Last active
August 1, 2024 09:08
-
-
Save Neo23x0/f1bb645a4f715cb499150c5a14d82b44 to your computer and use it in GitHub Desktop.
IDDQD - Godmode YARA Rule
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
WARNING: | |
the newest version of this rule is now hosted here: | |
https://github.com/Neo23x0/god-mode-rules/blob/master/godmode.yar | |
*/ | |
/* | |
_____ __ __ ___ __ | |
/ ___/__ ___/ / / |/ /__ ___/ /__ | |
/ (_ / _ \/ _ / / /|_/ / _ \/ _ / -_) | |
\___/\___/\_,_/_/_/__/_/\___/\_,_/\__/ | |
\ \/ / _ | / _ \/ _ | / _ \__ __/ /__ | |
\ / __ |/ , _/ __ | / , _/ // / / -_) | |
/_/_/ |_/_/|_/_/ |_| /_/|_|\_,_/_/\__/ | |
Florian Roth - v0.8.0 December 2023 - Merry Christmas! | |
The 'Godmode Rule' is a proof-of-concept YARA rule designed to | |
identify a wide range of security threats. It includes detections for | |
Mimikatz usage, Metasploit Meterpreter payloads, PowerShell obfuscation | |
and encoded payloads, various malware indicators, and specific hacking | |
tools. This rule also targets ransomware behaviors, such as | |
shadow copy deletion commands, and patterns indicative of crypto mining. | |
It's further enhanced to detect obfuscation techniques and signs of | |
advanced persistent threats (APTs), including unique strings from | |
well-known hacking tools and frameworks. | |
*/ | |
rule IDDQD_Godmode_Rule { | |
meta: | |
description = "Detects a wide array of cyber threats, from malware and ransomware to advanced persistent threats (APTs)" | |
author = "Florian Roth" | |
reference = "Internal Research - get a Godmode rule set with THOR by Nextron Systems" | |
date = "2019-05-15" | |
modified = "2023-12-23" | |
score = 60 | |
strings: | |
$ = "sekurlsa::logonpasswords" ascii wide nocase /* Mimikatz Command */ | |
$ = "ERROR kuhl" wide xor /* Mimikatz Error */ | |
$ = " -w hidden " ascii wide /* Power Shell Params */ | |
$ = "Koadic." ascii /* Koadic Framework */ | |
$ = "ReflectiveLoader" fullword ascii wide /* Generic - Common Export Name */ | |
$ = "%s as %s\\%s: %d" ascii xor /* CobaltStrike indicator */ | |
$ = "[System.Convert]::FromBase64String(" ascii /* PowerShell - Base64 encoded payload */ | |
$ = "/meterpreter/" ascii /* Metasploit Framework - Meterpreter */ | |
$ = / -[eE][decoman]{0,41} ['"]?(JAB|SUVYI|aWV4I|SQBFAFgA|aQBlAHgA|cgBlAG)/ ascii wide /* PowerShell encoded code */ | |
$ = / (sEt|SEt|SeT|sET|seT) / ascii wide /* Casing Obfuscation */ | |
$ = ");iex " nocase ascii wide /* PowerShell - compact code */ | |
$ = "Nir Sofer" fullword wide /* Hack Tool Producer */ | |
$ = "impacket." ascii /* Impacket Library */ | |
$ = /\[[\+\-!E]\] (exploit|target|vulnerab|shell|inject)/ nocase /* Hack Tool Output Pattern */ | |
$ = "0000FEEDACDC}" ascii wide /* Squiblydoo - Class ID */ | |
$ = "vssadmin delete shadows" ascii nocase /* Shadow Copy Deletion via vssadmin - often used in ransomware */ | |
$ = " shadowcopy delete" ascii wide nocase /* Shadow Copy Deletion via WMIC - often used in ransomware */ | |
$ = " delete catalog -quiet" ascii wide nocase /* Shadow Copy Deletion via wbadmin - often used in ransomware */ | |
$ = "stratum+tcp://" ascii wide /* Stratum Address - used in Crypto Miners */ | |
$ = /\\(Debug|Release)\\(Key[lL]og|[Ii]nject|Steal|By[Pp]ass|Amsi|Dropper|Loader|CVE\-)/ /* Typical PDB strings found in malware or hack tools */ | |
$ = /(Dropper|Bypass|Injection|Potato)\.pdb/ nocase /* Typical PDP strings found in hack tools */ | |
$ = "Mozilla/5.0" xor(0x01-0xff) ascii wide /* XORed Mozilla user agent - often found in implants */ | |
$ = "amsi.dllATVSH" ascii xor /* Havoc C2 */ | |
$ = "BeaconJitter" xor /* Sliver */ | |
$ = "main.Merlin" ascii fullword /* Merlin C2 */ | |
$ = { 48 83 EC 50 4D 63 68 3C 48 89 4D 10 } /* Brute Ratel C4 */ | |
$ = "}{0}\"-f " ascii /* PowerShell obfuscation - format string */ | |
$ = "HISTORY=/dev/null" ascii /* Linux HISTORY tampering - found in many samples */ | |
$ = " /tmp/x;" ascii /* Often used in malicious linux scripts */ | |
$ = /comsvcs(\.dll)?[, ]{1,2}(MiniDump|#24)/ /* Process dumping method using comsvcs.dll's MiniDump */ | |
$ = "AmsiScanBuffer" ascii wide base64 /* AMSI Bypass */ | |
$ = "AmsiScanBuffer" xor(0x01-0xff) /* AMSI Bypass */ | |
$ = "%%%%%%%%%%%######%%%#%%####% &%%**#" ascii wide xor /* SeatBelt */ | |
condition: | |
1 of them | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
False positive on Avira antivirus. https://www.virustotal.com/gui/file/b8ec0b5e43c165b1a244691350172843fa06f083cbc0888f9c138cd7107e1dec/community Also on more dll.