SYMBOLCOMMON_NAMEaka. SYNONYMS
elf.hideandseek (Back to overview)

Hide and Seek

aka: HNS

There is no description at this point.

References
2019-06-12Palo Alto Networks Unit 42Ruchna Nigam
@online{nigam:20190612:hide:fb1d18e, author = {Ruchna Nigam}, title = {{Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP}}, date = {2019-06-12}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/hide-n-seek-botnet-updates-arsenal-with-exploits-against-nexus-repository-manager-thinkphp/}, language = {English}, urldate = {2023-08-28} } Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP
Hide and Seek
2018-12-04AvastAdolf Středa, Jan Neduchal
@online{steda:20181204:hide:4927f2a, author = {Adolf Středa and Jan Neduchal}, title = {{Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.}}, date = {2018-12-04}, organization = {Avast}, url = {https://blog.avast.com/hide-n-seek-botnet-continues}, language = {English}, urldate = {2019-11-26} } Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.
Hide and Seek
2018-07-06Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180706:hns:c7115f1, author = {Catalin Cimpanu}, title = {{HNS Evolves From IoT to Cross-Platform Botnet}}, date = {2018-07-06}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/hns-evolves-from-iot-to-cross-platform-botnet/}, language = {English}, urldate = {2019-12-20} } HNS Evolves From IoT to Cross-Platform Botnet
Hide and Seek
2018-07-06360 netlabRootKiter, yegenshen
@online{rootkiter:20180706:hns:d96f016, author = {RootKiter and yegenshen}, title = {{HNS Botnet Recent Activities}}, date = {2018-07-06}, organization = {360 netlab}, url = {https://blog.netlab.360.com/hns-botnet-recent-activities-en/}, language = {English}, urldate = {2020-01-08} } HNS Botnet Recent Activities
Hide and Seek
2018-05-08Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180508:hide:5ab3dfd, author = {Catalin Cimpanu}, title = {{"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots}}, date = {2018-05-08}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/hide-and-seek-becomes-first-iot-botnet-capable-of-surviving-device-reboots/}, language = {English}, urldate = {2019-12-20} } "Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots
Hide and Seek
2018-05-07BitdefenderBogdan Botezatu
@online{botezatu:20180507:hide:0fd8d9a, author = {Bogdan Botezatu}, title = {{Hide and Seek IoT Botnet resurfaces with new tricks, persistence}}, date = {2018-05-07}, organization = {Bitdefender}, url = {https://labs.bitdefender.com/2018/05/hide-and-seek-iot-botnet-resurfaces-with-new-tricks-persistence/}, language = {English}, urldate = {2020-01-06} } Hide and Seek IoT Botnet resurfaces with new tricks, persistence
Hide and Seek
2018-04-16FortinetJasper Manuel
@online{manuel:20180416:searching:2fd67ee, author = {Jasper Manuel}, title = {{Searching for the Reuse of Mirai Code: Hide ‘N Seek Bot}}, date = {2018-04-16}, organization = {Fortinet}, url = {https://www.fortinet.com/blog/threat-research/searching-for-the-reuse-of-mirai-code--hide--n-seek-bot.html}, language = {English}, urldate = {2020-01-08} } Searching for the Reuse of Mirai Code: Hide ‘N Seek Bot
Hide and Seek
2018-01-24Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180124:new:90c5883, author = {Catalin Cimpanu}, title = {{New HNS IoT Botnet Has Already Amassed 14K Bots}}, date = {2018-01-24}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/new-hns-iot-botnet-has-already-amassed-14k-bots/}, language = {English}, urldate = {2019-12-20} } New HNS IoT Botnet Has Already Amassed 14K Bots
Hide and Seek
2018-01-24BitdefenderBogdan Botezatu
@online{botezatu:20180124:new:f993782, author = {Bogdan Botezatu}, title = {{New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild}}, date = {2018-01-24}, organization = {Bitdefender}, url = {https://labs.bitdefender.com/2018/01/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild/}, language = {English}, urldate = {2020-01-08} } New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild
Hide and Seek
2018AvastAvast
@online{avast:2018:hide:cd78bb0, author = {Avast}, title = {{Hide 'N Seek}}, date = {2018}, organization = {Avast}, url = {https://threatlabs.avast.com/botnet}, language = {English}, urldate = {2019-12-17} } Hide 'N Seek
Hide and Seek
Yara Rules
[TLP:WHITE] elf_hideandseek_auto (20230715 | Detects elf.hideandseek.)
rule elf_hideandseek_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects elf.hideandseek."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/elf.hideandseek"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b442424 39742420 7504 89c6 eb21 39442420 }
            // n = 6, score = 100
            //   8b442424             | mov                 eax, dword ptr [esp + 0x24]
            //   39742420             | cmp                 dword ptr [esp + 0x20], esi
            //   7504                 | jne                 6
            //   89c6                 | mov                 esi, eax
            //   eb21                 | jmp                 0x23
            //   39442420             | cmp                 dword ptr [esp + 0x20], eax

