asyncrat/asyncrat.yar (44 lines of code) (raw):
rule asyncrat
{
meta:
description = "ASyncRAT"
os = "Windows"
category_type = "Trojan"
family = "AsyncRAT"
threat_name = "Windows.Trojan.Asyncrat"
reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat"
reference_sample = "330493a1ba3c3903040c9542e6348fab"
author = "c3rb3ru5"
author = "JPCERT/CC Incident Response Group"
type = "malware.rat"
created = "2021-05-29"
tlp = "clear"
rev = 1
strings:
$magic_cslr_0 = "BSJB"
$salt = {
BF EB 1E 56 FB CD 97 3B B2 19 02 24 30 A5 78 43
00 3D 56 44 D2 1E 62 B9 D4 F1 80 E7 E6 C3 39 41
}
$b1 = { 00 00 00 0D 53 00 48 00 41 00 32 00 35 00 36 00 00 }
$b2 = { 09 50 00 6F 00 6E 00 67 00 00 }
$s1 = "pastebin" ascii wide nocase
$s2 = "pong" wide
$s3 = "Stub.exe" ascii wide
condition:
uint16(0) == 0x5a4d and
uint32(uint32(0x3c)) == 0x00004550 and
filesize < 2605056 and
$magic_cslr_0 and
(
$salt and
(
2 of ($s*) or
1 of ($b*)
)
) or
(
all of ($b*) and
2 of ($s*)
)
}