yara/rules/Windows_Ransomware_Clop.yar (89 lines of code) (raw):

rule Windows_Ransomware_Clop_6a1670aa : beta { meta: author = "Elastic Security" id = "6a1670aa-7f78-455b-9e28-f39ed4c6476e" fingerprint = "7c24cc6a519922635a519dad412d1a07728317b91f90a120ccc1c7e7e2c8a002" creation_date = "2020-05-03" last_modified = "2021-08-23" description = "Identifies CLOP ransomware in unpacked state" threat_name = "Windows.Ransomware.Clop" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.clop" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $b1 = { FF 15 04 E1 40 00 83 F8 03 74 0A 83 F8 02 } condition: 1 of ($b*) } rule Windows_Ransomware_Clop_e04959b5 : beta { meta: author = "Elastic Security" id = "e04959b5-f3da-428d-8b56-8a9817fdebe0" fingerprint = "7367b90772ce6db0d639835a0a54a994ef8ed351b6dadff42517ed5fbc3d0d1a" creation_date = "2020-05-03" last_modified = "2021-08-23" description = "Identifies CLOP ransomware in unpacked state" threat_name = "Windows.Ransomware.Clop" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.clop" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "-%s\\CIopReadMe.txt" wide fullword $a2 = "CIopReadMe.txt" wide fullword $a3 = "%s-CIop^_" wide fullword $a4 = "%s%s.CIop" wide fullword $a5 = "BestChangeT0p^_-666" ascii fullword $a6 = ".CIop" wide fullword $a7 = "A%s\\ClopReadMe.txt" wide fullword $a8 = "%s%s.Clop" wide fullword $a9 = "CLOP#666" wide fullword $a10 = "MoneyP#666" wide fullword condition: 1 of ($a*) } rule Windows_Ransomware_Clop_9ac9ea3e : beta { meta: author = "Elastic Security" id = "9ac9ea3e-72e1-4151-a2f8-87869f5f98e3" fingerprint = "1cb0adb36e94ef8f8d74862250205436ed3694ed7719d8e639cfdd0c8632fd6c" creation_date = "2020-05-03" last_modified = "2021-08-23" description = "Identifies CLOP ransomware in unpacked state" threat_name = "Windows.Ransomware.Clop" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.clop" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $c1 = { 8B 1D D8 E0 40 00 33 F6 8B 3D BC E0 40 00 } condition: 1 of ($c*) } rule Windows_Ransomware_Clop_606020e7 : beta { meta: author = "Elastic Security" id = "606020e7-ce1a-4a48-b801-100fd22b3791" fingerprint = "5ec4e00ddf2cb1315ec7d62dd228eee0d9c15fafe4712933d42e868f83f13569" creation_date = "2020-05-03" last_modified = "2021-08-23" description = "Identifies CLOP ransomware in unpacked state" threat_name = "Windows.Ransomware.Clop" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.clop" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $d1 = { B8 E1 83 0F 3E F7 E6 8B C6 C1 EA 04 8B CA C1 E1 05 03 CA } condition: 1 of ($d*) }