        $sequence_1 = { 40 663b47f0 668947ee 7238 52 52 }
            // n = 6, score = 100
            //   40                   | inc                 eax
            //   663b47f0             | cmp                 ax, word ptr [edi - 0x10]
            //   668947ee             | mov                 word ptr [edi - 0x12], ax
            //   7238                 | jb                  0x3a
            //   52                   | push                edx
            //   52                   | push                edx

        $sequence_2 = { 50 e8???????? 58 5a 6a40 8d8424b0210000 50 }
            // n = 7, score = 100
            //   50                   | push                eax
            //   e8????????           |                     
            //   58                   | pop                 eax
            //   5a                   | pop                 edx
            //   6a40                 | push                0x40
            //   8d8424b0210000       | lea                 eax, [esp + 0x21b0]
            //   50                   | push                eax

        $sequence_3 = { be04000000 83c410 84c0 7519 e9???????? }
            // n = 5, score = 100
            //   be04000000           | mov                 esi, 4
            //   83c410               | add                 esp, 0x10
            //   84c0                 | test                al, al
            //   7519                 | jne                 0x1b
            //   e9????????           |                     

        $sequence_4 = { 89c3 85c0 0f8525010000 8b442430 8d742428 f60001 0f8454ffffff }
            // n = 7, score = 100
            //   89c3                 | mov                 ebx, eax
            //   85c0                 | test                eax, eax
            //   0f8525010000         | jne                 0x12b
            //   8b442430             | mov                 eax, dword ptr [esp + 0x30]
            //   8d742428             | lea                 esi, [esp + 0x28]
            //   f60001               | test                byte ptr [eax], 1
            //   0f8454ffffff         | je                  0xffffff5a

        $sequence_5 = { 8b45f4 8a4df0 d3e8 89d7 8a4de4 09c7 8b75f4 }
            // n = 7, score = 100
            //   8b45f4               | mov                 eax, dword ptr [ebp - 0xc]
            //   8a4df0               | mov                 cl, byte ptr [ebp - 0x10]
            //   d3e8                 | shr                 eax, cl
            //   89d7                 | mov                 edi, edx
            //   8a4de4               | mov                 cl, byte ptr [ebp - 0x1c]
            //   09c7                 | or                  edi, eax
            //   8b75f4               | mov                 esi, dword ptr [ebp - 0xc]

        $sequence_6 = { 56 57 e8???????? 83c410 85c0 7510 50 }
            // n = 7, score = 100
            //   56                   | push                esi
            //   57                   | push                edi
            //   e8????????           |                     
            //   83c410               | add                 esp, 0x10
            //   85c0                 | test                eax, eax
            //   7510                 | jne                 0x12
            //   50                   | push                eax

        $sequence_7 = { 53 83ec1c 8b5c2430 8b7c2438 8b6c243c 8b742440 85db }
            // n = 7, score = 100
            //   53                   | push                ebx
            //   83ec1c               | sub                 esp, 0x1c
            //   8b5c2430             | mov                 ebx, dword ptr [esp + 0x30]
            //   8b7c2438             | mov                 edi, dword ptr [esp + 0x38]
            //   8b6c243c             | mov                 ebp, dword ptr [esp + 0x3c]
            //   8b742440             | mov                 esi, dword ptr [esp + 0x40]
            //   85db                 | test                ebx, ebx

        $sequence_8 = { 8b1f 89d8 0faf06 85c0 792c 56 57 }
            // n = 7, score = 100
            //   8b1f                 | mov                 ebx, dword ptr [edi]
            //   89d8                 | mov                 eax, ebx
            //   0faf06               | imul                eax, dword ptr [esi]
            //   85c0                 | test                eax, eax
            //   792c                 | jns                 0x2e
            //   56                   | push                esi
            //   57                   | push                edi

        $sequence_9 = { e8???????? eb09 50 57 56 56 e8???????? }
            // n = 7, score = 100
            //   e8????????           |                     
            //   eb09                 | jmp                 0xb
            //   50                   | push                eax
            //   57                   | push                edi
            //   56                   | push                esi
            //   56                   | push                esi
            //   e8????????           |                     

    condition:
        7 of them and filesize < 196608
}
Download all Yara Rules