Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🚀 Create IOK: generic-crypto-349a230e.yml #247

Closed
wants to merge 1 commit into from

Conversation

LightningDev23
Copy link
Contributor

No description provided.

@IlluminatiFish
Copy link
Collaborator

I believe the drainer you are trying to detect with this PR and #248 is called Inferno Drainer.
I have created a rule to capture this, please let me know if you are okay with it.

title: Inferno Drainer f07c5ddf
description: |
   Sites that match these signatures tend to host a crypto
   drainer. Which acts when a victim approves a transaction 
   via the phishing website.
references:
    - https://urlscan.io/result/f07c5ddf-59cc-4131-9865-16f297918f2d
    - https://urlscan.io/result/57688f6f-3437-405e-915a-787ac8cb19df
    - https://urlscan.io/result/0cceace4-7aae-45ff-9e58-6da75e3c3220

detection:

  drainerFile:
    requests|re: '[0-9a-f]{8}-[0-9a-f]{4}-4[0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}.js'

  obfuscationSignature:
    js|contains: 'var __p_'
    
  condition: drainerFile and obfuscationSignature

@LightningDev23
Copy link
Contributor Author

Yes, that is fine

I believe the drainer you are trying to detect with this PR and #248 is called Inferno Drainer. I have created a rule to capture this, please let me know if you are okay with it.

title: Inferno Drainer f07c5ddf
description: |
   Sites that match these signatures tend to host a crypto
   drainer. Which acts when a victim approves a transaction 
   via the phishing website.
references:
    - https://urlscan.io/result/f07c5ddf-59cc-4131-9865-16f297918f2d
    - https://urlscan.io/result/57688f6f-3437-405e-915a-787ac8cb19df
    - https://urlscan.io/result/0cceace4-7aae-45ff-9e58-6da75e3c3220

detection:

  drainerFile:
    requests|re: '[0-9a-f]{8}-[0-9a-f]{4}-4[0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}.js'

  obfuscationSignature:
    js|contains: 'var __p_'
    
  condition: drainerFile and obfuscationSignature

Yes, that is fine.

@IlluminatiFish
Copy link
Collaborator

Yes, that is fine

I believe the drainer you are trying to detect with this PR and #248 is called Inferno Drainer. I have created a rule to capture this, please let me know if you are okay with it.

title: Inferno Drainer f07c5ddf
description: |
   Sites that match these signatures tend to host a crypto
   drainer. Which acts when a victim approves a transaction 
   via the phishing website.
references:
    - https://urlscan.io/result/f07c5ddf-59cc-4131-9865-16f297918f2d
    - https://urlscan.io/result/57688f6f-3437-405e-915a-787ac8cb19df
    - https://urlscan.io/result/0cceace4-7aae-45ff-9e58-6da75e3c3220

detection:

  drainerFile:
    requests|re: '[0-9a-f]{8}-[0-9a-f]{4}-4[0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}.js'

  obfuscationSignature:
    js|contains: 'var __p_'
    
  condition: drainerFile and obfuscationSignature

Yes, that is fine.

Okay, lets make a PR with that rule and then merge it. That way we can catch both #247 and #248.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants