Yara Rules for Ransomware group rcru64
/*
RCRU64 ransomware
*/
rule RCRU64
{
meta:
author = "rivitna"
family = "ransomware.rcru64.windows"
description = "RCRU64 ransomware Windows payload"
severity = 10
score = 100
strings:
$a0 = "\x00p2h6\x00" ascii
$a2 = "\x00n7t0\x00" ascii
$a3 = "\x00u4g8\x00" ascii
$a4 = "\x00wenf=\x00" ascii
$a5 = "\x00udij=\x00" ascii
$a6 = "\x00d7j3\x00" ascii
$a7 = "\x00y9a0\x00" ascii
$a8 = "\x00m5ha\x00" ascii
$a9 = "\x00Fs1z3\x00" ascii
$a10 = "\x00nqpso5938fh71jfu\x00" ascii
$a11 = "\x00U12H6AN==\x00" ascii
$a12 = "\x00&4r*3d\x00" ascii
$a13 = "\x00P7A1s\x00" ascii
$a14 = "C:\\Users\\Unknown\\source\\repos\\ConsoleApplication5_A\\Release\\ConsoleApplication5_A.pdb" ascii
$a15 = "C:\\Users\\Unknown\\source\\repos\\Decryptor_5\\Release\\Decryptor_5.pdb" ascii
$a16 = { C7 45 ?? 73 78 75 6F C7 45 ?? 6A 67 64 67 }
condition:
((uint16(0) == 0x5A4D) and (uint32(uint32(0x3C)) == 0x00004550)) and
(
(7 of ($a*))
)
}