SYMBOLCOMMON_NAMEaka. SYNONYMS
elf.hideandseek (Back to overview)

Hide and Seek

aka: HNS

There is no description at this point.

References
2018-12-04AvastAdolf Středa, Jan Neduchal
@online{steda:20181204:hide:4927f2a, author = {Adolf Středa and Jan Neduchal}, title = {{Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.}}, date = {2018-12-04}, organization = {Avast}, url = {https://blog.avast.com/hide-n-seek-botnet-continues}, language = {English}, urldate = {2019-11-26} } Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.
Hide and Seek
2018-07-06Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180706:hns:c7115f1, author = {Catalin Cimpanu}, title = {{HNS Evolves From IoT to Cross-Platform Botnet}}, date = {2018-07-06}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/hns-evolves-from-iot-to-cross-platform-botnet/}, language = {English}, urldate = {2019-12-20} } HNS Evolves From IoT to Cross-Platform Botnet
Hide and Seek
2018-07-06360 netlabRootKiter, yegenshen
@online{rootkiter:20180706:hns:d96f016, author = {RootKiter and yegenshen}, title = {{HNS Botnet Recent Activities}}, date = {2018-07-06}, organization = {360 netlab}, url = {https://blog.netlab.360.com/hns-botnet-recent-activities-en/}, language = {English}, urldate = {2020-01-08} } HNS Botnet Recent Activities
Hide and Seek
2018-05-08Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180508:hide:5ab3dfd, author = {Catalin Cimpanu}, title = {{"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots}}, date = {2018-05-08}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/hide-and-seek-becomes-first-iot-botnet-capable-of-surviving-device-reboots/}, language = {English}, urldate = {2019-12-20} } "Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots
Hide and Seek
2018-05-07BitdefenderBogdan Botezatu
@online{botezatu:20180507:hide:0fd8d9a, author = {Bogdan Botezatu}, title = {{Hide and Seek IoT Botnet resurfaces with new tricks, persistence}}, date = {2018-05-07}, organization = {Bitdefender}, url = {https://labs.bitdefender.com/2018/05/hide-and-seek-iot-botnet-resurfaces-with-new-tricks-persistence/}, language = {English}, urldate = {2020-01-06} } Hide and Seek IoT Botnet resurfaces with new tricks, persistence
Hide and Seek
2018-04-16FortinetJasper Manuel
@online{manuel:20180416:searching:2fd67ee, author = {Jasper Manuel}, title = {{Searching for the Reuse of Mirai Code: Hide ‘N Seek Bot}}, date = {2018-04-16}, organization = {Fortinet}, url = {https://www.fortinet.com/blog/threat-research/searching-for-the-reuse-of-mirai-code--hide--n-seek-bot.html}, language = {English}, urldate = {2020-01-08} } Searching for the Reuse of Mirai Code: Hide ‘N Seek Bot
Hide and Seek
2018-01-24Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180124:new:90c5883, author = {Catalin Cimpanu}, title = {{New HNS IoT Botnet Has Already Amassed 14K Bots}}, date = {2018-01-24}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/new-hns-iot-botnet-has-already-amassed-14k-bots/}, language = {English}, urldate = {2019-12-20} } New HNS IoT Botnet Has Already Amassed 14K Bots
Hide and Seek
2018-01-24BitdefenderBogdan Botezatu
@online{botezatu:20180124:new:f993782, author = {Bogdan Botezatu}, title = {{New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild}}, date = {2018-01-24}, organization = {Bitdefender}, url = {https://labs.bitdefender.com/2018/01/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild/}, language = {English}, urldate = {2020-01-08} } New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild
Hide and Seek
2018AvastAvast
@online{avast:2018:hide:cd78bb0, author = {Avast}, title = {{Hide 'N Seek}}, date = {2018}, organization = {Avast}, url = {https://threatlabs.avast.com/botnet}, language = {English}, urldate = {2019-12-17} } Hide 'N Seek
Hide and Seek
Yara Rules
[TLP:WHITE] elf_hideandseek_auto (20221010 | Detects elf.hideandseek.)
rule elf_hideandseek_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-10-07"
        version = "1"
        description = "Detects elf.hideandseek."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/elf.hideandseek"
        malpedia_rule_date = "20221007"
        malpedia_hash = "597f9539014e3d0f350c069cd804aa71679486ae"
        malpedia_version = "20221010"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 89c3 85c0 0f85f3010000 8b542408 89f8 e8???????? 89fa }
            // n = 7, score = 100
            //   89c3                 | mov                 ebx, eax
            //   85c0                 | test                eax, eax
            //   0f85f3010000         | jne                 0x1f9
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   89f8                 | mov                 eax, edi
            //   e8????????           |                     
            //   89fa                 | mov                 edx, edi

