yara/rules/Windows_Trojan_Rhadamanthys.yar (132 lines of code) (raw):
rule Windows_Trojan_Rhadamanthys_21b60705 {
meta:
author = "Elastic Security"
id = "21b60705-9696-43ba-a820-d8ab9c34cca2"
fingerprint = "8a756bf4a8c9402072531aca2c29a382881c1808a790432ccac2240b35c09383"
creation_date = "2023-03-19"
last_modified = "2023-04-23"
threat_name = "Windows.Trojan.Rhadamanthys"
reference_sample = "3ba97c51ba503fa4bdcfd5580c75436bc88794b4ae883afa1d92bb0b2a0f5efe"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "Session\\%u\\MSCTF.Asm.{%08lx-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x}" wide fullword
$a2 = "MSCTF.Asm.{%08lx-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x}" wide fullword
$a3 = " \"%s\",Options_RunDLL %s" wide fullword
$a4 = "%%TEMP%%\\vcredist_%05x.dll" wide fullword
$a5 = "%%APPDATA%%\\vcredist_%05x.dll" wide fullword
$a6 = "TEQUILABOOMBOOM" wide fullword
$a7 = "%Systemroot%\\system32\\rundll32.exe" wide fullword
condition:
4 of them
}
rule Windows_Trojan_Rhadamanthys_1da1c2c2 {
meta:
author = "Elastic Security"
id = "1da1c2c2-90ea-4f76-aa38-666934c0aa68"
fingerprint = "7b3830373b773be03dc6d0f030595f625a2ef0b6a83312a5b0a958c0d2e5b1c0"
creation_date = "2023-03-28"
last_modified = "2023-04-23"
threat_name = "Windows.Trojan.Rhadamanthys"
reference_sample = "9bfc4fed7afc79a167cac173bf3602f9d1f90595d4e41dab68ff54973f2cedc1"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "%s\\tdata\\key_datas" wide fullword
$a2 = "\\config\\loginusers.vdf" wide fullword
$a3 = "/bin/KeePassHax.dll" ascii fullword
$a4 = "%%APPDATA%%\\ns%04x.dll" wide fullword
$a5 = "\\\\.\\pipe\\{%08lx-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x}" wide fullword
$a6 = " /s /n /i:\"%s,%u,%u,%u\" \"%s\"" wide fullword
$a7 = "strbuf(%lx) reallocs: %d, length: %d, size: %d" ascii fullword
$a8 = "SOFTWARE\\FTPWare\\CoreFTP\\Sites\\%s" wide fullword
condition:
6 of them
}
rule Windows_Trojan_Rhadamanthys_ae00f48c {
meta:
author = "Elastic Security"
id = "ae00f48c-f420-4a23-aae7-6f2bde29593c"
fingerprint = "8e3d13998a8e512aabf15534d61c06e0c6c51a4e8e46456538c654694310e670"
creation_date = "2023-05-05"
last_modified = "2023-06-13"
threat_name = "Windows.Trojan.Rhadamanthys"
reference_sample = "56b5ff5132ec1c5836223ced287d51a9ecee8d2b081f449245e136b1262a8714"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 75 30 8B 51 28 8B 41 2C 85 DB 74 03 89 53 28 85 D2 74 15 39 }
$a2 = { 3C 65 74 50 3C 68 74 2A 3C 6E }
$a3 = { 49 74 39 49 74 2D 49 49 74 29 49 49 74 25 49 49 74 }
condition:
all of them
}
rule Windows_Trojan_Rhadamanthys_cf5dd2e2 {
meta:
author = "Elastic Security"
id = "cf5dd2e2-a505-4927-8653-3c9addd3ac90"
fingerprint = "3b2bdfd45a11649deb3430044c7b707aebcf74a3745398e3db09a7465fa62a6c"
creation_date = "2024-04-03"
last_modified = "2024-05-08"
threat_name = "Windows.Trojan.Rhadamanthys"
reference_sample = "39ccc224c2c6d89d0bce3d9e2c677465cbc7524f2d2aa903f79ad26b340dec3d"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 33 D2 49 8B C4 49 83 C4 57 48 F7 F7 41 8A C2 46 0F B6 04 1A 33 D2 42 8D 4C 05 00 C1 E9 03 F6 E9 8A C8 49 8B C0 41 C0 E8 05 }
$a2 = { 8A 04 19 32 03 88 04 1A 48 83 C3 01 48 83 EF 01 }
$a3 = { 4C 01 27 48 8B 0F 48 8B 47 10 C6 04 01 00 48 83 07 01 48 8B 0F 48 8B 47 10 }
$a4 = { 69 F6 93 01 00 01 0F B6 C0 48 83 C1 01 33 F0 8A 01 84 C0 }
condition:
2 of them
}
rule Windows_Trojan_Rhadamanthys_c4760266 {
meta:
author = "Elastic Security"
id = "c4760266-bbff-4428-a7a5-bca7513c7993"
fingerprint = "53a04d385ef3a59b76500effaf740cd0e7d825ea5515f871097d82899b0cfc44"
creation_date = "2024-06-05"
last_modified = "2024-06-12"
threat_name = "Windows.Trojan.Rhadamanthys"
reference_sample = "05074675b07feb8e7556c5af449f5e677e0fabfb09b135971afbb11743bf3165"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a = { 55 8B EC 83 EC 14 83 7D 08 00 53 8B D8 74 50 56 57 8B 7D 0C 6A 10 2B FB 5E 56 8D 45 EC 53 50 ?? ?? ?? ?? ?? 83 C4 0C 90 8B 4D 10 8B C3 2B CB 89 75 FC 8A 14 07 32 10 88 14 01 40 FF 4D FC 75 F2 }
condition:
all of them
}
rule Windows_Trojan_Rhadamanthys_baba80fb {
meta:
author = "Elastic Security"
id = "baba80fb-1d8a-424c-98e2-904c8f2e4f09"
fingerprint = "71d9345d0288bfbbf7305962e5e316801d4a5cba332c5f4167f8e4f39cff6f61"
creation_date = "2024-01-24"
last_modified = "2025-02-23"
threat_name = "Windows.Trojan.Rhadamanthys"
reference_sample = "dd22cb2318d66fa30702368a7f06e445fba4b69daf9c45f8e83562d2c170a073"
severity = 50
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 83 EC 0C 8B 4D 0C 53 56 57 8B 59 20 8D 71 20 8B F9 89 75 FC 85 DB 89 7D 0C 75 05 8B 59 24 EB 0C 8D 41 24 89 45 F8 8B 00 85 C0 75 30 8B 51 28 8B 41 2C 85 DB 74 03 89 53 28 85 D2 74 15 }
condition:
all of them
}