YARAhub
You are currently viewing the YARAhub entry of the YARA rule MALWARE_Emotet_OneNote_Delivery_wsf_Mar23. Depending on the TLP classification of this YARA rule chosen by the author, further information about this YARA rule is available below.
YARA Rule Details: MALWARE_Emotet_OneNote_Delivery_wsf_Mar23
Rule name: | MALWARE_Emotet_OneNote_Delivery_wsf_Mar23 |
---|---|
Author: | SECUINFRA Falcon Team (@SI_FalconTeam) - @SI_FalconTeam |
Description: | Detects Microsoft OneNote files used to deliver Emotet (.wsf Payload) |
Reference MD5: | f2fb54c7c909191ae10e34e50766a118 |
Likes: | 2 |
Reference Link : | n/a |
Malpedia Family : | n/a |
Date added: | 2023-03-16 |
Rule Matching TLP : | TLP:WHITE |
Rule Sharing TLP : | TLP:WHITE |
License : | https://creativecommons.org/licenses/by/4.0/ |
UUID: | 9e69e45b-f0b0-423f-ad66-9900851e662f |
Static hits: | 40 |
Unpacker hits: | 0 |
YARA Rule Content
The content of the YARA rule is shown below.
rule MALWARE_Emotet_OneNote_Delivery_wsf_Mar23 { meta: author = "SECUINFRA Falcon Team (@SI_FalconTeam)" description = "Detects Microsoft OneNote files used to deliver Emotet (.wsf Payload)" reference = "https://www.secuinfra.com/en/news/the-whale-surfaces-again-emotet-epoch4-spam-botnet-returns/" date = "2023-03-16" tlp = "CLEAR" hash0 = "dd9fcdcaf5c26fc27863c86aa65948924f23ab9faa261562cbc9d65ac80d33d4" hash1 = "ca2234b9c6f7c453b91a1ca10fc7b05487f94850be7ac5ea42986347d93772d8" hash2 = "b75681c1f99c4caf541478cc417ee9e8fba48f9b902c45d8bda0158a61ba1a2f" hash3 = "7c4591fd03b73ba6d0ec71a3cf89a04bfb4bd240d359117d96834a83727bdcc2" yarahub_reference_md5 = "f2fb54c7c909191ae10e34e50766a118" yarahub_uuid = "9e69e45b-f0b0-423f-ad66-9900851e662f" yarahub_license = "CC BY 4.0" yarahub_rule_matching_tlp = "TLP:WHITE" yarahub_rule_sharing_tlp = "TLP:WHITE" yarahub_author_twitter = "@SI_FalconTeam" strings: $s_protected = "This document is protected" wide $s_click = "You have to double-click \"View\" button to open" wide $s_imgFileName = "Untitled picture.jpg" wide $script = "language=\"VBScript\"" $wsfExt = ".wsf" ascii wide $GUIDwsf = {E7 16 E3 BD 65 26 11 45 A4 C4 8D 4D 0B 7A 9E AC ?? ?? ?? ?? ?? ?? ?? ?? 00 00 00 00 00 00 00 00 00 00 00 00 3C 6A 6F 62 20 69 64 3D 22} $endTmp = /rad.{5}\.tmp/ condition: uint32be(0x0) == 0xE4525C7B and any of ($s_*) and $script and $wsfExt and $GUIDwsf and $endTmp }
YARA Rule Matches
The following table shows the most recent files matching this particular YARA rule.
First seen (UTC) | SHA256 hash | Static matches | Unpacker matches |
---|