yara/rules/Windows_Wiper_HermeticWiper.yar (25 lines of code) (raw):
rule Windows_Wiper_HermeticWiper_7206a969 {
meta:
author = "Elastic Security"
id = "7206a969-bbd6-4c2d-a19d-380b71a4ab08"
fingerprint = "e3486c785f99f4376d4161704afcaf61e8a5ab6101463a76d134469f8a5581bf"
creation_date = "2022-02-24"
last_modified = "2022-02-24"
threat_name = "Windows.Wiper.HermeticWiper"
reference = "https://www.elastic.co/security-labs/elastic-protects-against-data-wiper-malware-targeting-ukraine-hermeticwiper"
reference_sample = "1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "\\\\?\\C:\\Windows\\System32\\winevt\\Logs" wide fullword
$a2 = "\\\\.\\EPMNTDRV\\%u" wide fullword
$a3 = "tdrv.pdb" ascii fullword
$a4 = "%s%.2s" wide fullword
$a5 = "ccessdri" ascii fullword
$a6 = "Hermetica Digital"
condition:
all of them
}