← Back to SOC feed Coverage →

Aria SBox 2

yara LOW Yara-Rules
community
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-05T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may be using custom encryption or obfuscation techniques to exfiltrate data through encrypted channels, leveraging the Aria SBox 2 algorithm to avoid detection. SOC teams should proactively hunt for this behavior to identify potential data exfiltration attempts that evade traditional signature-based detection methods.

YARA Rule

rule ARIA_SB2
{	meta:
		author = "spelissier"
		description = "Aria SBox 2"
		date = "2020-12"
		reference="http://210.104.33.10/ARIA/doc/ARIA-specification-e.pdf#page=7"
	strings:
		$c0 = { E2 4E 54 FC 94 C2 4A CC 62 0D 6A 46 3C 4D 8B D1 5E FA 64 CB B4 97 BE 2B BC 77 2E 03 D3 19 59 C1 }
	condition:
		$c0
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

This rule contains 1 string patterns in its detection logic.

References

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/crypto/crypto_signatures.yar