|
| 1 | +rule Windows_Trojan_BadIIS_2a604c44 { |
| 2 | + meta: |
| 3 | + author = "Elastic Security" |
| 4 | + id = "2a604c44-80ad-4b25-abdc-6f57074a3b37" |
| 5 | + fingerprint = "3568b0878dd8404aa5a99101c132b158cea015a5397a114a28fc2057258a6f24" |
| 6 | + creation_date = "2026-01-26" |
| 7 | + last_modified = "2026-02-02" |
| 8 | + threat_name = "Windows.Trojan.BadIIS" |
| 9 | + reference_sample = "1b723a5f9725b607926e925d1797f7ec9664bb308c9602002345485e18085b72" |
| 10 | + severity = 100 |
| 11 | + arch_context = "x86" |
| 12 | + scan_context = "file, memory" |
| 13 | + license = "Elastic License v2" |
| 14 | + os = "windows" |
| 15 | + strings: |
| 16 | + $a1 = { 48 FF C0 80 3C 01 00 75 F7 48 8B 72 08 } |
| 17 | + $a2 = { 0F 11 45 D8 4C 89 75 E8 4C 89 75 F0 4D 8B EE 4C 89 75 E8 41 BC } |
| 18 | + $a3 = { 49 8B C7 48 C1 E8 04 4C 8D 25 [2] 02 00 46 0F B6 } |
| 19 | + $a5 = { 48 8B 45 C7 48 83 F8 01 72 29 48 FF } |
| 20 | + $a6 = { 0F B6 44 37 FF 48 2B F8 } |
| 21 | + condition: |
| 22 | + 3 of them |
| 23 | +} |
| 24 | + |
| 25 | +rule Windows_Trojan_BadIIS_56117744 { |
| 26 | + meta: |
| 27 | + author = "Elastic Security" |
| 28 | + id = "56117744-f09a-4efa-bfc6-0f2273e6025c" |
| 29 | + fingerprint = "d83da4a12e47bf898a4150b2c2c4c2815f9bcf59e48ea7cd416ff2a8382580ba" |
| 30 | + creation_date = "2026-01-26" |
| 31 | + last_modified = "2026-02-02" |
| 32 | + threat_name = "Windows.Trojan.BadIIS" |
| 33 | + reference_sample = "a69a5fe19eae825c463e83265f7bbe31d1e514176e11ba5f63c25351542c46b6" |
| 34 | + severity = 100 |
| 35 | + arch_context = "x86" |
| 36 | + scan_context = "file, memory" |
| 37 | + license = "Elastic License v2" |
| 38 | + os = "windows" |
| 39 | + strings: |
| 40 | + $a1 = "bing|google|naver" fullword |
| 41 | + $a2 = "bingbot|Googlebot|Yeti" fullword |
| 42 | + $a3 = "bingbot|Googlebot|coccocbot" fullword |
| 43 | + $a4 = "|split'.split('|'),0,{}))</script>\n" fullword |
| 44 | + $a5 = "iPhone|iPad|iPod|iOS|Android|uc|BlackBerry|HUAWEI" fullword |
| 45 | + $a6 = ".js|.css|.jpg|.jpeg|.png|.gif|.bmp|.ico|.svg|.tif|.pict|.tiff|.swf" fullword |
| 46 | + $a7 = "tee|pat|and|app|poker|gam|sto|vid|bea|slo|fis|bac|pac|tig|bmw|fru|bull|card|gods|fish|mahj" fullword |
| 47 | + $a8 = "return||if|replace|while||13|eval|toString|String||new||RegExp|script|window|document||write|type|text|javascript|src" fullword |
| 48 | + condition: |
| 49 | + 4 of them |
| 50 | +} |
| 51 | + |
| 52 | +rule Windows_Trojan_BadIIS_71069efd { |
| 53 | + meta: |
| 54 | + author = "Elastic Security" |
| 55 | + id = "71069efd-75a4-4752-8b31-a8ac0a17cfc0" |
| 56 | + fingerprint = "e775c597c743e41dd11e4aedce991609d81764fd3b31ed29efcea1cc57fce81f" |
| 57 | + creation_date = "2026-01-26" |
| 58 | + last_modified = "2026-02-02" |
| 59 | + threat_name = "Windows.Trojan.BadIIS" |
| 60 | + reference_sample = "c5abe6936fe111bbded1757a90c934a9e18d849edd70e56a451c1547688ff96f" |
| 61 | + severity = 100 |
| 62 | + arch_context = "x86" |
| 63 | + scan_context = "file, memory" |
| 64 | + license = "Elastic License v2" |
| 65 | + os = "windows" |
| 66 | + strings: |
| 67 | + $a1 = "hm.baidu.com/hm.js" fullword |
| 68 | + $a2 = "googletagmanager.com/gtag/js?id" fullword |
| 69 | + $a3 = "</div>\n<a id=\"js-alert-btn\" class=\"alert-btn\" href=\"" fullword |
| 70 | + $a4 = "index.php?domain=" fullword |
| 71 | + $seq1 = { C7 45 C4 [4] C7 45 C8 04 00 00 00 C7 45 CC [4] C7 45 D0 04 00 00 00 } |
| 72 | + $seq2 = { C7 45 E8 07 00 00 00 C7 45 EC [4] C7 45 F0 04 00 00 00 C7 45 F4 [4] C7 45 F8 09 00 00 00 } |
| 73 | + condition: |
| 74 | + 2 of ($a*) and 1 of ($seq*) |
| 75 | +} |
| 76 | + |
0 commit comments