File tree 1 file changed +29
-0
lines changed
1 file changed +29
-0
lines changed Original file line number Diff line number Diff line change
1
+ rule MAL_WIN_Ralordv1_Apr25 {
2
+ meta :
3
+ description = " This ISH Tecnologia Yara rule, detects the main components of the first version of RALord Ransomware "
4
+ author = " 0x0d4y- Í caro C é sar "
5
+ date = " 2025-04-01 "
6
+ score = 80
7
+ reference = " https://ish.com.br/wp-content/uploads/2025/04/RALord-Novo-grupo-de-Ransomware-as-a-Service-1.pdf "
8
+ hash = " BE15F62D14D1CBE2AECCE8396F4C6289 "
9
+ uuid = " 67254633-3597-4770-9806-8b2e26c8f66a "
10
+ license = " Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE "
11
+ rule_matching_tlp = " TLP:WHITE "
12
+ rule_sharing_tlp = " TLP:WHITE "
13
+ malpedia_family = " win.ralord "
14
+
15
+ strings :
16
+ $ code_pattern_quarterround = { 4 ? 31 ?? 48 8b ?? ?? ?? 4 ? 31 ?? 48 8b ?? ?? ?? 31 e8 4 ? 31 ?? 41 c1 ?? 0c c1 ?? 0c c1 ?? 0c 48 89 c2 c1 ?? 0c }
17
+ $ code_pattern_custom_alg = { 0f 57 ?? 0f 10 ?? c5 ?? ?? ?? ?? 0f 57 ?? 0f 10 ?? c5 ?? ?? ?? ?? 0f 57 ?? 0f 10 ?? c5 ?? ?? ?? ?? 0f 57 ?? 0f 11 ?? c5 ?? ?? ?? ?? 0f 11 ?? c5 ?? ?? ?? ?? 0f 11 ?? c5 ?? ?? ?? ?? 0f 11 ?? c5 ?? ?? ?? ?? 48 83 c0 08 48 3d 8 ? }
18
+ $ ralord_str_I = " chacha " ascii
19
+ $ ralord_str_II = " scorp " ascii
20
+ $ ralord_str_III = " RALord " ascii
21
+ $ ralord_str_IV = " onion " ascii
22
+ $ ralord_str_V = " /rust " ascii
23
+ $ ralord_str_VI = " BCryptGenRandom " ascii
24
+
25
+ condition :
26
+ uint16 (0 ) == 0x5a4d and
27
+ all of ($ code_pattern_ * ) and
28
+ 4 of ($ ralord_str_ * )
29
+ }
You can’t perform that action at this time.
0 commit comments