hancitor/hancitor.yar (20 lines of code) (raw):

rule hancitor { meta: description = "URL arguments for Hancitor unpacked samples" os = "Windows" category_type = "Trojan" family = "Hancitor" threat_name = "Windows.Trojan.Hancitor" author = "Myrtus0x0" created = "2021-05-01" type = "malware.stealer/malware.downloader" tlp = "clear" rev = 1 strings: $url_args_64 = "GUID=%I64u&BUILD=%s&INFO=%s&EXT=%s&IP=%s&TYPE=1&WIN=%d.%d(x64)" ascii wide fullword $url_args_32 = "GUID=%I64u&BUILD=%s&INFO=%s&EXT=%s&IP=%s&TYPE=1&WIN=%d.%d(x32)" ascii wide fullword condition: uint16(0) == 0x5A4D and all of them }