rule VALUEVAULT_strings
{
meta:
author = "MITRE Engenuity"
date = "9/15/2022"
description = "This is a YARA rule to detect VALUEVAULT which will dump windows credentials."
source = "ATT&CK Evaluations Managed Services Round 1"
tool = "VALUEVAULT"
filename = "b.exe"
md5 = "a59b8539af98a6a6df7af4a771d05ea5"
strings:
$Func1 = "VaultOpenVault"
$Func2 = "VaultEnumerateItems"
$Func3 = "VaultGetItem"
$strWinUUID = "42c4f44b-8a9b-a041-b380-dd4a704ddb28"
$str1 = "\\AppData\\Roaming\\"
$str2 = "fsociety.dat"
condition:
uint16(0) == 0x5a4d and all of ($Func*) and any of ($str*)
}
rule RDAT_strings
{
meta:
author = "MITRE Engenuity"
date = "9/15/2022"
description = "Used to detect strings associated with RDAT"
description = "This is a YARA rule to detect RDAT which is used as a backdoor for exfiltration."
source = "ATT&CK Evaluations Managed Services Round 1"
tool = "RDAT"
filename = "rdat.exe"
md5 = "6b01fae7ed1e3fa854813667b334730b"
strings:
$APIa = "winhttp" nocase
$APIb = "ShellExecute"
$APIc = "LsaLogonUser"
$APId = "Crypt"
$APIe = "WSASocket"
$APIf = "AddFileAttachment"
$APIg = "SendAndSaveCopy"
$stringA = "guest.bmp"
$stringB = "bytesWritten"
$stringH = "icmp"
$stringI = "VerifySignature"
$stringJ = "EmailAddress"
//connects to EWS email server to send emails
$com = "Microsoft.Exchange.WebServices.dll"
$com2 = "RDAT.dll"
condition:
uint16(0) == 0x5a4d and any of ($string*) and all of ($API*) and all of ($com*)
}
rule SIDETWIST_dropper_strings
{
meta:
author = "MITRE Engenuity"
date = "9/15/2022"
description = "Used to detect strings associated with the dropper for SIDETWIST. This will only consist of the word doc and vbs script"
source = "ATT&CK Evaluations Managed Services Round 1"
filename = "Marketing_Materials.zip, GGMS Overview.doc"
md5 = "35b7a282617c4577480175f203c3d580"
strings:
$a = "DNS" nocase
$b = "Document_Close()"
$c = "B64"
$f = "Application.MouseAvailable"
$g = "UserForm1.TextBox1.Text"
$h = "writeFile"
$s2 = " targetSubfolder = \"System\" & \"Failure\" & \"Reporter\"" fullword ascii
condition:
all of ($*)
}
rule SIDETWIST_strings
{
meta:
author = "MITRE Engenuity"
date = "9/15/2022"
description = "Used to detect strings associated with SIDETWIST gathering information (backdoor) "
filename = "SystemFailureReporter.exe"
md5 = "651d63de08f4352d4ad5fcfdf1d4f0c1"
strings:
//SideTwist generates IDs to use for communications.
$Func1 = "GetComputerName"
$Func2 = "GetUserName"
//functionality of sidetwist
$s1 = "2>&1" //looking for command execution
$s2 = "base64"
$s3 = "\\SystemFailureReporter\\update.xml" fullword ascii
$s4 = "*/" fullword ascii
$s5 = "" fullword ascii
$s4 = "