Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New rules: RSA & bigint #982

Merged
merged 2 commits into from
Jan 21, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
rule:
meta:
name: encrypt data using RSA via embedded library
namespace: data-manipulation/encryption/rsa
authors:
- "Ana06"
description: encrypt data using krypton RSA implementation or similar
scopes:
static: function
dynamic: unsupported # requires mnemonic, offset features
att&ck:
- Defense Evasion::Obfuscated Files or Information [T1027]
mbc:
- Defense Evasion::Obfuscated Files or Information::Encryption-Standard Algorithm [E1027.m05]
- Cryptography::Encrypt Data::RSA [C0027.011]
references:
- https://github.com/ezhangle/krypton/blob/147d69429bfb03cce7113dca6dba36e77f8a9325/src/rsa.c#L232
- https://github.com/bnoordhuis/mongrel2/blob/3e9b57d82aeb627be0aebfb346199bfdfd67e530/src/crypto/rsa.c#L233
examples:
- 009c2377b67997b0da1579f4bbc822c1:0x405CF0
features:
- and:
# `sub eax, 3` Subtract 3 to calculate pads needed
- instruction:
- mnemonic: sub
- number: 3
# `mov byte ptr [ecx], 0` Ensure encryption block is < modulus
- instruction:
- mnemonic: mov
- offset: 0
- number: 0
# `mov byte ptr [edx+1], 2` Set encryption flag
- instruction:
- mnemonic: mov
- offset: 1
- number: 2
# `mov byte ptr [edx+2], 0` Terminate with zero
- instruction:
- mnemonic: mov
- offset: 2
- number: 0
# call `get_random_nonzero`, `memcpy`, `bi_import`, `RSA_public`, `bi_export`, and `bi_clear_cache`
# if the signing code is included, also call `memcpy` and `RSA_private`
- count(mnemonic(call)): (6,8)
- optional: # likely in a subfunction
- match: use bigint function
31 changes: 31 additions & 0 deletions data-manipulation/encryption/use-bigint-function.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
rule:
meta:
name: use bigint function
namespace: data-manipulation/encryption
authors:
- "Ana06"
description: use bigint function such as bi_copy and bi_permanent. Useful to identify crypto.
scopes:
static: instruction
dynamic: unsupported # requires mnemonic, offset features
references:
# bi_copy
- https://github.com/ezhangle/krypton/blob/147d69429bfb03cce7113dca6dba36e77f8a9325/src/bigint.c#L149
- https://github.com/bnoordhuis/mongrel2/blob/3e9b57d82aeb627be0aebfb346199bfdfd67e530/src/crypto/bigint.c#L162
# bi_permanent
- https://github.com/ezhangle/krypton/blob/147d69429bfb03cce7113dca6dba36e77f8a9325/src/bigint.c#L161
- https://github.com/bnoordhuis/mongrel2/blob/3e9b57d82aeb627be0aebfb346199bfdfd67e530/src/crypto/bigint.c#L176
examples:
- 009c2377b67997b0da1579f4bbc822c1:0x404096 # bi_copy
- 009c2377b67997b0da1579f4bbc822c1:0x4040D4 # bi_permanent
- 009c2377b67997b0da1579f4bbc822c1:0x4040E6 # bi_depermanent
- 009c2377b67997b0da1579f4bbc822c1:0x404109 # bi_free
- 8333822ed41d9f2b302cf8e21b126efc:0x407933 # bi_permanent
- 8333822ed41d9f2b302cf8e21b126efc:0x407933 # bi_depermanent
features:
- and:
- or:
- mnemonic: mov
- mnemonic: cmp
- number: 0x7FFF55AA = PERMANENT
- offset: 8 = bi->refs
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: decrypt data using RSA
name: decrypt data using RSA via WinAPI
namespace: data-manipulation/encryption/rsa
authors:
- [email protected]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: encrypt data using RSA
name: encrypt data using RSA via WinAPI
namespace: data-manipulation/encryption/rsa
authors:
- [email protected]
Expand Down
Loading