Yara Rules for Ransomware group bluelocker
/*
BlueLocker (MemeCryptor) ransomware
*/
rule BlueLocker
{
meta:
author = "rivitna"
family = "ransomware.bluelocker"
description = "BlueLocker ransomware Windows payload"
severity = 10
score = 100
strings:
// String decryption
$h0 = { 0F 8F ?? 01 00 00 3D 00 00 A0 00 0F 82 ?? 01 00 00
85 C? 0F 8F ?? 01 00 00 7C 0B 3D 00 00 ( 20 03 | 40 06)
0F 83 ?? 01 00 00 }
$s0 = "wbizecif48njqgpprzkm6769" ascii wide
$s1 = "\x00Bule Cryptor\x00" ascii wide
$s2 = "\x00.blue\x00" ascii wide
$s3 = "\x00restore_file.txt\x00" ascii wide
$s4 = "wmic SHADOWCOPY DELETE" ascii wide fullword
$s5 = " LOCKER****" ascii
$s6 = "[ Hello! ]" ascii
$s7 = "!!! DANGER !!!" ascii
condition:
((uint16(0) == 0x5A4D) and (uint32(uint32(0x3C)) == 0x00004550)) and
(
(1 of ($h*)) or (4 of ($s*))
)
}