Skip to content

Commit d31123f

Browse files
committed
Create apt_nobellium_rdp_phish.yar
1 parent 2c85e59 commit d31123f

File tree

1 file changed

+23
-0
lines changed

1 file changed

+23
-0
lines changed

yara/apt_nobellium_rdp_phish.yar

+23
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
2+
rule SUSP_RDP_File_Indicators_Oct24_1 {
3+
meta:
4+
description = "Detects characteristics found in malicious RDP files used as email attachments in spear phishing campaigns"
5+
author = "Florian Roth"
6+
reference = "https://thecyberexpress.com/rogue-rdp-files-used-in-ukraine-cyberattacks/"
7+
date = "2024-10-25"
8+
score = 75
9+
hash1 = "280fbf353fdffefc5a0af40c706377142fff718c7b87bc8b0daab10849f388d0"
10+
hash2 = "8b45f5a173e8e18b0d5c544f9221d7a1759847c28e62a25210ad8265f07e96d5"
11+
hash3 = "9b8cb8b01ce4eafb9204250a3c28bfaf70cc76a99ce411ad52bbf1aa2b6cce34"
12+
hash4 = "ba4d58f2c5903776fe47c92a0ec3297cc7b9c8fa16b3bf5f40b46242e7092b46"
13+
hash5 = "f357d26265a59e9c356be5a8ddb8d6533d1de222aae969c2ad4dc9c40863bfe8"
14+
strings:
15+
$s1 = "redirectclipboard:i:1" wide fullword
16+
$s2 = "redirectprinters:i:1" wide fullword
17+
$s3 = "remoteapplicationmode:i:1" wide fullword
18+
$s4 = "username:s:" wide
19+
$s5 = "emoteapplicationicon:s:C:\\Windows\\SystemApps" wide
20+
condition:
21+
filesize < 50KB
22+
and all of them
23+
}

0 commit comments

Comments
 (0)