├── README.md
├── all.yar
├── angler_ek_checkpoint.yar
├── angler_ek_redirector.yar
├── angler_flash.yar
├── angler_flash2.yar
├── angler_flash4.yar
├── angler_flash5.yar
├── angler_flash_uncompressed.yar
├── angler_html.yar
├── angler_html2.yar
├── angler_jar.yar
├── angler_js.yar
├── blackhole1_jar.yar
├── blackhole2_css.yar
├── blackhole2_htm.yar
├── blackhole2_htm10.yar
├── blackhole2_htm11.yar
├── blackhole2_htm12.yar
├── blackhole2_htm3.yar
├── blackhole2_htm4.yar
├── blackhole2_htm5.yar
├── blackhole2_htm6.yar
├── blackhole2_htm8.yar
├── blackhole2_jar.yar
├── blackhole2_jar2.yar
├── blackhole2_jar3.yar
├── blackhole2_pdf.yar
├── blackhole_basic.yar
├── bleedinglife2_adobe_2010_1297_exploit.yar
├── bleedinglife2_adobe_2010_2884_exploit.yar
├── bleedinglife2_jar2.yar
├── bleedinglife2_java_2010_0842_exploit.yar
├── crimepack_jar.yar
├── crimepack_jar3.yar
├── cve_2013_0074.yar
├── cve_2013_0422.yar
├── eleonore_jar.yar
├── eleonore_jar2.yar
├── eleonore_jar3.yar
├── eleonore_js.yar
├── eleonore_js2.yar
├── eleonore_js3.yar
├── fragus_htm.yar
├── fragus_js.yar
├── fragus_js2.yar
├── fragus_js_flash.yar
├── fragus_js_java.yar
├── fragus_js_quicktime.yar
├── fragus_js_vml.yar
├── javascript_exploit_and_obfuscation.yar
├── malicious_office.yar
├── malicious_pdf.yar
├── phoenix_html.yar
├── phoenix_html10.yar
├── phoenix_html11.yar
├── phoenix_html2.yar
├── phoenix_html3.yar
├── phoenix_html4.yar
├── phoenix_html5.yar
├── phoenix_html6.yar
├── phoenix_html7.yar
├── phoenix_html8.yar
├── phoenix_html9.yar
├── phoenix_jar.yar
├── phoenix_jar2.yar
├── phoenix_jar3.yar
├── phoenix_pdf.yar
├── phoenix_pdf2.yar
├── phoenix_pdf3.yar
├── redkit_bin_basic.yar
├── sakura_jar.yar
├── sakura_jar2.yar
├── zeroaccess_css.yar
├── zeroaccess_css2.yar
├── zeroaccess_htm.yar
├── zeroaccess_js.yar
├── zeroaccess_js2.yar
├── zeroaccess_js3.yar
├── zeroaccess_js4.yar
├── zerox88_js2.yar
├── zerox88_js3.yar
└── zeus_js.yar
/README.md:
--------------------------------------------------------------------------------
1 | Burp-Yara-Rules
2 | ========
3 |
4 | ##Description
5 | Yara rules to be used with the Burp Yara-Scanner extension
6 |
7 | ##Introduction
8 | Burp-Yara-Rules is a collection of Yara rules built from malicious code samples found on the Internet, in addition to Yara rules created by third-parties that identify malicious software commonly found hosted on websites.
9 |
10 | The rules are intended to be used with the Burp Yara-Scanner extension found here: https://github.com/PolitoInc/Yara-Scanner. The goal being to identify infected web pages during a web application assessment.
11 |
12 | ##Usage
13 | Add the Yara-Scanner extension within Burp (follow the directions at the Yara-Scanner link above). Then use the all.yar rules file as it combines all rules in this repository into a single file.
14 |
15 | ##Additional Details
16 | The Yara rules in this repository were found by searching the Internet for rules that detect common exploit kits, as well as by running the YaraGenerator (https://github.com/Xen0ph0n/YaraGenerator/) against downloaded exploit kit samples. The rules look for:
17 | * Signs of infection in HTML code
18 | * Signs of infection in JavaScript code
19 | * Signs of infection in CSS code
20 | * Detection of infected JAR files
21 | * Detection of infected PDF files
22 | * Detection of infected SilverLight XAP files
23 | * Detection of infected Flash SWF files
24 |
--------------------------------------------------------------------------------
/all.yar:
--------------------------------------------------------------------------------
1 | rule zerox88_js2
2 | {
3 | meta:
4 | author = "Josh Berry"
5 | date = "2016-06-26"
6 | description = "0x88 Exploit Kit Detection"
7 | hash0 = "cad8b652338f5e3bc93069c8aa329301"
8 | sample_filetype = "js-html"
9 | yaragenerator = "https://github.com/Xen0ph0n/YaraGenerator"
10 | strings:
11 | $string0 = "function gSH() {"
12 | $string1 = "200 HEIGHT"
13 | $string2 = "'sh.js'><\\/SCRIPT>"
14 | $string3 = " 2 - 26;"
15 | $string4 = ""
18 | $string7 = "setTimeout("
19 | $string8 = "'about:blank' WIDTH"
20 | $string9 = "mf.document.write("
21 | $string10 = "document.write("
22 | $string11 = "Kasper "
23 | condition:
24 | 11 of them
25 | }
26 |
27 | rule zerox88_js3
28 | {
29 | meta:
30 | author = "Josh Berry"
31 | date = "2016-06-26"
32 | description = "0x88 Exploit Kit Detection"
33 | hash0 = "9df0ac2fa92e602ec11bac53555e2d82"
34 | sample_filetype = "js-html"
35 | yaragenerator = "https://github.com/Xen0ph0n/YaraGenerator"
36 | strings:
37 | $string0 = " new ActiveXObject(szHTTP); "
38 | $string1 = " Csa2;"
39 | $string2 = "var ADO "
40 | $string3 = " new ActiveXObject(szOx88);"
41 | $string4 = " unescape("
42 | $string5 = "/test.exe"
43 | $string6 = " szEtYij;"
44 | $string7 = "var HTTP "
45 | $string8 = "%41%44%4F%44%42%2E"
46 | $string9 = "%4D%65%64%69%61"
47 | $string10 = "var szSRjq"
48 | $string11 = "%43%3A%5C%5C%50%72%6F%67%72%61%6D"
49 | $string12 = "var METHOD "
50 | $string13 = "ADO.Mode "
51 | $string14 = "%61%79%65%72"
52 | $string15 = "%2E%58%4D%4C%48%54%54%50"
53 | $string16 = " 7 - 6; HTTP.Open(METHOD, szURL, i-3); "
54 | condition:
55 | 16 of them
56 | }
57 |
58 | rule angler_ek_checkpoint
59 | {
60 | meta:
61 | description = "Angler EK Exploit Kit - Checkpoint Detection"
62 | strings:
63 | $a = "Jul 2039" nocase
64 | $b = "Jul 2040" nocase
65 | condition:
66 | any of them
67 | }
68 |
69 | rule AnglerEKredirector
70 | {
71 | meta:
72 | description = "Angler Exploit Kit Redirector"
73 | ref = "http://blog.xanda.org/2015/08/28/yara-rule-for-angler-ek-redirector-js/"
74 | author = "adnan.shukor@gmail.com"
75 | date = "08-July-2015"
76 | impact = "5"
77 | version = "1"
78 | strings:
79 | $ekr1 = "" fullword
82 | $ekr4 = "