yara/rules/Windows_Trojan_ShelbyLoader.yar (25 lines of code) (raw):
rule Windows_Trojan_ShelbyLoader_ca4d5de6 {
meta:
author = "Elastic Security"
id = "ca4d5de6-1b4f-4c5b-97aa-1d432aa870f7"
fingerprint = "95a2cf5388aa07c434ad23ed9e96cfa5c80a2eff030ccf48169142a28fbb63ee"
creation_date = "2025-03-11"
last_modified = "2025-03-25"
threat_name = "Windows.Trojan.ShelbyLoader"
reference_sample = "0354862d83a61c8e69adc3e65f6e5c921523eff829ef1b169e4f0f143b04091f"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a0 = "[WARN] Unusual parent process detected: "
$a1 = "[ERROR] Exception in CheckParentProcess:" fullword
$a2 = "[INFO] Sandbox Not Detected by CheckParentProcess" fullword
$b0 = { 22 63 6F 6E 74 65 6E 74 22 3A 20 22 2E 2B 3F 22 }
$b1 = { 22 73 68 61 22 3A 20 22 2E 2B 3F 22 }
$b2 = "Persist ID: " fullword
$b3 = "https://api.github.com/repos/" fullword
condition:
all of ($a*) or all of ($b*)
}