Just the one rule today – matching strings found in the Royal ransom note.
rule MAL_Royal_ransomnote {
meta:
description = "Matches strings found in Royal ransom note sample."
last_modified = "2024-01-21"
author = "@petermstewart"
DaysofYara = "21/100"
strings:
$a = "royal2xthig3ou5hd7zsliqagy6yygk2cdelaxtni2fyad6dpmpxedid.onion"
$b1 = "If you are reading this, it means that your system were hit by Royal ransomware"
$b2 = "Please contact us via :"
$b3 = "In the meantime, let us explain this case"
$b4 = "It may seem complicated, but it is not!"
$b5 = "Most likely what happened was that you decided to save some money on your security infrastructure"
$b6 = "Alas, as a result your critical data was not only encrypted but also copied from your systems on a secure server"
$b7 = "From there it can be published online"
$b8 = "Then anyone on the internet from darknet criminals, ACLU journalists, Chinese government"
$b9 = "and even your employees will be able to see your internal documentation: personal data, HR reviews, internal lawsuitsand complains, financial reports, accounting, intellectual property, and more"
$b10 = "Fortunately we got you covered!"
$b11 = "Royal offers you a unique deal.For a modest royalty(got it; got it ? )"
$b12 = "for our pentesting services we will not only provide you with an amazing risk mitigation service"
$b13 = "covering you from reputational, legal, financial, regulatory, and insurance risks, but will also provide you with a security review for your systems"
$b14 = "To put it simply, your files will be decrypted, your data restoredand kept confidential, and your systems will remain secure"
$b15 = "Try Royal today and enter the new era of data security"
$b16 = "We are looking to hearing from you soon"
condition:
filesize < 5KB and
1 of ($a*) and
13 of ($b*)
}
Find the rest of my 100DaysofYARA posts here, and the rules themselves on my Github repository.