Skip to content

Commit

Permalink
Updated Ursnif yara sig and fixed Injection issues to allow injected
Browse files Browse the repository at this point in the history
Ursnif payload extraction (thanks enzo, issue #13).
  • Loading branch information
kevoreilly committed Oct 30, 2017
1 parent 88ed5f9 commit 01634f9
Show file tree
Hide file tree
Showing 3 changed files with 12 additions and 3 deletions.
Binary file modified analyzer/windows/dll/Injection.dll
Binary file not shown.
Binary file modified analyzer/windows/dll/Injection_x64.dll
Binary file not shown.
15 changes: 12 additions & 3 deletions data/yara/CAPE/Ursnif.yar
Original file line number Diff line number Diff line change
@@ -1,13 +1,22 @@
rule Ursnif
{
meta:
author = "kevoreilly"
author = "kevoreilly & enzo"
description = "Ursnif Payload"
cape_type = "Ursnif Payload"
strings:
$a1 = {35 FC 58 85 CF A3 ?? ?? 40 00 E8}
$a2 = {8D 44 24 2C 50 C7 44 24 30 14 00 00 00 FF 15 ?? ?? 40 00 8B 44 24 3C 2B ?? 2B C7 03 44 24 38 50 E8 ?? ?? 00 00 8B 7C 24 38 8B}
$a3 = {33 C0 33 DB 88 5D E4 8D 7D E5 AB 66 AB 6A 08 AA 68 ?? ?? 40 00 8D 45 E4 50 89 75 F0 89 5D F8 FF 15 ?? ?? 40 00 8B 46 3C 03 C6 0F B7 50 14 0F B7 48 06 8D 44 02 18}
$b1 = "CBmWzIJQqV"
$b2 = "Software\\Microsoft\\WAB\\DLLPath"
$c1 = {48 8B C4 53 55 56 57 41 54 41 55 41 56 41 57 48 83 EC 48 48 8B 51 30 48 8B F9 48 85 D2 48 89 50 10}
$c2 = {8B 70 EC 33 70 F8 33 70 08 33 30 83 C0 04 33 F1 81 F6 B9 79 37 9E C1 C6 0B 89 70 08 41 81 F9 84 00 00 00 72 DB}
$d1 = "MSVCcvidMRLE"
condition:
uint16(0) == 0x5A4D and (all of ($a*))
}
uint16(0) == 0x5A4D and (all of ($a*)) or ((all of ($b*)) and (all of ($c*)) or (all of ($d*)))
}

0 comments on commit 01634f9

Please sign in to comment.