SYMBOLCOMMON_NAMEaka. SYNONYMS
win.adhubllka (Back to overview)

Adhubllka


Some Ransomware distributed by TA547 in Australia

References
2020-07-17ProofpointSherrod DeGrippo
@online{degrippo:20200717:ta547:cec93e0, author = {Sherrod DeGrippo}, title = {{TA547 Pivots from Ursnif Banking Trojan to Ransomware in Australian Campaign}}, date = {2020-07-17}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/blog/security-briefs/ta547-pivots-ursnif-banking-trojan-ransomware-australian-campaign}, language = {English}, urldate = {2020-07-23} } TA547 Pivots from Ursnif Banking Trojan to Ransomware in Australian Campaign
Adhubllka
Yara Rules
[TLP:WHITE] win_adhubllka_auto (20201023 | autogenerated rule brought to you by yara-signator)
rule win_adhubllka_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-12-22"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.adhubllka"
        malpedia_rule_date = "20201222"
        malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130"
        malpedia_version = "20201023"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { c1c70d 33f9 897da0 897df4 8d0c1f 8b9d6cffffff }
            // n = 6, score = 500
            //   c1c70d               | rol                 edi, 0xd
            //   33f9                 | xor                 edi, ecx
            //   897da0               | mov                 dword ptr [ebp - 0x60], edi
            //   897df4               | mov                 dword ptr [ebp - 0xc], edi
            //   8d0c1f               | lea                 ecx, [edi + ebx]
            //   8b9d6cffffff         | mov                 ebx, dword ptr [ebp - 0x94]

        $sequence_1 = { 8b4dd4 2b4f30 89472c 8b45d8 1b4734 894f30 8b4ddc }
            // n = 7, score = 500
            //   8b4dd4               | mov                 ecx, dword ptr [ebp - 0x2c]
            //   2b4f30               | sub                 ecx, dword ptr [edi + 0x30]
            //   89472c               | mov                 dword ptr [edi + 0x2c], eax
            //   8b45d8               | mov                 eax, dword ptr [ebp - 0x28]
            //   1b4734               | sbb                 eax, dword ptr [edi + 0x34]
            //   894f30               | mov                 dword ptr [edi + 0x30], ecx
            //   8b4ddc               | mov                 ecx, dword ptr [ebp - 0x24]

        $sequence_2 = { 0fa4ce01 03c9 03c8 8bc3 13f2 f76f30 03c8 }
            // n = 7, score = 500
            //   0fa4ce01             | shld                esi, ecx, 1
            //   03c9                 | add                 ecx, ecx
            //   03c8                 | add                 ecx, eax
            //   8bc3                 | mov                 eax, ebx
            //   13f2                 | adc                 esi, edx
            //   f76f30               | imul                dword ptr [edi + 0x30]
            //   03c8                 | add                 ecx, eax

        $sequence_3 = { 894734 83c240 8b45e8 83c640 }
            // n = 4, score = 500
            //   894734               | mov                 dword ptr [edi + 0x34], eax
            //   83c240               | add                 edx, 0x40
            //   8b45e8               | mov                 eax, dword ptr [ebp - 0x18]
            //   83c640               | add                 esi, 0x40

        $sequence_4 = { 0f28c8 660f72f00c 660f72d114 660febc8 0f28c1 660ffec2 0f2895f0feffff }
            // n = 7, score = 500
            //   0f28c8               | movaps              xmm1, xmm0
            //   660f72f00c           | pslld               xmm0, 0xc
            //   660f72d114           | psrld               xmm1, 0x14
            //   660febc8             | por                 xmm1, xmm0
            //   0f28c1               | movaps              xmm0, xmm1
            //   660ffec2             | paddd               xmm0, xmm2
            //   0f2895f0feffff       | movaps              xmm2, xmmword ptr [ebp - 0x110]

        $sequence_5 = { 894580 33c7 c1c007 8945b4 8b45c4 03c3 8bf0 }
            // n = 7, score = 500
            //   894580               | mov                 dword ptr [ebp - 0x80], eax
            //   33c7                 | xor                 eax, edi
            //   c1c007               | rol                 eax, 7
            //   8945b4               | mov                 dword ptr [ebp - 0x4c], eax
            //   8b45c4               | mov                 eax, dword ptr [ebp - 0x3c]
            //   03c3                 | add                 eax, ebx
            //   8bf0                 | mov                 esi, eax

        $sequence_6 = { 1b8415c8feffff 898c15c4feffff 898415c8feffff 83c208 83fa50 72ce 6a48 }
            // n = 7, score = 500
            //   1b8415c8feffff       | sbb                 eax, dword ptr [ebp + edx - 0x138]
            //   898c15c4feffff       | mov                 dword ptr [ebp + edx - 0x13c], ecx
            //   898415c8feffff       | mov                 dword ptr [ebp + edx - 0x138], eax
            //   83c208               | add                 edx, 8
            //   83fa50               | cmp                 edx, 0x50
            //   72ce                 | jb                  0xffffffd0
            //   6a48                 | push                0x48

        $sequence_7 = { 1b4644 894e40 8b4dec 2b4e48 894644 8b45f0 }
            // n = 6, score = 500
            //   1b4644               | sbb                 eax, dword ptr [esi + 0x44]
            //   894e40               | mov                 dword ptr [esi + 0x40], ecx
            //   8b4dec               | mov                 ecx, dword ptr [ebp - 0x14]
            //   2b4e48               | sub                 ecx, dword ptr [esi + 0x48]
            //   894644               | mov                 dword ptr [esi + 0x44], eax
            //   8b45f0               | mov                 eax, dword ptr [ebp - 0x10]

        $sequence_8 = { 8bd7 8bc8 e8???????? 83c404 83473001 7503 ff4734 }
            // n = 7, score = 500
            //   8bd7                 | mov                 edx, edi
            //   8bc8                 | mov                 ecx, eax
            //   e8????????           |                     
            //   83c404               | add                 esp, 4
            //   83473001             | add                 dword ptr [edi + 0x30], 1
            //   7503                 | jne                 5
            //   ff4734               | inc                 dword ptr [edi + 0x34]

        $sequence_9 = { 85c0 0f8592000000 68???????? 8d85d0fdffff 50 }
            // n = 5, score = 500
            //   85c0                 | test                eax, eax
            //   0f8592000000         | jne                 0x98
            //   68????????           |                     
            //   8d85d0fdffff         | lea                 eax, [ebp - 0x230]
            //   50                   | push                eax

    condition:
        7 of them and filesize < 253952
}
Download all Yara Rules