yara/rules/Windows_Trojan_Vidar.yar (110 lines of code) (raw):
rule Windows_Trojan_Vidar_9007feb2 {
meta:
author = "Elastic Security"
id = "9007feb2-6ad1-47b6-bae2-3379d114e4f1"
fingerprint = "8416b14346f833264e32c63253ea0b0fe28e5244302b2e1b266749c543980fe2"
creation_date = "2021-06-28"
last_modified = "2021-08-23"
threat_name = "Windows.Trojan.Vidar"
reference_sample = "34c0cb6eaf2171d3ab9934fe3f962e4e5f5e8528c325abfe464d3c02e5f939ec"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a = { E8 53 FF D6 50 FF D7 8B 45 F0 8D 48 01 8A 10 40 3A D3 75 F9 }
condition:
all of them
}
rule Windows_Trojan_Vidar_114258d5 {
meta:
author = "Elastic Security"
id = "114258d5-f05e-46ac-914b-1a7f338ccf58"
fingerprint = "9b4f7619e15398fcafc622af821907e4cf52964c55f6a447327738af26769934"
creation_date = "2021-06-28"
last_modified = "2021-08-23"
threat_name = "Windows.Trojan.Vidar"
reference_sample = "34c0cb6eaf2171d3ab9934fe3f962e4e5f5e8528c325abfe464d3c02e5f939ec"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "BinanceChainWallet" fullword
$a2 = "*wallet*.dat" fullword
$a3 = "SOFTWARE\\monero-project\\monero-core" fullword
$b1 = "CC\\%s_%s.txt" fullword
$b2 = "History\\%s_%s.txt" fullword
$b3 = "Autofill\\%s_%s.txt" fullword
condition:
1 of ($a*) and 1 of ($b*)
}
rule Windows_Trojan_Vidar_32fea8da {
meta:
author = "Elastic Security"
id = "32fea8da-b381-459c-8bf4-696388b8edcc"
fingerprint = "ebcced7b2924cc9cfe9ed5b5f84a8959e866a984f2b5b6e1ec5b1dd096960325"
creation_date = "2023-05-04"
last_modified = "2023-06-13"
threat_name = "Windows.Trojan.Vidar"
reference_sample = "6f5c24fc5af2085233c96159402cec9128100c221cb6cb0d1c005ced7225e211"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 4F 4B 58 20 57 65 62 33 20 57 61 6C 6C 65 74 }
$a2 = { 8B E5 5D C3 5E B8 03 00 00 00 5B 8B E5 5D C3 5E B8 08 00 00 }
$a3 = { 83 79 04 00 8B DE 74 08 8B 19 85 DB 74 62 03 D8 8B 03 85 C0 }
condition:
all of them
}
rule Windows_Trojan_Vidar_c374cd85 {
meta:
author = "Elastic Security"
id = "c374cd85-714b-47c5-8645-cc7918fa2ff1"
fingerprint = "4936566b7f3f8250b068aa8e4a9b745c3e9ce2fa35164a94e77b31068d3d6ebf"
creation_date = "2024-01-31"
last_modified = "2024-10-14"
threat_name = "Windows.Trojan.Vidar"
reference_sample = "1c677585a8b724332849c411ffe2563b2b753fd6699c210f0720352f52a6ab72"
severity = 50
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = { 83 EC 0C 53 8B 5E 74 39 9E 44 01 00 00 75 07 33 C0 E9 88 00 00 00 57 8B BE E0 00 00 00 85 FF 74 79 8B 8E E4 00 00 00 85 C9 74 6F 8B 86 44 01 00 00 8B D0 03 C7 8D 4C 01 F8 2B D3 89 4D }
condition:
all of them
}
rule Windows_Trojan_Vidar_65d3d7e5 {
meta:
author = "Elastic Security"
id = "65d3d7e5-2a5f-4434-8578-6ccaa4528086"
fingerprint = "249ba1f0078792d3b4cb61b6c7e902b327305a1398a3c88f1720ad8e6c30fe57"
creation_date = "2024-10-14"
last_modified = "2024-10-24"
threat_name = "Windows.Trojan.Vidar"
reference_sample = "83d7c2b437a5cbb314c457d3b7737305dadb2bc02d6562a98a8a8994061fe929"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$str_1 = "avghooka.dll" wide fullword
$str_2 = "api_log.dll" wide fullword
$str_3 = "babyfox.dll" ascii fullword
$str_4 = "vksaver.dll" ascii fullword
$str_5 = "delays.tmp" wide fullword
$str_6 = "\\Monero\\wallet.keys" ascii fullword
$str_7 = "wallet_path" ascii fullword
$str_8 = "Hong Lee" ascii fullword
$str_9 = "milozs" ascii fullword
condition:
6 of them
}