yara/rules/Windows_Ransomware_Ragnarok.yar (92 lines of code) (raw):
rule Windows_Ransomware_Ragnarok_1cab7ea1 : beta {
meta:
author = "Elastic Security"
id = "1cab7ea1-8d26-4478-ab41-659c193b5baa"
fingerprint = "e2a8eabb08cb99c4999e05a06d0d0dce46d7e6375a72a6a5e69d718c3d54a3ad"
creation_date = "2020-05-03"
last_modified = "2021-08-23"
description = "Identifies RAGNAROK ransomware"
threat_name = "Windows.Ransomware.Ragnarok"
reference = "https://twitter.com/malwrhunterteam/status/1256263426441125888?s=20"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$c1 = ".ragnarok" ascii wide fullword
condition:
1 of ($c*)
}
rule Windows_Ransomware_Ragnarok_7e802f95 : beta {
meta:
author = "Elastic Security"
id = "7e802f95-964e-4dd9-a5d1-13a6cd73d750"
fingerprint = "c62b3706a2024751f1346d0153381ac28057995cf95228e43affc3d1e4ad0fad"
creation_date = "2020-05-03"
last_modified = "2021-08-23"
description = "Identifies RAGNAROK ransomware"
threat_name = "Windows.Ransomware.Ragnarok"
reference = "https://twitter.com/malwrhunterteam/status/1256263426441125888?s=20"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$d1 = { 68 04 94 42 00 FF 35 A0 77 43 00 }
$d2 = { 68 90 94 42 00 FF 35 A0 77 43 00 E8 8F D6 00 00 8B 40 10 50 }
condition:
1 of ($d*)
}
rule Windows_Ransomware_Ragnarok_efafbe48 : beta {
meta:
author = "Elastic Security"
id = "efafbe48-7740-4c21-b585-467f7ad76f8d"
fingerprint = "a1535bc01756ac9e986eb564d712b739df980ddd61cfde5a7b001849a6b07b57"
creation_date = "2020-05-03"
last_modified = "2021-08-23"
description = "Identifies RAGNAROK ransomware"
threat_name = "Windows.Ransomware.Ragnarok"
reference = "https://twitter.com/malwrhunterteam/status/1256263426441125888?s=20"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "cmd_firewall" ascii fullword
$a2 = "cmd_recovery" ascii fullword
$a3 = "cmd_boot" ascii fullword
$a4 = "cmd_shadow" ascii fullword
$a5 = "readme_content" ascii fullword
$a6 = "readme_name" ascii fullword
$a8 = "rg_path" ascii fullword
$a9 = "cometosee" ascii fullword
$a10 = "&prv_ip=" ascii fullword
condition:
6 of ($a*)
}
rule Windows_Ransomware_Ragnarok_5625d3f6 : beta {
meta:
author = "Elastic Security"
id = "5625d3f6-7071-4a09-8ddf-faa2d081b539"
fingerprint = "5c0a4e2683991929ff6307855bf895e3f13a61bbcc6b3c4b47d895f818d25343"
creation_date = "2020-05-03"
last_modified = "2021-08-23"
description = "Identifies RAGNAROK ransomware"
threat_name = "Windows.Ransomware.Ragnarok"
reference = "https://twitter.com/malwrhunterteam/status/1256263426441125888?s=20"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$b1 = "prv_ip" ascii fullword
$b2 = "%i.%i.%i" ascii fullword
$b3 = "pub_ip" ascii fullword
$b4 = "cometosee" ascii fullword
condition:
all of ($b*)
}