@@ -22,35 +22,3 @@ rule Windows_Trojan_Gh0st_ee6de6bc {
2222 all of them
2323 }
2424
25- rule Windows_Trojan_Gh0st_9e4bb0ce {
26- meta :
27- author = " Elastic Security "
28- id = " 9e4bb0ce-b1ed-45dc-8d86-943eb76f0bb4 "
29- fingerprint = " 4fb0eafc58972ef6fef87a88e43ae320420d760f545a66aab28dc3a65f629631 "
30- creation_date = " 2025-05-08 "
31- last_modified = " 2025-05-27 "
32- threat_name = " Windows.Trojan.Gh0st "
33- reference_sample = " 2d93a17f04bf2fcd51c2142043af3840895ae7ba43909a26420c4879d214a3c3 "
34- severity = 100
35- arch_context = " x86 "
36- scan_context = " file, memory "
37- license = " Elastic License v2 "
38- os = " windows "
39- strings :
40- $ a1 = " PluginMe " ascii fullword
41- $ a2 = " \\ cmd.exe -Puppet " ascii fullword
42- $ a3 = " ERROR 1 " ascii fullword
43- $ a4 = " ERROR 2 " ascii fullword
44- $ a5 = " AYAgent.aye " ascii fullword
45- $ a6 = " mssecess.exe " ascii fullword
46- $ a7 = " shell \\ open \\ command " ascii fullword
47- $ a8 = " WinSta0 \\ Default " ascii fullword
48- $ a9 = { C6 44 24 ?? 53 C6 44 24 ?? 74 C6 44 24 ?? 61 C6 44 24 ?? 30 C6 44 24 ?? 5C }
49- $ a10 = { C6 44 24 ?? 41 C6 44 24 ?? 6C C6 44 24 ?? 69 C6 44 24 ?? 63 C6 44 24 ?? 61 C6 44 24 ?? 74 C6 44 24 ?? 69 }
50- $ a11 = { C6 44 24 ?? 2F C6 44 24 ?? 34 C6 44 24 ?? 2E C6 44 24 ?? 30 C6 44 24 ?? 20 C6 44 24 ?? 28 C6 44 24 ?? 63 }
51- $ a12 = " %c%c%c%c%c%c " ascii fullword
52- $ a13 = { 25 2D 32 34 73 20 25 2D 31 35 00 }
53- condition :
54- 5 of them
55- }
56-
0 commit comments