Yara Rules for Ransomware group blackbyte
/*
BlackByte ransomware
*/
rule BlackByte
{
meta:
author = "rivitna"
family = "ransomware.hive"
description = "BlackByte ransomware Windows payload"
severity = 10
score = 100
strings:
// String decryption
$h0 = { 83 E? 05 48 83 C? 01 88 4? FF 4? 39 ?? (74 | 75) ?? }
$s0 = "\x00main.RSA\x00" ascii
$s1 = "\x00main._Cfunc_Begin\x00" ascii
$s2 = "\x00main._Cfunc_Inj\x00" ascii
$s3 = "\x00main.Inja" ascii
$s4 = "\x00main.SetWinVer\x00" ascii
$s5 = "\x00main.DelShadows" ascii
$s6 = "\x00main.StartNetworkS" ascii
$s7 = "\x00main.EnableLink" ascii
$s8 = "\x00main.EnableLongPaths" ascii
$s9 = "\x00main.GrantAll" ascii
$s10 = "\x00main.LanScan" ascii
$s11 = "\x00main.SetupKey\x00" ascii
$s12 = "\x00main.PbKey\x00" ascii
$s13 = "\x00main.Pognali" ascii
$s14 = "\x00main.ShowNote" ascii
$s15 = "\x00main.MountDrives" ascii
$s16 = "\x00main.StopAllsvc" ascii
$s17 = "\x00main.GenDrives" ascii
$s18 = "\x00main.ParsePC" ascii
$s19 = "\x00main.GetAccess" ascii
$s20 = "\x00main.KillHypers" ascii
$s21 = "\x00main.ParseHypers" ascii
$s22 = "\x00main.Aes256Encr\x00" ascii
$s23 = "\x00main.Aes256Decr\x00" ascii
condition:
((uint16(0) == 0x5A4D) and (uint32(uint32(0x3C)) == 0x00004550)) and
(
(1 of ($h*)) or (4 of ($s*))
)
}