Yara Rules for Ransomware group  phobos

import "pe"

rule EXE_Ransomware_Phobos_Feb2024 {
    meta:
        Description = "Detects Phobos Ransomware that was used to attack hospitals in Romania"
        author = "Yashraj Solanki - Cyber Threat Intelligence Analyst at Bridewell"
        Credits = "Is Now on VT! for the notification of the malware sample"
        Reference = "https://grahamcluley.com/20-hospitals-in-romania-hit-hard-by-ransomware-attack-on-it-service-provider/"
        Hash = "396a2f2dd09c936e93d250e8467ac7a9c0a923ea7f9a395e63c375b877a399a6"
        Sample_Size = "Matches around 125 Phobos Samples"
        date = "2024-02-21"
        yarahub_author_twitter = "@RustyNoob619"
        yarahub_reference_md5 = "ca52ef8f80a99a01e97dc8cf7d3f5487"
        yarahub_uuid = "be73dd7a-acee-4a8d-a57f-a1dbd18482ba"
        yarahub_license = "CC0 1.0"
        yarahub_rule_matching_tlp = "TLP:WHITE"
        yarahub_rule_sharing_tlp = "TLP:WHITE"
        malpedia_family = "win.phobos"
    
    strings:
        $hex = {5c005c003f005c0055004e0043005c005c005c0065002d00}  // Represents \\?\UNC\\\e-
    condition:
        pe.imphash() == "851a0ba8fbb71710075bdfe6dcef92eb"
        and $hex
       
 }