yara/rules/Windows_Trojan_Bitrat.yar (42 lines of code) (raw):

rule Windows_Trojan_Bitrat_34bd6c83 { meta: author = "Elastic Security" id = "34bd6c83-9a71-43d5-b0b1-1646a8fb66e8" fingerprint = "bc4a5fad1810ad971277a455030eed3377901a33068bb994e235346cfe5a524f" creation_date = "2021-06-13" last_modified = "2021-08-23" threat_name = "Windows.Trojan.Bitrat" reference_sample = "37f70ae0e4e671c739d402c00f708761e98b155a1eefbedff1236637c4b7690a" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "crd_logins_report" ascii fullword $a2 = "drives_get" ascii fullword $a3 = "files_get" ascii fullword $a4 = "shell_stop" ascii fullword $a5 = "hvnc_start_ie" ascii fullword condition: all of them } rule Windows_Trojan_Bitrat_54916275 { meta: author = "Elastic Security" id = "54916275-2a0f-4966-956d-7122a4aea9c8" fingerprint = "8758b1a839ff801170f6d4ae9186a69af6370f8081defdd25b62e50a3ddcffef" creation_date = "2022-08-29" last_modified = "2022-09-29" threat_name = "Windows.Trojan.Bitrat" reference_sample = "d3b2c410b431c006c59f14b33e95c0e44e6221b1118340c745911712296f659f" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = { 6A 10 68 50 73 78 00 E8 5F 4D 02 00 8B 7D 08 85 FF 75 0D FF 15 1C 00 6E 00 50 FF 15 68 03 6E 00 } condition: all of them }