7b8a7683f7df79d0ba123eed9852e3d15dc9a96d
[ossec-hids.git] / src / rootcheck / db / win_malware_rcl.txt
1 # @(#) $Id$
2 #
3 # OSSEC Windows Malware list - (C) 2007 Daniel B. Cid - dcid@ossec.net
4 #
5 # Released under the same license as OSSEC.
6 # More details at the LICENSE file included with OSSEC or online
7 # at: http://www.ossec.net/en/licensing.html
8 #
9 # [Malware name] [any or all] [reference]
10 # type:<entry name>;
11 #
12 # Type can be:
13 #             - f (for file or directory)
14 #             - r (registry entry)
15 #             - p (process running)
16 #
17 # Additional values:
18 # For the registry , use "->" to look for a specific entry and another
19 # "->" to look for the value. 
20 # For files, use "->" to look for a specific value in the file.
21 #
22 # # Values can be preceeded by: =: (for equal) - default
23 #                               r: (for ossec regexes)
24 #                               >: (for strcmp greater)
25 #                               <: (for strcmp  lower)
26 # Multiple patterns can be specified by using " && " between them.
27 # (All of them must match for it to return true).
28
29
30 # http://www.iss.net/threats/ginwui.html
31 [Ginwui Backdoor] [any] [http://www.iss.net/threats/ginwui.html]
32 f:%WINDIR%\System32\zsyhide.dll;
33 f:%WINDIR%\System32\zsydll.dll;
34 r:HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\zsydll;
35 r:HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows -> AppInit_DLLs -> r:zsyhide.dll;
36
37
38 # http://www.symantec.com/security_response/writeup.jsp?docid=2006-081312-3302-99&tabid=2
39 [Wargbot Backdoor] [any] []
40 f:%WINDIR%\System32\wgareg.exe;
41 r:HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wgareg;
42
43
44 # http://www.f-prot.com/virusinfo/descriptions/sober_j.html
45 [Sober Worm] [any] []
46 f:%WINDIR%\System32\nonzipsr.noz;
47 f:%WINDIR%\System32\clonzips.ssc;
48 f:%WINDIR%\System32\clsobern.isc;
49 f:%WINDIR%\System32\sb2run.dii;
50 f:%WINDIR%\System32\winsend32.dal;
51 f:%WINDIR%\System32\winroot64.dal;
52 f:%WINDIR%\System32\zippedsr.piz;
53 f:%WINDIR%\System32\winexerun.dal;
54 f:%WINDIR%\System32\winmprot.dal;
55 f:%WINDIR%\System32\dgssxy.yoi;
56 f:%WINDIR%\System32\cvqaikxt.apk;
57 f:%WINDIR%\System32\sysmms32.lla;
58 f:%WINDIR%\System32\Odin-Anon.Ger;
59
60
61 # http://www.symantec.com/security_response/writeup.jsp?docid=2005-042611-0148-99&tabid=2
62 [Hotword Trojan] [any] []
63 f:%WINDIR%\System32\_;
64 f:%WINDIR%\System32\explore.exe;
65 f:%WINDIR%\System32\ svchost.exe;
66 f:%WINDIR%\System32\mmsystem.dlx;
67 f:%WINDIR%\System32\WINDLL-ObjectsWin*.DLX;
68 f:%WINDIR%\System32\CFXP.DRV;
69 f:%WINDIR%\System32\CHJO.DRV;
70 f:%WINDIR%\System32\MMSYSTEM.DLX;
71 f:%WINDIR%\System32\OLECLI.DL;
72
73
74 [Beagle worm] [any] []
75 f:%WINDIR%\System32\winxp.exe;
76 f:%WINDIR%\System32\winxp.exeopen;
77 f:%WINDIR%\System32\winxp.exeopenopen;
78 f:%WINDIR%\System32\winxp.exeopenopenopen;
79 f:%WINDIR%\System32\winxp.exeopenopenopenopen;
80
81
82 # http://symantec.com/security_response/writeup.jsp?docid=2007-071711-3132-99
83 [Gpcoder Trojan] [any] [http://symantec.com/security_response/writeup.jsp?docid=2007-071711-3132-99]
84 f:%WINDIR%\System32\ntos.exe;
85 f:%WINDIR%\System32\wsnpoem;
86 f:%WINDIR%\System32\wsnpoem\audio.dll;
87 f:%WINDIR%\System32\wsnpoem\video.dll;
88 r:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run -> userinit -> r:ntos.exe;
89
90
91 # [http://www.symantec.com/security_response/writeup.jsp?docid=2006-112813-0222-99&tabid=2
92 [Looked.BK Worm] [any] []
93 f:%WINDIR%\uninstall\rundl132.exe;
94 f:%WINDIR%\Logo1_.exe;
95 f:%Windir%\RichDll.dll;
96 r:HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run -> load -> r:rundl132.exe;
97
98
99 [Possible Malware - Svchost running outside system32] [all] []
100 p:r:svchost.exe && !%WINDIR%\System32\svchost.exe;
101 f:!%WINDIR%\SysWOW64;
102
103
104 [Possible Malware - Inetinfo running outside system32\inetsrv] [all] []
105 p:r:inetinfo.exe && !%WINDIR%\System32\inetsrv\inetinfo.exe;
106 f:!%WINDIR%\SysWOW64;
107
108
109 [Possible Malware - Rbot/Sdbot detected] [any] []
110 f:%Windir%\System32\rdriv.sys;
111 f:%Windir%\lsass.exe;
112
113
114 [Possible Malware File] [any] []
115 f:%WINDIR%\utorrent.exe;
116 f:%WINDIR%\System32\utorrent.exe;
117 f:%WINDIR%\System32\Files32.vxd;
118
119
120 # Modified /etc/hosts entries
121 # Idea taken from:
122 # http://blog.tenablesecurity.com/2006/12/detecting_compr.html
123 # http://www.sophos.com/security/analyses/trojbagledll.html
124 # http://www.f-secure.com/v-descs/fantibag_b.shtml
125 [Anti-virus site on the hosts file] [any] []
126 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:avp.ch|avp.ru|nai.com;
127 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:awaps.net|ca.com|mcafee.com;
128 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:microsoft.com|f-secure.com;
129 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:sophos.com|symantec.com;
130 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:my-etrust.com|viruslist.ru;
131 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:networkassociates.com;
132 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:kaspersky|grisoft.com;
133 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:symantecliveupdate.com;
134 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:clamav.net|bitdefender.com;
135 f:%WINDIR%\System32\Drivers\etc\HOSTS -> r:antivirus.com|sans.org;
136
137
138 # EOF #