Skip to content

Commit f813a52

Browse files
authored
Merge pull request Neo23x0#334 from MalGamy12/patch-1
feat: new rules related to seaspy backdoor report
2 parents 38d1f4f + 19a618b commit f813a52

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed

yara/seaspy_backdoor_jan25.yar

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
rule SUSP_LNX_ByteEncoder_Jan25 {
2+
meta:
3+
description = "Detects Linux binaries that encode bytes by splitting them into upper and lower nibbles and mapping them to custom lookup tables, seen being used by SEASPY and Bluez backdoors"
4+
author = "MalGamy (Nextron System)"
5+
date = "2025-01-23"
6+
reference = "https://www.securityweek.com/newly-discovered-turla-malware-targets-linux-systems/"
7+
hash = "3e0312ce8d0c1e5c192dbb93cac4770a1205c56dc9d02a0510c7e10a15251de5"
8+
hash = "301d58a6a1819466e77209dbf8ca635cbee3b45516e5ee228fea50ae4a27b7d5"
9+
hash = "957c0c135b50d1c209840ec7ead60912a5ccefd2873bf5722cb85354cea4eb37"
10+
hash = "5e3c128749f7ae4616a4620e0b53c0e5381724a790bba8314acb502ce7334df2"
11+
hash = "b0b83e1c69aa8df6da4383230bef1ef46e09f3bf26cec877eac53a9d48dc53ca"
12+
hash = "d21b40645e33638bd36b63582c2c6ad5e8230c731236a54e8e5f4139bad31fdf"
13+
score = 75
14+
strings:
15+
$op1 = {8B 45 FC 48 63 D0 48 8B 45 A8 48 01 C2 8B 45 BC C1 F8 04 83 E0 0F 48 98 0F B6 44 05 E0 88 02} // Encode upper nibbl
16+
$op2 = {8B 45 FC 48 98 48 8D 50 01 48 8B 45 A8 48 01 C2 8B 45 BC 83 E0 0F 48 98 0F B6 44 05 C0 88 02} // Encode lower nibble
17+
condition:
18+
uint32be(0) == 0x7f454c46
19+
and filesize < 4MB
20+
and all of them
21+
}
22+
23+
rule SUSP_LNX_StackString_Technique_Jan25 {
24+
meta:
25+
description = "Detects suspicious Linux binaries using stack-based string manipulation techniques, which are often used to generate PTY (pseudo-terminal) device names for stealth or persistence, seen being used by SEASPY and Bluez backdoors"
26+
author = "MalGamy (Nextron System)"
27+
date = "2025-01-23"
28+
reference = "https://www.securityweek.com/newly-discovered-turla-malware-targets-linux-systems/"
29+
hash = "0e65a80c6331a0e8d7df05ac217a8a7fe03b88f1d304f2ff0a26b92ed89153f3"
30+
hash = "3e0312ce8d0c1e5c192dbb93cac4770a1205c56dc9d02a0510c7e10a15251de5"
31+
hash = "301d58a6a1819466e77209dbf8ca635cbee3b45516e5ee228fea50ae4a27b7d5"
32+
hash = "957c0c135b50d1c209840ec7ead60912a5ccefd2873bf5722cb85354cea4eb37"
33+
hash = "5e3c128749f7ae4616a4620e0b53c0e5381724a790bba8314acb502ce7334df2"
34+
hash = "654b7c5b667e4d70ebb5fb1807dcd1ee5b453f45424eb59a287d86ad8d0598a1"
35+
hash = "ac6a8ec0b92935b7faab05ca21a42ed9eecdc9243fcf1449cc8f050de38e4c4f"
36+
score = 75
37+
strings:
38+
$op1 = {C7 45 E0 70 71 72 73 C7 45 E4 74 75 76 77 C7 45 E8 78 79 7A 61 C7 45 EC 62 63 64 65 C6 45 F0 00 C7 45 C0 30 31 32 33 C7 45 C4 34 35 36 37 C7 45 C8 38 39 61 62 C7 45 CC 63 64 65 66} // tack-based string manipulation technique
39+
condition:
40+
uint32be(0) == 0x7f454c46
41+
and filesize < 4MB
42+
and $op1
43+
}

0 commit comments

Comments
 (0)