<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to stop MortiAgent Malware using the snort rule ? in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/326590#M347</link>
    <description>&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;I want to stop the MortiAgent malware by applying /using snort rule &amp;amp; also using yara rule?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;How to configure this in Palo alto ?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;Below are snort &amp;amp; Yara Rules:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;1. The below SNORT rule can be used to detect the MoriAgent Beacon.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;alert tcp $HOME_NET any -&amp;gt; $EXTERNAL_NET $HTTP_PORTS (msg:" MoriAgent Beacon&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;HTTP Request"; content:"/Index.php?i="; depth:200; content:"&amp;amp;t="; within:64;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;content:"HTTP/1.1"; within:64; content:"Content-Type: application/json"; within:32;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;content:"Content-Length: 0"; within:90; threshold:type limit,track by_src,count&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;1,seconds 120; sid:1000001; rev:001;)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;2. Below are YARA rules to detect POWERSTATS.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect the substitution table used in PowerShell code.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule SubstitutionTable_in_PowerShell {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;description = "Detect the substitution table used in PowerShell code (2019-2020)"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 = "Replace('(','a'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 = "Replace(')','b'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 = "Replace('{','c'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a4 = "Replace('}','d'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a5 = "Replace('[','e'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a6 = "Replace(']','f'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a4 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a5 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a6 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;filesize &amp;lt; 100000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect PowerStats backdoor.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule POWERSTATS_JscriptLauncher {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;description = "POWERSTATS Jscript Launcher"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "6C97A39A7FFC292BAF8BE1391FCE7DA0"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 = "$s=(get-content"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 = "Get('Win32_Process').Create(cm"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 = "var cm="&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;all of them and filesize &amp;lt; 600&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect PowerStats de-obfuscated&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule POWERSTATSLite {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 = "$global:key"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 = "$global:time"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 = "webreq = [System.Net.WebRequest]::Create($url)"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;all of them and filesize &amp;lt; 3000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect MoriAgent implant&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule MoriAgent {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;description = "C++ MuddyWater implant"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "12755B210EC1171045144480ACD05AA8"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f1 = "|x7d873iqq" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f2 = "ljyfiiwnskt" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f3 = "htssjhy" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f4 = "kwjjfiiwnskt" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f5 = "hqtxjxthpjy" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f6 = "\\XFXyfwyzu" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f7 = "\\XFHqjfszu" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f8 = "ZmilXzwkm{{Umuwz" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f9 = "^qz|}itXzw|mk|" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f10 = "_zq|mXzwkm{{Umuwz" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$content = "Content-Type: application/json" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;uint16(0) == 0x5A4D and filesize &amp;lt; 2MB and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$content and 5 of ($f*)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect PowerStats Implants&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule POWERSTATS_Implants&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;{ meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;description = "Detects all POWERSTATS implants"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "409558610BE62655FBA0B1F93F2D9596" hash =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;"DD32B95F865374C31A1377E31FA79E87" strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 = "if ($resp -ne $null){"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 = "out = $_.Exception.Message"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 = "IEX $cmd -ErrorAction SilentlyContinue"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;all of them and filesize &amp;lt; 50000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 07 May 2020 08:04:19 GMT</pubDate>
    <dc:creator>Mohammed_Yasin</dc:creator>
    <dc:date>2020-05-07T08:04:19Z</dc:date>
    <item>
      <title>How to stop MortiAgent Malware using the snort rule ?</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/326590#M347</link>
      <description>&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;I want to stop the MortiAgent malware by applying /using snort rule &amp;amp; also using yara rule?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;How to configure this in Palo alto ?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;Below are snort &amp;amp; Yara Rules:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;1. The below SNORT rule can be used to detect the MoriAgent Beacon.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;alert tcp $HOME_NET any -&amp;gt; $EXTERNAL_NET $HTTP_PORTS (msg:" MoriAgent Beacon&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;HTTP Request"; content:"/Index.php?i="; depth:200; content:"&amp;amp;t="; within:64;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;content:"HTTP/1.1"; within:64; content:"Content-Type: application/json"; within:32;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;content:"Content-Length: 0"; within:90; threshold:type limit,track by_src,count&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;1,seconds 120; sid:1000001; rev:001;)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;2. Below are YARA rules to detect POWERSTATS.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect the substitution table used in PowerShell code.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule SubstitutionTable_in_PowerShell {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;description = "Detect the substitution table used in PowerShell code (2019-2020)"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 = "Replace('(','a'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 = "Replace(')','b'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 = "Replace('{','c'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a4 = "Replace('}','d'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a5 = "Replace('[','e'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a6 = "Replace(']','f'"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a4 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a5 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a6 in (@a1..@a1+200) and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;filesize &amp;lt; 100000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect PowerStats backdoor.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule POWERSTATS_JscriptLauncher {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;description = "POWERSTATS Jscript Launcher"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "6C97A39A7FFC292BAF8BE1391FCE7DA0"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 = "$s=(get-content"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 = "Get('Win32_Process').Create(cm"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 = "var cm="&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;all of them and filesize &amp;lt; 600&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect PowerStats de-obfuscated&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule POWERSTATSLite {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 = "$global:key"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 = "$global:time"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 = "webreq = [System.Net.WebRequest]::Create($url)"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;all of them and filesize &amp;lt; 3000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect MoriAgent implant&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule MoriAgent {&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;description = "C++ MuddyWater implant"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "12755B210EC1171045144480ACD05AA8"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f1 = "|x7d873iqq" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f2 = "ljyfiiwnskt" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f3 = "htssjhy" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f4 = "kwjjfiiwnskt" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f5 = "hqtxjxthpjy" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f6 = "\\XFXyfwyzu" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f7 = "\\XFHqjfszu" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f8 = "ZmilXzwkm{{Umuwz" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f9 = "^qz|}itXzw|mk|" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$f10 = "_zq|mXzwkm{{Umuwz" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$content = "Content-Type: application/json" ascii fullword&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;uint16(0) == 0x5A4D and filesize &amp;lt; 2MB and&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$content and 5 of ($f*)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;YARA rule to detect PowerStats Implants&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;rule POWERSTATS_Implants&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;{ meta:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;description = "Detects all POWERSTATS implants"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "A18016AF1E9ACDA5963112EE8BEEB28B"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;hash = "409558610BE62655FBA0B1F93F2D9596" hash =&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;"DD32B95F865374C31A1377E31FA79E87" strings:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a1 = "if ($resp -ne $null){"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a2 = "out = $_.Exception.Message"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;$a3 = "IEX $cmd -ErrorAction SilentlyContinue"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;condition:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;all of them and filesize &amp;lt; 50000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="verdana,geneva" size="2"&gt;}&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 08:04:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/how-to-stop-mortiagent-malware-using-the-snort-rule/m-p/326590#M347</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2020-05-07T08:04:19Z</dc:date>
    </item>
  </channel>
</rss>

