yara/rules/Windows_Trojan_Guloader.yar (68 lines of code) (raw):

rule Windows_Trojan_Guloader_8f10fa66 { meta: author = "Elastic Security" id = "8f10fa66-a24b-4cc2-b9e0-11be14aba9af" fingerprint = "5841d70a38d4620c446427c80ca12b5e918f23e90c5288854943b0240958bcfb" creation_date = "2021-08-17" last_modified = "2021-10-04" threat_name = "Windows.Trojan.Guloader" reference = "https://www.elastic.co/security-labs/getting-gooey-with-guloader-downloader" reference_sample = "a3e2d5013b80cd2346e37460753eca4a4fec3a7941586cc26e049a463277562e" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "msvbvm60.dll" wide fullword $a2 = "C:\\Program Files\\qga\\qga.exe" ascii fullword $a3 = "C:\\Program Files\\Qemu-ga\\qemu-ga.exe" ascii fullword $a4 = "USERPROFILE=" wide fullword $a5 = "Startup key" ascii fullword condition: all of them } rule Windows_Trojan_Guloader_c4d9dd33 { meta: author = "Elastic Security" id = "c4d9dd33-b7e7-4ff4-a2f3-62316d064f5a" fingerprint = "53a2d6f895cdd1a6384a55756711d9d758b3b20dd0b87d62a89111fd1a20d1d6" creation_date = "2021-08-17" last_modified = "2021-10-04" threat_name = "Windows.Trojan.Guloader" reference = "https://www.elastic.co/security-labs/getting-gooey-with-guloader-downloader" reference_sample = "a3e2d5013b80cd2346e37460753eca4a4fec3a7941586cc26e049a463277562e" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "This program cannot be run under virtual environment or debugging software !" ascii fullword condition: all of them } rule Windows_Trojan_Guloader_2f1e44c8 { meta: author = "Elastic Security" id = "2f1e44c8-f269-4cd6-a516-8d9282ddcfbc" fingerprint = "b00255f8d7ce460ffc778e96f6101db753e8992d36ee75a25b48e32ac7817c58" creation_date = "2023-10-30" last_modified = "2023-11-02" threat_name = "Windows.Trojan.Guloader" reference = "https://www.elastic.co/security-labs/getting-gooey-with-guloader-downloader" reference_sample = "6ae7089aa6beaa09b1c3aa3ecf28a884d8ca84f780aab39902223721493b1f99" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $djb2_str_compare = { 83 C0 08 83 3C 04 00 0F 84 [4] 39 14 04 75 } $check_exception = { 8B 45 ?? 8B 00 38 EC 8B 58 ?? 84 FD 81 38 05 00 00 C0 } $parse_mem = { 18 00 10 00 00 83 C0 18 50 83 E8 04 81 00 00 10 00 00 50 } $hw_bp = { 39 48 0C 0F 85 [4] 39 48 10 0F 85 [4] 39 48 14 0F 85 [7] 39 48 18 } $scan_protection = { 39 ?? 14 8B [5] 0F 84 } condition: 2 of them }