-
Notifications
You must be signed in to change notification settings - Fork 119
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #411 from target/yara-compiled-fix
Safely Account for a YARA Compilation Failure
- Loading branch information
Showing
3 changed files
with
118 additions
and
30 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
48 changes: 48 additions & 0 deletions
48
src/python/strelka/tests/fixtures/test_elk_linux_torte.yara
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
/* | ||
This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as | ||
long as you use it under this license. | ||
*/ | ||
|
||
rule ELF_Linux_Torte : Linux ELF | ||
{ | ||
meta: | ||
author = "@mmorenog,@yararules" | ||
description = "Detects ELF Linux/Torte infection" | ||
ref = "http://blog.malwaremustdie.org/2016/01/mmd-0050-2016-incident-report-elf.html" | ||
hash1 = "1faf27f6b8e8a9cadb611f668a01cf73" | ||
hash2 = "cb0477445fef9c5f1a5b6689bbfb941e" | ||
|
||
strings: | ||
$s0 = "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6)" | ||
$s1 = "Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.7.6)" | ||
$s2 = "?sessd=" | ||
$s3 = "&sessc=" | ||
$s4 = "&sessk=" | ||
$s5 = "3a08fe7b8c4da6ed09f21c3ef97efce2" | ||
$s6 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/" | ||
$s7 = "_ZN11CThreadPool10getBatchesERSt6vectorISt4pairISsiESaIS2_EE" | ||
$s8 = "_ZNSs4_Rep10_M_destroyERKSaIcE@@GLIBCXX_3.4" | ||
$s9 = "_ZNSt6vectorImSaImEE13_M_insert_auxEN9__gnu_cxx17__normal_iteratorIPmS1_EERKm" | ||
$s10 = "_ZNSt6vectorISt4pairISsiESaIS1_EE13_M_insert_auxEN9__gnu_cxx17__normal_iteratorIPS1_S3_EERKS1_" | ||
$s11 = "_ZSt20__throw_out_of_rangePKc@@GLIBCXX_3.4" | ||
condition: | ||
is__elf and all of ($s*) | ||
} | ||
|
||
|
||
rule ELF_Linux_Torte_domains { | ||
meta: | ||
author = "@mmorenog,@yararules" | ||
description = "Detects ELF Linux/Torte infection" | ||
ref1 = "http://blog.malwaremustdie.org/2016/01/mmd-0050-2016-incident-report-elf.html" | ||
strings: | ||
$1 = "pages.touchpadz.com" ascii wide nocase | ||
$2 = "bat.touchpadz.com" ascii wide nocase | ||
$3 = "stat.touchpadz.com" ascii wide nocase | ||
$4 = "sk2.touchpadz.com" ascii wide nocase | ||
condition: | ||
any of them | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters