hancitor/hancitor.yar (20 lines of code) (raw):
rule hancitor
{
meta:
description = "URL arguments for Hancitor unpacked samples"
os = "Windows"
category_type = "Trojan"
family = "Hancitor"
threat_name = "Windows.Trojan.Hancitor"
author = "Myrtus0x0"
created = "2021-05-01"
type = "malware.stealer/malware.downloader"
tlp = "clear"
rev = 1
strings:
$url_args_64 = "GUID=%I64u&BUILD=%s&INFO=%s&EXT=%s&IP=%s&TYPE=1&WIN=%d.%d(x64)" ascii wide fullword
$url_args_32 = "GUID=%I64u&BUILD=%s&INFO=%s&EXT=%s&IP=%s&TYPE=1&WIN=%d.%d(x32)" ascii wide fullword
condition:
uint16(0) == 0x5A4D and
all of them
}