diff --git a/malware/MALW_KICXMRig.yar b/malware/MALW_KICXMRig.yar new file mode 100644 index 00000000..e374ca9b --- /dev/null +++ b/malware/MALW_KICXMRig.yar @@ -0,0 +1,95 @@ +rule u42_crime_win_kongtrojan +{ + meta: + author = "Kong" + date = "2025-01-09" + description = "Detects the trojanized Kong manager binary." + hash = "e164e6e21c661679c556d16638300c25e16d86bb2d567ad66b4181f1a65f4788" + + strings: + $golang = "golang.org" + $v1 = "Kong does not care about security" + $v2 = "KongIngress" + $v3 = "f0VMR" // start of b64 XMrig + + condition: + $golang and (all of ($v*)) +} + +rule u42_win_hacktool_XMRig_Miner: XMRig windows_memory +{ + meta: + author = "Kong" + date = "2024-08-23" + description = "XMRig Miner" + hash = "56ff46874f0536c289ff38af4cb308af8f7e6156e3f9d9227b71004d2042a4e6" + + strings: + $s01 = "XMRig" + $s02 = "nicehash.com" + $s03 = "tls-fingerprint" + $s04 = "stratum+tcp://" + $s05 = "stratum+ssl://" + $s06 = "cryptonight" fullword + $s07 = "cryptonightv7" fullword + $s08 = "cryptonightheavy" fullword + $s09 = "cryptonightv8" fullword + $s10 = ".minergate.com" + $s11 = "xmr.pool" fullword + $s12 = "aeon.pool" + $s13 = "worker-id" + $s14 = "no active pools, stop mining" + $s15 = "CryptonightR" + $s16 = "