地区

亚洲

中东

StrongPity

初始载荷

Exfiltrate模块(全版本)

  1. import "pe"
  2. rule APT_StrongPity_Exfiltrate
  3. {
  4. meta:
  5. author = "建瓯最坏"
  6. description = "写于2020-12-25,StrongPity,Exfiltrate模块,联网插件"
  7. V16 = "90B4DF284BD28909047D179F7A0A3391"
  8. V20 = "C5CBD6A7DE703AB24C7AAE8D3B0BF38F"
  9. V21 = "ACD4A1BFD4F08DD799B09496CDA32AF3"
  10. V22 = "81390CE601D34F384BFF9198EEF793A9"
  11. strings:
  12. //版本号标识,格式如"v33_kt33p3"
  13. $HexVerNumV = { 6A 76 }
  14. $HexVerNumUnderscore = { 6A 5F }
  15. $HexVerNumK = { 6A 6B }
  16. $HexVerNumP = { 6A 70 }
  17. $StringsName = "name=%ls" nocase
  18. $StringsDel = "delete=" nocase
  19. //有些版本SFT字符串被加密处理了,无法通用
  20. //$StringsSFT = "*.sft" nocase wide
  21. condition:
  22. all of them
  23. and ( @HexVerNumUnderscore[1] - @HexVerNumV[1] <= 0x33 )
  24. and pe.imports("Kernel32.dll","ReadFile")
  25. and pe.imports("Kernel32.dll","CreateProcessW")
  26. and pe.imports("WinHTTP.dll","WinHttpSendRequest")
  27. //早期版本(V16)导入表没有,通过GetProcAddress获得
  28. //and pe.imports("Kernel32.dll","GetVolumeInformationW")
  29. }

未知