Nokoyawa_ransomware

YARA-2022-0007 Critical general Active

Detect_Nokoyawa_ransomware

Nokoyawa_ransomware.yar Valid Syntax
rule Nokoyawa_ransomware: Nokoyawa
{
    meta:
	description = "Detect_Nokoyawa_ransomware"
	author = "@malgamy12"
	date = "20/12/2022"
	license = "DRL 1.1"
        hash = "7095beafff5837070a89407c1bf3c6acf8221ed786e0697f6c578d4c3de0efd6"
        hash = "47c00ac29bbaee921496ef957adaf5f8b031121ef0607937b003b6ab2a895a12"
        hash = "259f9ec10642442667a40bf78f03af2fc6d653443cce7062636eb750331657c4"
  
                
    strings:
        
        $pdb = "deps\\noko.pdb" ascii

        $s1 = "How to run:" ascii
        $s2 = "--config <base64 encoded config> (to start full encryption)" ascii
        $s3 = "--config <base64 encoded config> --file <filePath>" ascii
        $s4 = "CIS lang detected! Stop working" ascii
        $s5 = "config isn't configurated to load hidden drives" ascii
        $s6 = "ENCRYPT_NETWORKYour config isn't configurated to encrypt network shares" ascii
        $s7 = "Your config isn't configurated to delete shadow copies" ascii
        $s8 = "Successfully deleted shadow copies from" ascii
        
    condition:
        uint16(0) == 0x5A4D and ($pdb or 3 of ($s*))
}

Rule Metadata

description
Detect_Nokoyawa_ransomware
author
@malgamy12
date
20/12/2022
license
DRL 1.1
hash
259f9ec10642442667a40bf78f03af2fc6d653443cce7062636eb750331657c4

Tags

Nokoyawa

String Definitions

{"name":"$pdb","value":"\"deps\\\\noko.pdb\" ascii"}
{"name":"$s1","value":"\"How to run:\" ascii"}
{"name":"$s2","value":"\"--config <base64 encoded config> (to start full encryption)\" ascii"}
{"name":"$s3","value":"\"--config <base64 encoded config> --file <filePath>\" ascii"}
{"name":"$s4","value":"\"CIS lang detected! Stop working\" ascii"}
{"name":"$s5","value":"\"config isn't configurated to load hidden drives\" ascii"}
{"name":"$s6","value":"\"ENCRYPT_NETWORKYour config isn't configurated to encrypt network shares\" ascii"}
{"name":"$s7","value":"\"Your config isn't configurated to delete shadow copies\" ascii"}
{"name":"$s8","value":"\"Successfully deleted shadow copies from\" ascii"}

Threat Analysis

This YARA rule is designed to detect general threats.

Severity Level: Critical

The rule uses pattern matching to identify specific byte sequences, strings, or behavioral patterns associated with malicious activity.

Detection Capabilities

  • File-based detection for executables and documents
  • Memory scanning for running processes
  • Network traffic analysis support

Command Line Usage

# Scan a single file
yara Nokoyawa_ransomware.yar /path/to/suspicious/file

# Scan a directory recursively
yara -r Nokoyawa_ransomware.yar /path/to/directory/

# Scan with metadata output
yara -m Nokoyawa_ransomware.yar target_file

# Scan process memory (Linux)
yara Nokoyawa_ransomware.yar /proc/[pid]/exe

Integration Examples

Python (yara-python)

import yara
rules = yara.compile(filepath='Nokoyawa_ransomware.yar')
matches = rules.match('/path/to/file')

ClamAV Integration

clamscan --yara-rules=Nokoyawa_ransomware.yar /path/to/scan

Rule Information

YARA ID
YARA-2022-0007
Created
August 19, 2025
Last Updated
August 19, 2025
Last Imported
Never

Threat Intelligence

Risk Level Critical
Category general
Detection Confidence Analysis Pending
False Positive Rate Not Available
Last Seen in Wild No Data

Export Options