Yara Rules for Ransomware group  losttrust

rule LostTrust {
	meta:
		description = "rule to detect LostTrust ransomware"
		author = "ShadowStackRe.com"
		date = "2023-11-26"
		Rule_Version = "v1"
		malware_type = "ransomware"
		malware_family = "LostTrust"
		License = "MIT License, https://opensource.org/license/mit/"
	strings:
		$strOption1 = "--onlypath" ascii wide
		$strOption2 = "--enable-shares" ascii wide
		$strEncodedLog = "ENCODED : %ws (total files : %d)"
		$strExt = ".losttrustencoded" ascii wide
		$strDecryptLog = "decrypt file %ws, %ws"
		$strReadMe1 = "So we decided to change our business model."
		$strReadMe2 = "This is serious business for us"
	condition:
		all of them
}