yara/rules/Windows_Trojan_SystemBC.yar (48 lines of code) (raw):

rule Windows_Trojan_SystemBC_5e883723 { meta: author = "Elastic Security" id = "5e883723-7eaa-4992-91de-abb0ffbba54e" fingerprint = "add95c1f4bb279c8b189c3d64a0c2602c73363ebfad56a4077119af148dd2d87" creation_date = "2022-03-22" last_modified = "2022-04-12" threat_name = "Windows.Trojan.SystemBC" reference_sample = "b432805eb6b2b58dd957481aa8a973be58915c26c04630ce395753c6a5196b14" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "GET /tor/rendezvous2/%s HTTP/1.0" ascii fullword $a2 = "https://api.ipify.org/" ascii fullword $a3 = "KEY-----" ascii fullword $a4 = "Host: %s" ascii fullword $a5 = "BEGINDATA" ascii fullword $a6 = "-WindowStyle Hidden -ep bypass -file \"" ascii fullword condition: all of them } rule Windows_Trojan_SystemBC_c1b58c2f { meta: author = "Elastic Security" id = "c1b58c2f-8bbf-4c03-9f53-13ab2fb081cc" fingerprint = "dfbf98554e7fb8660e4eebd6ad2fadc394fc2a4168050390370ec358f6af1c1d" creation_date = "2024-05-02" last_modified = "2024-05-08" threat_name = "Windows.Trojan.SystemBC" reference_sample = "016fc1db90d9d18fe25ed380606346ef12b886e1db0d80fe58c22da23f6d677d" severity = 100 arch_context = "x86" scan_context = "file, memory" license = "Elastic License v2" os = "windows" strings: $a1 = "GET %s HTTP/1.0" ascii fullword $a2 = "HOST1:" $a3 = "PORT1:" $a4 = "-WindowStyle Hidden -ep bypass -file \"" ascii fullword $a5 = "BEGINDATA" ascii fullword $a6 = "socks32.dll" ascii fullword condition: 5 of them }