Yara Rules for Ransomware group trinity
/*
Trinity ransomware
*/
rule Trinity
{
meta:
author = "rivitna"
family = "ransomware.trinity.windows"
description = "Trinity ransomware Windows payload"
severity = 10
score = 100
strings:
$s0 = "\x00pbsecGOOD\x00" ascii
$s1 = "\x00secpbGOOD\x00" ascii
$s2 = "12210111111610599117115" ascii
$s3 = "\x00OnlyCr :\x00" ascii
$s4 = "\x00FullCr :\x00" ascii
$s5 = "\x00enableOnlyTest \x00" ascii
$s6 = "\x00EnableAutoStart \x00" ascii
$s7 = "\x00enableSelfDelete \x00" ascii
$s8 = "\x00enableStartOnRun \x00" ascii
$s9 = "\x00enableWallaper \x00" ascii
$s10 = "\x00enableNetwork \x00" ascii
$s11 = "\x00enableCustomCMD1 \x00" ascii
$s12 = "\x00enableFullEncrExt \x00" ascii
$s13 = "\x00enableCryptOnlyExtension \x00" ascii
$s14 = "\x00enableCryptOnlyExtension \x00" ascii
$s15 = "\x00%s%x%x%x%x.goodgame\x00" wide
$h0 = { B? 01 00 00 00 33 ?? 0F B6 [10] C1 E? 08 83 F? 18 72 EC }
$h1 = { 00 6A 00 68 63 04 00 00 FF 35 [4] FF }
condition:
((uint16(0) == 0x5A4D) and (uint32(uint32(0x3C)) == 0x00004550)) and
(
((1 of ($h*)) and (4 of ($s*))) or
(10 of them)
)
}