yara/rules/Multi_Ransomware_BlackCat.yar (129 lines of code) (raw):
rule Multi_Ransomware_BlackCat_aaf312c3 {
meta:
author = "Elastic Security"
id = "aaf312c3-47b4-4dab-b7fc-8a2ac9883772"
fingerprint = "577c7f24a7ecf89a542e9a63a1744a129c96c32e8dccfbf779dd9fc6c0194930"
creation_date = "2022-02-02"
last_modified = "2023-09-20"
threat_name = "Multi.Ransomware.BlackCat"
reference_sample = "0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "multi"
strings:
$chacha20_enc = { EF D9 F3 0F 7F 14 3B F3 0F 7F 5C 3B 10 83 C7 20 39 F8 75 D0 8B }
$crc32_imp = { F3 0F 6F 02 66 0F 6F D1 66 0F 3A 44 CD 11 83 C0 F0 83 C2 10 66 0F 3A 44 D4 00 83 F8 0F 66 0F EF C8 66 0F EF CA }
condition:
all of them
}
rule Multi_Ransomware_BlackCat_00e525d7 {
meta:
author = "Elastic Security"
id = "00e525d7-a8a6-475f-89ad-607c452aea1e"
fingerprint = "631e30b8b51a5c0a0e91e8c09968663192569005b8bffff9f0474749788e9d57"
creation_date = "2022-02-02"
last_modified = "2022-08-16"
threat_name = "Multi.Ransomware.BlackCat"
reference_sample = "0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "multi"
strings:
$a1 = "ata\",\"boot\",\"config.msi\",\"google\",\"perflogs\",\"appdata\",\"windows.old\"],\"exclude_file_names\":[\"desktop.ini\",\"aut"
$a2 = "locker::core::windows::processvssadmin.exe delete shadows /all /quietshadow_copy::remove_all=" ascii fullword
$a3 = "\\\\.\\pipe\\__rust_anonymous_pipe1__." ascii fullword
$a4 = "--bypass-p-p--bypass-path-path --no-prop-servers \\\\" ascii fullword
condition:
all of them
}
rule Multi_Ransomware_BlackCat_c4b043e6 {
meta:
author = "Elastic Security"
id = "c4b043e6-ff5f-4492-94e3-fd688d690738"
fingerprint = "3e89858e90632ad5f4831427bd630252113b735c51f7a1aa1eab8ba6e4c16f18"
creation_date = "2022-09-12"
last_modified = "2022-09-29"
threat_name = "Multi.Ransomware.BlackCat"
reference_sample = "45b8678f74d29c87e2d06410245ab6c2762b76190594cafc9543fb9db90f3d4f"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "multi"
strings:
$a = { 28 4C 8B 60 08 4C 8B 68 10 0F 10 40 28 0F 29 44 24 10 0F 10 }
condition:
all of them
}
rule Multi_Ransomware_BlackCat_70171625 {
meta:
author = "Elastic Security"
id = "70171625-c29b-47c1-b572-2e6dc846a907"
fingerprint = "f3f70f92fe9c044f4565fca519cb04a3a54536985c2614077ef92c3193fff9c1"
creation_date = "2023-01-05"
last_modified = "2023-09-20"
threat_name = "Multi.Ransomware.BlackCat"
reference_sample = "0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "multi"
strings:
$str0 = "}RECOVER-${EXTENSION}-FILES.txt"
$str1 = "?access-key=${ACCESS_KEY}"
$str2 = "${NOTE_FILE_NAME}"
$str3 = "enable_network_discovery"
$str4 = "enable_set_wallpaper"
$str5 = "enable_esxi_vm_kill"
$str6 = "strict_include_paths"
$str7 = "exclude_file_path_wildcard"
$str8 = "${ACCESS_KEY}${EXTENSION}"
condition:
all of them
}
rule Multi_Ransomware_BlackCat_e066d802 {
meta:
author = "Elastic Security"
id = "e066d802-b803-4e35-9b53-ae1823662483"
fingerprint = "05037af3395b682d1831443757376064c873815ac4b6d1c09116715570f51f5d"
creation_date = "2023-07-27"
last_modified = "2023-09-20"
threat_name = "Multi.Ransomware.BlackCat"
reference_sample = "00360830bf5886288f23784b8df82804bf6f22258e410740db481df8a7701525"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "multi"
strings:
$a1 = "esxcli vm process kill --type=force --world-id=Killing"
$a2 = "vim-cmd vmsvc/snapshot.removeall $i"
$a3 = "File already has encrypted extension"
condition:
2 of them
}
rule Multi_Ransomware_BlackCat_0ffb0a37 {
meta:
author = "Elastic Security"
id = "0ffb0a37-e4c3-45be-bd4d-7033e88635aa"
fingerprint = "319b956ddd57bea22cbee7e521649969c5b1f42ee4af49ad6f25847fb8ee9559"
creation_date = "2023-07-29"
last_modified = "2024-06-12"
threat_name = "Multi.Ransomware.BlackCat"
reference_sample = "57136b118a0d6d3c71e522ea53e3305dae58b51f06c29cd01c0c28fa0fa34287"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "multi"
strings:
$a1 = { C8 C8 00 00 00 89 20 00 00 45 01 00 00 32 22 08 0A 20 64 85 }
$a2 = { 67 69 74 68 75 62 2E 63 6F 6D 2D 31 65 63 63 36 32 39 39 64 62 39 65 63 38 32 33 2F 73 69 6D 70 6C 65 6C 6F 67 2D }
condition:
all of them
}