Skip to content

Commit cc1c7b6

Browse files
committed
fix: rules
1 parent fe5b60a commit cc1c7b6

3 files changed

+16
-6
lines changed

yara/apt_mal_ru_snake_may23.yar

+2-1
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,10 @@ rule APT_MAL_RU_WIN_Snake_Malware_May23_1 {
1919
author = "Matt Suiche (Magnet Forensics)"
2020
description = "Hunting Russian Intelligence Snake Malware"
2121
date = "2023-05-10"
22+
modified = "2025-03-21"
2223
threat_name = "Windows.Malware.Snake"
2324
reference = "https://media.defense.gov/2023/May/09/2003218554/-1/-1/0/JOINT_CSA_HUNTING_RU_INTEL_SNAKE_MALWARE_20230509.PDF"
24-
score = 75
25+
score = 70
2526
scan_context = "memory"
2627
license = "MIT"
2728

yara/gen_doc_follina.yar

+7-3
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1+
12
rule SUSP_PS1_Msdt_Execution_May22 {
23
meta:
34
description = "Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation"
45
author = "Nasreddine Bencherchali, Christian Burkard"
56
date = "2022-05-31"
6-
modified = "2022-07-08"
7+
modified = "2025-03-21"
78
reference = "https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e"
8-
score = 75
9-
id = "caa8a042-ffd4-52b2-a9f0-86e6c83a0aa3"
9+
score = 65
1010
strings:
1111
$a = "PCWDiagnostic" ascii wide fullword
1212
$sa1 = "msdt.exe" ascii wide
@@ -23,12 +23,16 @@ rule SUSP_PS1_Msdt_Execution_May22 {
2323
00 00 70 00 63 00 77 00 72 00 75 00 6E 00 2E 00
2424
65 00 78 00 65 00 }
2525
$fp2 = "FilesFullTrust" wide
26+
$fp3 = "Cisco Spark" ascii wide
27+
$fp4 = "author: " ascii
2628
condition:
2729
filesize < 10MB
2830
and $a
2931
and 1 of ($sa*)
3032
and 1 of ($sb*)
3133
and not 1 of ($fp*)
34+
// not JSON
35+
and not uint8(0) == 0x7B
3236
}
3337

3438
rule SUSP_Doc_WordXMLRels_May22 {

yara/vuln_paloalto_cve_2024_3400_apr24.yar

+7-2
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ rule SUSP_LNX_Base64_Exec_Apr24 : SCRIPT {
8383
description = "Detects suspicious base64 encoded shell commands (as seen in Palo Alto CVE-2024-3400 exploitation)"
8484
author = "Christian Burkard"
8585
date = "2024-04-18"
86-
modified = "2025-01-17"
86+
modified = "2025-03-21"
8787
reference = "Internal Research"
8888
score = 75
8989
id = "2da3d050-86b0-5903-97eb-c5f39ce4f3a3"
@@ -94,7 +94,12 @@ rule SUSP_LNX_Base64_Exec_Apr24 : SCRIPT {
9494
// $s4 = "/tmp/" base64 // prone to FPs
9595
9696
$mirai = "country="
97+
98+
$fp1 = "<html"
99+
$fp2 = "<?xml"
97100
condition:
98101
filesize < 800KB
99-
and 1 of ($s*) and not $mirai
102+
and 1 of ($s*)
103+
and not $mirai
104+
and not 1 of ($fp*)
100105
}

0 commit comments

Comments
 (0)