Skip to content

Add rule for UniCraft Launcher Spyware#459

Open
koder-cog wants to merge 1 commit into
Yara-Rules:masterfrom
koder-cog:add-unicraft-rule
Open

Add rule for UniCraft Launcher Spyware#459
koder-cog wants to merge 1 commit into
Yara-Rules:masterfrom
koder-cog:add-unicraft-rule

Conversation

@koder-cog
Copy link
Copy Markdown

Adds a rule targeting the unpacked ASAR/JS payloads of the UniCraft spyware.

Context

UniCraft acts as a functional, trojanized game launcher. The outer compressed installers (NSIS, SquashFS, DMG) successfully evade most static engines (see VT links). However, dynamic analysis of the extracted payload confirms spyware behavior.

Malicious Capabilities (ASAR/JS payload)

  • Harvests HWIDs via WMI/CIM and extracts authentication sessions (unicraft-session.enc, hwid-cache.json).
  • Modifies registry (reg delete), alters permissions (icacls), and monitors for analysis tools (cheat_process_detected, tasklist).
  • Communicates with custom endpoints (e.g., api.unicraftmc.com, 213.146.165.119), occasionally using Base64 obfuscation.

Rule Logic

To prevent false-positives on legitimate game files, the rule requires a strict combination:
Identity Strings AND C2 Infrastructure AND (1+ Theft Action OR 2+ Evasion Actions)

References

Behavior (Tria.ge - Recorded Future):

Static (VirusTotal):

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant