Skip to content

Commit

Permalink
Merge branch 'darkme2' into 'master'
Browse files Browse the repository at this point in the history
New Query: DarkMe Malware Registry

See merge request malware-team/osquery_queries!320
  • Loading branch information
cmarczew committed Aug 23, 2024
2 parents ad615e1 + 295b2c7 commit a3cbf8e
Show file tree
Hide file tree
Showing 2 changed files with 26 additions and 0 deletions.
9 changes: 9 additions & 0 deletions packs/win_malware.conf
Original file line number Diff line number Diff line change
Expand Up @@ -1853,6 +1853,15 @@
"windows"
]
},
"malware_darkme_registry": {
"query": "SELECT key as reg_key, path, name, data, datetime(mtime, 'unixepoch', 'UTC') as last_modified FROM registry WHERE key LIKE 'HKEY_USERS\\S-%\\Software\\Classes\\CLSID\\%\\ProgID' AND data LIKE 'NoProjectName.familytool';",
"interval": 86400,
"snapshot": true,
"description": "DarkMe is a remote access trojan (RAT) written in VB6. It is used by the Water Hydra threat actor group to access victim machines and registers the device to a remote command and control server.",
"platform": [
"windows"
]
},
"SugarGh0st RAT Registry Key Detected": {
"query": "SELECT key, path, name, data, DATETIME(mtime, 'unixepoch', 'UTC') AS last_modified FROM registry WHERE key LIKE 'HKEY_USERS\\S-%\\Software\\Microsoft\\Windows\\CurrentVersion\\Run' AND name='CTFM0N.EXE';",
"interval": 86400,
Expand Down
17 changes: 17 additions & 0 deletions win_malware/malware_darkme_registry.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
malware_darkme_registry:
query: 'SELECT key as reg_key, path, name, data, datetime(mtime, "unixepoch", "UTC")
as last_modified FROM registry WHERE key LIKE "HKEY_USERS\S-%\Software\Classes\CLSID\%\ProgID"
AND data LIKE "NoProjectName.familytool"'
interval: 86400
snapshot: true
description: DarkMe is a remote access trojan (RAT) written in VB6. It is used by the Water Hydra
threat actor group to access victim machines and registers the device to a remote command
and control server.
references:
- https://www.virustotal.com/gui/file/d123d92346868aab77ac0fe4f7a1293ebb48cf5af1b01f85ffe7497af5b30738
mitre_tactics:
- Persistence: TA0003
mitre_techniques:
- Modify Registry: T1112
platform:
- windows

0 comments on commit a3cbf8e

Please sign in to comment.