        $sequence_1 = { 89c6 8b542444 8b4c2440 895c243c 8b5c2444 0facd01c 0facf21c }
            // n = 7, score = 100
            //   89c6                 | mov                 esi, eax
            //   8b542444             | mov                 edx, dword ptr [esp + 0x44]
            //   8b4c2440             | mov                 ecx, dword ptr [esp + 0x40]
            //   895c243c             | mov                 dword ptr [esp + 0x3c], ebx
            //   8b5c2444             | mov                 ebx, dword ptr [esp + 0x44]
            //   0facd01c             | shrd                eax, edx, 0x1c
            //   0facf21c             | shrd                edx, esi, 0x1c

        $sequence_2 = { 3c6d 0f8532050000 e9???????? 3c7a 0f84d2010000 3c7e 0f851d050000 }
            // n = 7, score = 100
            //   3c6d                 | cmp                 al, 0x6d
            //   0f8532050000         | jne                 0x538
            //   e9????????           |                     
            //   3c7a                 | cmp                 al, 0x7a
            //   0f84d2010000         | je                  0x1d8
            //   3c7e                 | cmp                 al, 0x7e
            //   0f851d050000         | jne                 0x523

        $sequence_3 = { 83c410 89c3 85c0 7573 8b06 8b542408 83c00c }
            // n = 7, score = 100
            //   83c410               | add                 esp, 0x10
            //   89c3                 | mov                 ebx, eax
            //   85c0                 | test                eax, eax
            //   7573                 | jne                 0x75
            //   8b06                 | mov                 eax, dword ptr [esi]
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   83c00c               | add                 eax, 0xc

        $sequence_4 = { 83c410 ba???????? 39d3 7425 837a4400 }
            // n = 5, score = 100
            //   83c410               | add                 esp, 0x10
            //   ba????????           |                     
            //   39d3                 | cmp                 ebx, edx
            //   7425                 | je                  0x27
            //   837a4400             | cmp                 dword ptr [edx + 0x44], 0

        $sequence_5 = { 50 ffb424fc020000 e8???????? c704243c000000 e8???????? e8???????? 83c410 }
            // n = 7, score = 100
            //   50                   | push                eax
            //   ffb424fc020000       | push                dword ptr [esp + 0x2fc]
            //   e8????????           |                     
            //   c704243c000000       | mov                 dword ptr [esp], 0x3c
            //   e8????????           |                     
            //   e8????????           |                     
            //   83c410               | add                 esp, 0x10

        $sequence_6 = { 85c0 741b 55 55 8d5c2414 53 50 }
            // n = 7, score = 100
            //   85c0                 | test                eax, eax
            //   741b                 | je                  0x1d
            //   55                   | push                ebp
            //   55                   | push                ebp
            //   8d5c2414             | lea                 ebx, [esp + 0x14]
            //   53                   | push                ebx
            //   50                   | push                eax

        $sequence_7 = { 6a02 e8???????? 83c410 89c3 85c0 781e }
            // n = 6, score = 100
            //   6a02                 | push                2
            //   e8????????           |                     
            //   83c410               | add                 esp, 0x10
            //   89c3                 | mov                 ebx, eax
            //   85c0                 | test                eax, eax
            //   781e                 | js                  0x20

        $sequence_8 = { 2b4348 3dff0f0000 7e09 e8???????? a807 749e 4e }
            // n = 7, score = 100
            //   2b4348               | sub                 eax, dword ptr [ebx + 0x48]
            //   3dff0f0000           | cmp                 eax, 0xfff
            //   7e09                 | jle                 0xb
            //   e8????????           |                     
            //   a807                 | test                al, 7
            //   749e                 | je                  0xffffffa0
            //   4e                   | dec                 esi

        $sequence_9 = { 1394ec04010000 01442470 11542474 8b9424d0000000 03542470 8b842498000000 134c2474 }
            // n = 7, score = 100
            //   1394ec04010000       | adc                 edx, dword ptr [esp + ebp*8 + 0x104]
            //   01442470             | add                 dword ptr [esp + 0x70], eax
            //   11542474             | adc                 dword ptr [esp + 0x74], edx
            //   8b9424d0000000       | mov                 edx, dword ptr [esp + 0xd0]
            //   03542470             | add                 edx, dword ptr [esp + 0x70]
            //   8b842498000000       | mov                 eax, dword ptr [esp + 0x98]
            //   134c2474             | adc                 ecx, dword ptr [esp + 0x74]

    condition:
        7 of them and filesize < 196608
}
Download all Yara Rules