Yara Rules for Ransomware group enmity
/*
Enmity ransomware
*/
rule Enmity
{
meta:
author = "rivitna"
family = "ransomware.enmity.windows"
description = "Enmity ransomware Windows payload"
severity = 10
score = 100
strings:
$h0 = "\\Enmity\\Release\\Enmity.pdb" ascii
$h1 = "\\Mammon\\Release\\Mammon.pdb" ascii
$h2 = "CARE=\x00" ascii
$h3 = "\x00\nMail:\x00\x00\nData" ascii
$h4 = { 5D 00 49 00 44 00 2D 00 5B 00 00 00 ( 2D | 2E ) 00
4D 00 61 00 69 00 6C 00 ( 2D 00 5B | 5B ) 00 00 00 }
$h5 = "QWERTYUIOPASDFGHJKLMNBVCXZqwertyuiopasdfghjklz1234567890xcvbnm" ascii
$h6 = "\x00space\x00\x00\x00create_directories\x00\x00current_path()\x00" ascii
$h7 = { 68 99 99 01 00 6A 01 5? E8 [4] 83 C4 20 [4-12]
68 99 99 01 00 }
$h8 = { FF FF E8 03 10 00 0F 86 }
condition:
((uint16(0) == 0x5A4D) and (uint32(uint32(0x3C)) == 0x00004550)) and
(
(4 of ($h*))
)
}