9+
reference_sample = "c84764a19543e9bdfe06263d3dd68bbf9df381bbe4d0c0da480bc4eddea293b6"
10+
severity = 100
11+
arch_context = "x86"
12+
scan_context = "file, memory"
13+
license = "Elastic License v2"
14+
os = "windows"
15+
strings:
16+
$binary0 = { 48 89 45 80 8B 05 C5 E8 0C 00 48 0F 47 4C 24 70 66 89 04 51 48 8D 44 24 70 66 44 89 6C 51 02 }
17+
$str0 = "Successfully created PPL process with PID: " wide fullword
18+
$str1 = "C:\\Windows\\System32\\ClipUp.exe" wide fullword
19+
$str2 = "regsvr32.exe /S"
20+
condition:
21+
$binary0 or all of ($str*)
22+
}
23+

0 commit comments

Comments
 (0)