Skip to content

Instantly share code, notes, and snippets.

@Te-k
Created May 15, 2017 14:50
Show Gist options
  • Save Te-k/df742acd50fd5d176f44040d45646e82 to your computer and use it in GitHub Desktop.
Save Te-k/df742acd50fd5d176f44040d45646e82 to your computer and use it in GitHub Desktop.
APT32 ACtiveMime Lure yara rule by FireEye
rule APT32_ActiveMime_Lure {
meta:
filetype="MIME entity"
author="Ian Ahl (@TekDefense) and Nick Carr (@ItsReallyNick)"
date="2017-03-02"
description="Developed to detect APT32 (OceanLotus group) phishing lures used to target FireEye customers in 2016 and 2017"
strings:
$a1= "office_text" wide ascii
$a2= "schtasks /create /tn" wide ascii
$a3= "scrobj.dll" wide ascii
$a4= "new-object net.webclient" wide ascii
$a5= "GetUserName" wide ascii
$a6= "WSHnet.UserDomain" wide ascii
$a7= "WSHnet.UserName" wide ascii
condition:
4 of them
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment