Skip to content

Commit

Permalink
Rules 20210429
Browse files Browse the repository at this point in the history
  • Loading branch information
t4d committed Apr 29, 2021
1 parent b0bca91 commit 5d10136
Show file tree
Hide file tree
Showing 8 changed files with 220 additions and 0 deletions.
25 changes: 25 additions & 0 deletions PK_BT_rydox.yar
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
rule PK_BT_rydox : BT
{
meta:
description = "Phishing Kit impersonating BT Business"
licence = "GPL-3.0"
author = "Thomas 'tAd' Damonneville"
reference = ""
date = "2021-04-29"
comment = "Phishing Kit - BT Business - 'Rydox.CC Coding'"

strings:
$zip_file = { 50 4b 03 04 }
$spec_dir = "img"
$spec_file1 = "app.css"
$spec_file2 = "search.svg"
$spec_file3 = "login2.php"
$spec_file4 = "index2.php"
condition:
uint32(0) == 0x04034b50 and
$zip_file and
$spec_dir and
// check for file
all of ($spec_file*)
}
27 changes: 27 additions & 0 deletions PK_Chase_Xbaltiv3.yar
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
rule PK_Chase_Xbaltiv3 : Chase
{
meta:
description = "Phishing Kit impersonating Chase bank"
licence = "GPL-3.0"
author = "Thomas 'tAd' Damonneville"
reference = "https://stalkphish.com/2021/04/22/scammer_vs_scammer_backdoored_phishing_kit/"
date = "2021-04-21"
comment = "Phishing Kit - Chase Bank - XBalti V3"

strings:
// the zipfile working on
$local_file = { 50 4b 03 04 }
// specific directory found in PhishingKit
$spec_dir = "XBALTI"
// specific files found in PhishingKit
$spec_file = "desktopnight.jpeg"
$spec_file2 = "lostyle.css"
$spec_file3 = "Email.php"
condition:
// look for the ZIP header
uint32(0) == 0x04034b50 and
$local_file and
$spec_dir and
all of ($spec_file*)
}
28 changes: 28 additions & 0 deletions PK_Chronopost_dch.yar
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
rule PK_Chronopost_dch : Chronopost
{
meta:
description = "Phishing Kit impersonating Chronopost"
licence = "GPL-3.0"
author = "Thomas 'tAd' Damonneville"
reference = ""
date = "2021-04-28"
comment = "Phishing Kit - Chronopost - 'DCH Coder'"

strings:
// the zipfile working on
$local_file = { 50 4b 03 04 }
// specific directory found in PhishingKit
$spec_dir = "sourceApp"
// specific files found in PhishingKit
$spec_file = "chronopost_tours_03712200_113425863.jpg"
$spec_file1 = "remettions.php"
$spec_file2 = "engagement.php"
$spec_file3 = "funciones.php"
condition:
// look for the ZIP header
uint32(0) == 0x04034b50 and
$local_file and
$spec_dir and
all of ($spec_file*)
}
30 changes: 30 additions & 0 deletions PK_EarthLink_33flow.yar
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
rule PK_EarthLink_33flow : EarthLink
{
meta:
description = "Phishing Kit impersonating EarthLink"
licence = "GPL-3.0"
author = "Thomas 'tAd' Damonneville"
reference = ""
date = "2021-04-22"
comment = "Phishing Kit - EarthLink - 'Created in 2020 [ Don 33flow ]'"

strings:
// the zipfile working on
$zip_file = { 50 4b 03 04 }
// specific directory found in PhishingKit
$spec_dir = "imgs"
// specific file found in PhishingKit
$spec_file = "delete.php"
$spec_file2 = "_+--_=_.php"
$spec_file3 = "elnk_logo.png"
$spec_file4 = "_=+---+_=.html"
condition:
// look for the ZIP header
uint32(0) == 0x04034b50 and
// make sure we have a local file header
$zip_file and
$spec_dir and
// check for file
all of ($spec_file*)
}
26 changes: 26 additions & 0 deletions PK_HSBC_payee.yar
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
rule PK_HSBC_payee : HSBC
{
meta:
description = "Phishing Kit impersonating HSBC"
licence = "GPL-3.0"
author = "Thomas 'tAd' Damonneville"
reference = ""
date = "2021-04-29"
comment = "Phishing Kit - HSBC - deployed on many domains containing 'payee' string"

strings:
$zip_file = { 50 4b 03 04 }
$spec_dir = "admin"
$spec_dir2 = "security.hsbc"
$spec_file1 = "rec.php"
$spec_file2 = "installerdb.php"
$spec_file3 = "idv.PayeeReq.php"
$spec_file4 = "idv.Verifying.php"
condition:
uint32(0) == 0x04034b50 and
$zip_file and
all of ($spec_dir*) and
// check for file
all of ($spec_file*)
}
31 changes: 31 additions & 0 deletions PK_Multi_mumu.yar
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
rule PK_Multi_mumu
{
meta:
description = "Phishing Kit impersonating Several brands (hotmail, hanmail, 163, AE, ...)"
licence = "GPL-3.0"
author = "Thomas 'tAd' Damonneville"
reference = ""
date = "2021-04-31"
comment = "Phishing Kit - Multiple - found mailing-list called mumu*.txt"

strings:
// the zipfile working on
$zip_file = { 50 4b 03 04 }
// specific directory found in PhishingKit
$spec_dir = "image"
// specific file found in PhishingKit
$spec_file = "process.php"
$spec_file2 = "naver.php"
$spec_file3 = "rediff.php"
$spec_file4 = "sp_btn_20140615.png"
condition:
// look for the ZIP header
uint32(0) == 0x04034b50 and
// make sure we have a local file header
$zip_file and
// check for file
$spec_dir and
all of ($spec_file*)
}

23 changes: 23 additions & 0 deletions PK_OneDrive_venza.yar
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
rule PK_OneDrive_venza : OneDrive
{
meta:
description = "Phishing Kit impersonating OneDrive"
licence = "GPL-3.0"
author = "Thomas 'tAd' Damonneville"
reference = ""
date = "2021-04-27"
comment = "Phishing Kit - OneDrive - 'CrEaTeD bY VeNzA'"

strings:
$zip_file = { 50 4b 03 04 }
$spec_file1 = "email.php"
$spec_file2 = "next.php"
$spec_file3 = "1.png"
$spec_file4 = "1.html"
condition:
uint32(0) == 0x04034b50 and
$zip_file and
// check for file
all of ($spec_file*)
}
30 changes: 30 additions & 0 deletions PK_WeTransfer_shevi.yar
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
rule PK_WeTransfer_shevi : WeTransfer
{
meta:
description = "Phishing Kit impersonating WeTransfer"
licence = "GPL-3.0"
author = "Thomas 'tAd' Damonneville"
reference = ""
date = "2021-04-28"
comment = "Phishing Kit - WeTransfer - 'WEtransfer Logx CoDeD By Shevi'"

strings:
// the zipfile working on
$zip_file = { 50 4b 03 04 }
// specific directory found in PhishingKit
$spec_dir = "cgi"
// specific file found in PhishingKit
$spec_file = "loading.php"
$spec_file1 = "loading.php"
$spec_file2 = "timeout.php"
$spec_file3 = "login6.php"
condition:
// look for the ZIP header
uint32(0) == 0x04034b50 and
// make sure we have a local file header
$zip_file and
// check for file
$spec_dir and
all of ($spec_file*)
}

0 comments on commit 5d10136

Please sign in to comment.