YARAhub

You are currently viewing the YARAhub entry of the YARA rule MALWARE_Emotet_OneNote_Delivery_js_Mar23. Depending on the TLP classification of this YARA rule chosen by the author, further information about this YARA rule is available below.

YARA Rule Details: MALWARE_Emotet_OneNote_Delivery_js_Mar23


Rule name:MALWARE_Emotet_OneNote_Delivery_js_Mar23
Author:SECUINFRA Falcon Team (@SI_FalconTeam) - @SI_FalconTeam
Description:Detects Microsoft OneNote files used to deliver Emotet (.js Payload)
Reference MD5: b951629aedffbabc180ee80f9725f024
Likes: 1
Reference Link :n/a
Malpedia Family :n/a
Date added:2023-03-17
Rule Matching TLP :TLP:WHITE
Rule Sharing TLP :TLP:WHITE
License : https://creativecommons.org/licenses/by/4.0/
UUID: eea31d8d-30cb-4210-a054-aa77ad18fd00
Static hits:2
Unpacker hits:0

YARA Rule Content


The content of the YARA rule is shown below.

rule MALWARE_Emotet_OneNote_Delivery_js_Mar23
{
	meta:
		author = "SECUINFRA Falcon Team (@SI_FalconTeam)"
		description = "Detects Microsoft OneNote files used to deliver Emotet (.js Payload)"
		reference = "https://twitter.com/bomccss/status/1636746149855121411"
		date = "2023-03-17"
		tlp = "CLEAR"
		hash = "a43e0864905fe7afd6d8dbf26bd27d898a2effd386e81cfbc08cae9cf94ed968"
		yarahub_reference_md5 = "b951629aedffbabc180ee80f9725f024"
		yarahub_uuid = "eea31d8d-30cb-4210-a054-aa77ad18fd00"
		yarahub_license = "CC BY 4.0"
		yarahub_rule_matching_tlp = "TLP:WHITE"
		yarahub_rule_sharing_tlp = "TLP:WHITE"
		yarahub_author_twitter = "@SI_FalconTeam"

	strings:
		// Lure specific strings
		$s_headline= "Connect to the cloud" wide
		$s_attachment = "This document contains attachments from the cloud" wide
		$s_receive = "to receive them, double click \"Next\"" wide
		$s_imgFileName = "NOTE4_WHITE_1.bmp" wide
		$s_path = "C:\\Autoruns\\" wide
		$s_output = "output1.js"

		// Javascript keywords
		$js1 = "function" ascii
		$js2 = ".replace(\"" ascii

		// Lure contains 3 PNGs and the Javascript code
		$GUID = {E7 16 E3 BD 65 26 11 45 A4 C4 8D 4D 0B 7A 9E AC}

	condition:
		uint32be(0x0) == 0xE4525C7B
		and 3 of ($s_*)
		and any of ($js*)
		and #GUID == 4
}  

YARA Rule Matches


The following table shows the most recent files matching this particular YARA rule.

First seen (UTC)SHA256 hashStatic matchesUnpacker matches