yara/rules/Windows_Trojan_Netwire.yar (87 lines of code) (raw):
rule Windows_Trojan_Netwire_6a7df287 {
meta:
author = "Elastic Security"
id = "6a7df287-1656-4779-9a96-c0ab536ae86a"
fingerprint = "85051a0b94da4388eaead4c4f4b2d16d4a5eb50c3c938b3daf5c299c9c12f1e6"
creation_date = "2021-06-28"
last_modified = "2021-08-23"
threat_name = "Windows.Trojan.Netwire"
reference = "https://www.elastic.co/security-labs/netwire-dynamic-configuration-extraction"
reference_sample = "e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a = { 0F B6 74 0C 10 89 CF 29 C7 F7 C6 DF 00 00 00 74 09 41 89 F3 88 5C }
condition:
all of them
}
rule Windows_Trojan_Netwire_1b43df38 {
meta:
author = "Elastic Security"
id = "1b43df38-886e-4f58-954a-a09f30f19907"
fingerprint = "4142ea14157939dc23b8d1f5d83182aef3a5877d2506722f7a2706b7cb475b76"
creation_date = "2021-06-28"
last_modified = "2021-08-23"
threat_name = "Windows.Trojan.Netwire"
reference = "https://www.elastic.co/security-labs/netwire-dynamic-configuration-extraction"
reference_sample = "e6f446dbefd4469b6c4d24988dd6c9ccd331c8b36bdbc4aaf2e5fc49de2c3254"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "[%.2d/%.2d/%d %.2d:%.2d:%.2d]" fullword
$a2 = "\\Login Data"
$a3 = "SOFTWARE\\NetWire" fullword
condition:
2 of them
}
rule Windows_Trojan_Netwire_f85e4abc {
meta:
author = "Elastic Security"
id = "f85e4abc-f2d7-491b-a1ad-a59f287e5929"
fingerprint = "66cae88c9f8b975133d2b3af94a869244d273021261815b15085c638352bf2ca"
creation_date = "2022-08-14"
last_modified = "2022-09-29"
threat_name = "Windows.Trojan.Netwire"
reference = "https://www.elastic.co/security-labs/netwire-dynamic-configuration-extraction"
reference_sample = "ab037c87d8072c63dc22b22ff9cfcd9b4837c1fee2f7391d594776a6ac8f6776"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a = { C9 0F 44 C8 D0 EB 8A 44 24 12 0F B7 C9 75 D1 32 C0 B3 01 8B CE 88 44 }
condition:
all of them
}
rule Windows_Trojan_Netwire_f42cb379 {
meta:
author = "Elastic Security"
id = "f42cb379-ac8c-4790-a6d3-aad6dc4acef6"
fingerprint = "a52d2be082d57d07ab9bb9087dd258c29ef0528c4207ac6b31832f975a1395b6"
creation_date = "2022-08-14"
last_modified = "2022-09-29"
threat_name = "Windows.Trojan.Netwire"
reference = "https://www.elastic.co/security-labs/netwire-dynamic-configuration-extraction"
reference_sample = "ab037c87d8072c63dc22b22ff9cfcd9b4837c1fee2f7391d594776a6ac8f6776"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "http://%s%ComSpec" ascii fullword
$a2 = "%c%.8x%s" ascii fullword
$a3 = "%6\\6Z65dlNh\\YlS.dfd" ascii fullword
$a4 = "GET %s HTTP/1.1" ascii fullword
$a5 = "R-W65: %6:%S" ascii fullword
$a6 = "PTLLjPq %6:%S -qq9/G.y" ascii fullword
condition:
4 of them
}