Yara Rules for Ransomware group chaos
rule ransomware_win_chaos {
meta:
id = "c1876a18-0618-44e2-8919-b4a041de97e7"
description = "Detects the Chaos Ransomware"
author = "Sekoia.io"
version = "1.0"
creation_date = "2022-01-18"
classification = "TLP:CLEAR"
strings:
$rep00 = "\\Desktop" wide
$rep01 = "\\Links" wide
$rep02 = "\\Contacts" wide
$rep03 = "\\Documents" wide
$rep04 = "\\Downloads" wide
$rep05 = "\\Pictures" wide
$rep06 = "\\Music" wide
$rep07 = "\\OneDrive" wide
$rep08 = "\\Saved Games" wide
$rep09 = "\\Favorites" wide
$rep10 = "\\Searches" wide
$rep11 = "\\Videos" wide
$rep12 = "C:\\Users\\" wide
$str0 = "svchost.exe" wide
$str1 = "\\privateKey.chaos" wide
$str2 = "Chaos Ransomware" wide
$str3 = "read_it.txt" wide
$str4 = "<EncryptedKey>" wide
$str5 = "passwordBytes" ascii
$str6 = "lookForDirectories" ascii
$str7 = "Rfc2898DeriveBytes" ascii
$str8 = "ICryptoTransform" ascii
$str9 = "FromBase64String" ascii
$ext0 = ".torrent" wide
$ext1 = ".ibank" wide
$ext2 = ".wallet" wide
$ext3 = ".swift" wide
$ext4 = ".onetoc2" wide
condition:
uint16(0) == 0x5a4d and
filesize > 50KB and filesize < 2MB and
6 of ($str*) and 10 of ($rep*) and 4 of ($ext*)
}