rule apt_malware_win_dolphin: InkyPine { meta: author = "threatintel@volexity.com" description = "North Korean origin malware which uses a custom Google App for c2 communications." date = "2021-06-21" hash1 = "837eaf7b736583497afb8bbdb527f70577901eff04cc69d807983b233524bfed" os = "win" os_arch = "all" reference = "https://www.welivesecurity.com/2022/11/30/whos-swimming-south-korean-waters-meet-scarcrufts-dolphin/" scan_context = "file,memory" severity = "critical" last_modified = "2025-01-27T14:08:18Z" license = "See license at https://github.com/volexity/threat-intel/blob/main/LICENSE.txt" rule_id = 5593 version = 10 strings: $magic = "host_name: %ls, cookie_name: %s, cookie: %s, CT: %llu, ET: %llu, value: %s, path: %ls, secu: %d, http: %d, last: %llu, has: %d" $f1 = "%ls.INTEG.RAW" wide $f2 = "edb.chk" ascii $f3 = "edb.log" ascii $f4 = "edbres00001.jrs" ascii $f5 = "edbres00002.jrs" ascii $f6 = "edbtmp.log" ascii $f7 = "cheV01.dat" ascii $chrome1 = "Failed to get chrome cookie" $chrome2 = "mail.google.com, cookie_name: OSID" $chrome3 = ".google.com, cookie_name: SID," $chrome4 = ".google.com, cookie_name: __Secure-3PSID," $chrome5 = "Failed to get Edge cookie" $chrome6 = "google.com, cookie_name: SID," $chrome7 = "google.com, cookie_name: __Secure-3PSID," $chrome8 = "Failed to get New Edge cookie" $chrome9 = "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0" $chrome10 = "Content-Type: application/x-www-form-urlencoded;charset=utf-8" $chrome11 = "Cookie: SID=%s; OSID=%s; __Secure-3PSID=%s" $chrome12 = "https://mail.google.com" $chrome13 = "result.html" $chrome14 = "GM_ACTION_TOKEN" $chrome15 = "GM_ID_KEY=" $chrome16 = "/mail/u/0/?ik=%s&at=%s&view=up&act=prefs" $chrome17 = "p_bx_ie=1" $chrome18 = "myaccount.google.com, cookie_name: OSID" $chrome19 = "Accept-Language: ko-KR,ko;q=0.8,en-US;q=0.5,en;q=0.3" $chrome20 = "Content-Type: application/x-www-form-urlencoded;charset=utf-8" $chrome21 = "Cookie: SID=%s; OSID=%s; __Secure-3PSID=%s" $chrome22 = "https://myaccount.google.com" $chrome23 = "result.html" $chrome24 = "myaccount.google.com" $chrome25 = "/_/AccountSettingsUi/data/batchexecute" $chrome26 = "f.req=%5B%5B%5B%22BqLdsd%22%2C%22%5Btrue%5D%22%2Cnull%2C%22generic%22%5D%5D%5D&at=" $chrome27 = "response.html" $msg1 = "https_status is %s" $msg2 = "Success to find GM_ACTION_TOKEN and GM_ID_KEY" $msg3 = "Failed to find GM_ACTION_TOKEN and GM_ID_KEY" $msg4 = "Failed HttpSendRequest to mail.google.com" $msg5 = "Success to enable imap" $msg6 = "Failed to enable imap" $msg7 = "Success to find SNlM0e" $msg8 = "Failed to find SNlM0e" $msg9 = "Failed HttpSendRequest to myaccount.google.com" $msg10 = "Success to enable thunder access" $msg11 = "Failed to enable thunder access" condition: $magic or ( all of ($f*) and 3 of ($chrome*) ) or 24 of ($chrome*) or 4 of ($msg*) } rule apt_malware_win_bluelight: InkyPine { meta: author = "threatintel@volexity.com" date = "2021-04-23" description = "The BLUELIGHT malware family. Leverages Microsoft OneDrive for network communications." hash1 = "7c40019c1d4cef2ffdd1dd8f388aaba537440b1bffee41789c900122d075a86d" hash2 = "94b71ee0861cc7cfbbae53ad2e411a76f296fd5684edf6b25ebe79bf6a2a600a" hash3 = "485246b411ef5ea9e903397a5490d106946a8323aaf79e6041bdf94763a0c028" os = "win" os_arch = "all" reference = "https://www.volexity.com/blog/2021/08/24/north-korean-bluelight-special-inkysquid-deploys-rokrat/" scan_context = "file,memory" severity = "critical" last_modified = "2025-02-18T12:58:12Z" license = "See license at https://github.com/volexity/threat-intel/blob/main/LICENSE.txt" rule_id = 5284 version = 12 strings: $pdb1 = "\\Development\\BACKDOOR\\ncov\\" $pdb2 = "Release\\bluelight.pdb" nocase ascii $pdb3 = "D:\\Development\\GOLD-BACKDOOR\\Release\\FirstBackdoor.pdb" // D:\Development\GOLD-BACKDOOR\Release\Gold2.pdb $pdb4 = "GOLD-BACKDOOR\\Release\\" $msg0 = "https://ipinfo.io" fullword $msg1 = "country" fullword $msg5 = "\"UserName\":\"" fullword $msg7 = "\"ComName\":\"" fullword $msg8 = "\"OS\":\"" fullword $msg9 = "\"OnlineIP\":\"" fullword $msg10 = "\"LocalIP\":\"" fullword $msg11 = "\"Time\":\"" fullword $msg12 = "\"Compiled\":\"" fullword $msg13 = "\"Process Level\":\"" fullword $msg14 = "\"AntiVirus\":\"" fullword $msg15 = "\"VM\":\"" fullword condition: any of ($pdb*) or all of ($msg*) }