Malware that abuses the Common Log File System (CLFS) to store/hide a second stage payload via registry transaction files.
import "math" import "pe" rule win_privatelog_w0 { meta: author = "adrien.bataille@mandiant.com" description = "Detects possible hijack of legitimate prntvpt.dll based on missing export" md5 = "91b08896fbda9edb8b6f93a6bc811ec6" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.privatelog" malpedia_rule_date = "20230119" malpedia_hash = "" malpedia_version = "20230119" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" condition: uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and pe.exports("PTOpenProviderEx") and not pe.exports("MergeAndValidatePrintTicketThunk") }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below. Changes regarding references should be proposed on the Malpedia library page.
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY