yara/rules/Windows_Ransomware_Ryuk.yar (152 lines of code) (raw):

rule Windows_Ransomware_Ryuk_25d3c5ba : beta { meta: author = "Elastic Security" id = "25d3c5ba-8f80-4af0-8a5d-29c974fb016a" fingerprint = "18e70599e3a187e77697844fa358dd150e7e25ac74060e8c7cf2707fb7304efd" creation_date = "2020-04-30" last_modified = "2021-08-23" description = "Identifies RYUK ransomware" threat_name = "Windows.Ransomware.Ryuk" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $g1 = { 41 8B C0 45 03 C7 99 F7 FE 48 63 C2 8A 4C 84 20 } condition: 1 of ($g*) } rule Windows_Ransomware_Ryuk_878bae7e : beta { meta: author = "Elastic Security" id = "878bae7e-1e53-4648-93aa-b4075eef256d" fingerprint = "93a501463bb2320a9ab824d70333da2b6f635eb5958d6f8de43fde3a21de2298" creation_date = "2020-04-30" last_modified = "2021-08-23" description = "Identifies RYUK ransomware" threat_name = "Windows.Ransomware.Ryuk" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $b2 = "RyukReadMe.html" wide fullword $b3 = "RyukReadMe.txt" wide fullword condition: 1 of ($b*) } rule Windows_Ransomware_Ryuk_6c726744 : beta { meta: author = "Elastic Security" id = "6c726744-acdb-443a-b683-b11f8b657f7a" fingerprint = "d0a4608907e48d02d78ff40a59d47cad1b9258df31b7312dd1a85f8fee2a28d5" creation_date = "2020-04-30" last_modified = "2021-08-23" description = "Identifies RYUK ransomware" threat_name = "Windows.Ransomware.Ryuk" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "172.16." ascii fullword $a2 = "192.168." ascii fullword $a3 = "DEL /F" wide fullword $a4 = "lsaas.exe" wide fullword $a5 = "delete[]" ascii fullword condition: 4 of ($a*) } rule Windows_Ransomware_Ryuk_1a4ad952 : beta { meta: author = "Elastic Security" id = "1a4ad952-cc99-4653-932b-290381e7c871" fingerprint = "d8c5162850e758e27439e808e914df63f42756c0b8f7c2b5f9346c0731d3960c" creation_date = "2020-04-30" last_modified = "2021-08-23" description = "Identifies RYUK ransomware" threat_name = "Windows.Ransomware.Ryuk" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $e1 = { 8B 0A 41 8D 45 01 45 03 C1 48 8D 52 08 41 3B C9 41 0F 45 C5 44 8B E8 49 63 C0 48 3B C3 72 E1 } condition: 1 of ($e*) } rule Windows_Ransomware_Ryuk_72b5fd9d : beta { meta: author = "Elastic Security" id = "72b5fd9d-23db-4f18-88d9-a849ec039135" fingerprint = "7c394aa283336013b74a8aaeb56e8363033958b4a1bd8011f3b32cfe2d37e088" creation_date = "2020-04-30" last_modified = "2021-08-23" description = "Identifies RYUK ransomware" threat_name = "Windows.Ransomware.Ryuk" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $d1 = { 48 2B C3 33 DB 66 89 1C 46 48 83 FF FF 0F } condition: 1 of ($d*) } rule Windows_Ransomware_Ryuk_8ba51798 : beta { meta: author = "Elastic Security" id = "8ba51798-15d7-4f02-97fa-1844465ae9d8" fingerprint = "8e284bc6015502577a6ddd140b9cd110fd44d4d2cb55d0fdec5bebf3356fd7b3" creation_date = "2020-04-30" last_modified = "2021-08-23" description = "Identifies RYUK ransomware" threat_name = "Windows.Ransomware.Ryuk" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $c1 = "/v \"svchos\" /f" wide fullword $c2 = "cmd /c \"WMIC.exe shadowcopy delet\"" ascii fullword $c3 = "lsaas.exe" wide fullword $c4 = "FA_Scheduler" wide fullword $c5 = "ocautoupds" wide fullword $c6 = "CNTAoSMgr" wide fullword $c7 = "hrmlog" wide fullword $c8 = "UNIQUE_ID_DO_NOT_REMOVE" wide fullword condition: 3 of ($c*) } rule Windows_Ransomware_Ryuk_88daaf8e : beta { meta: author = "Elastic Security" id = "88daaf8e-0bfe-46c4-9a75-2527d0e10538" fingerprint = "b1f218a9bc6bf5f3ec108a471de954988e7692de208e68d7d4ee205194cbbb40" creation_date = "2020-04-30" last_modified = "2021-08-23" description = "Identifies RYUK ransomware" threat_name = "Windows.Ransomware.Ryuk" reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $f1 = { 48 8B CF E8 AB 25 00 00 85 C0 74 35 } condition: 1 of ($f*) }