← Back to SOC feed Coverage →

Casper French Espionage Malware - Win32/ProxyBot.B - Dropper http://goo.gl/VRJNLo

yara CRITICAL Yara-Rules
community
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-20T11:00:00Z · Confidence: medium

Hunt Hypothesis

The hypothesis detects an adversary using a known espionage malware dropper to establish a persistent backdoor and exfiltrate data through a malicious URL. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage espionage activity before data exfiltration and lateral movement occur.

YARA Rule

rule Casper_EXE_Dropper
{

    meta:
        description = "Casper French Espionage Malware - Win32/ProxyBot.B - Dropper http://goo.gl/VRJNLo"
        author = "Florian Roth"
        reference = "http://goo.gl/VRJNLo"
        date = "2015/03/05"
        hash = "e4cc35792a48123e71a2c7b6aa904006343a157a"
        score = 80

    strings:
        $s0 = "<Command>" fullword ascii
        $s1 = "</Command>" fullword ascii
        $s2 = "\" /d \"" fullword ascii
        $s4 = "'%s' %s" fullword ascii
        $s5 = "nKERNEL32.DLL" fullword wide
        $s6 = "@ReturnValue" fullword wide
        $s7 = "ID: 0x%x" fullword ascii
        $s8 = "Name: %S" fullword ascii

    condition:
        7 of them
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

This rule contains 8 string patterns in its detection logic.

References

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/malware/APT_Casper.yar