SYMBOLCOMMON_NAMEaka. SYNONYMS
win.appleseed (Back to overview)

Appleseed

aka: JamBog

Actor(s): Kimsuky

VTCollection    

There is no description at this point.

References
2024-02-07Medium s2wlabJiho Kim, Sebin Lee
Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer
AlphaSeed Appleseed Troll Stealer
2023-12-28AhnLabSanseo
Trend Analysis on Kimsuky Group’s Attacks Using AppleSeed
AlphaSeed Appleseed
2023-12-01ASECASEC
Kimsuky Group Uses AutoIt to Create Malware (RftRAT, Amadey)
XRat Amadey Appleseed PEBBLEDASH
2023-06-28AhnLabSanseo
Kimsuky Attack Group Abusing Chrome Remote Desktop
Appleseed
2022-11-02ASECASEC
Appleseed Being Distributed to Nuclear Power Plant-Related Companies
Appleseed
2022-07-21ASECASEC Analysis Team
Dissemination of AppleSeed to Specific Military Maintenance Companies
Appleseed
2022-07-11ASECASEC
AppleSeed Disguised as Purchase Order and Request Form Being Distributed
Appleseed
2022-01-05AhnLabASEC Analysis Team
Analysis Report on Kimsuky Group’s APT Attacks (AppleSeed, PebbleDash)
Appleseed Kimsuky PEBBLEDASH
2021-11-16AhnLabASEC Analysis Team
Analysis Report of Kimsuky Group's APT Attacks (AppleSeed, PebbleDash)
Appleseed PEBBLEDASH
2021-11-03TelsyTelsy Research Team
Dissecting new AppleSeed backdoor of Kimsuky threat actor
Appleseed
2021-10-07S2W Inc.Jaeki Kim, Kyoung-ju Kwak, Sojun Ryu
Operation Newton: Hi Kimsuky? Did an Apple(seed) really fall on Newton’s head?
Appleseed Kimsuky
2021-09-02AhnLabASEC Analysis Team
Attacks using metasploit meterpreter
Appleseed Meterpreter
2021-06-11TEAMT5Linda Kuo, Zih-Cing Liao
Story of the ‘Phisherman’ -Dissecting Phishing Techniques of CloudDragon APT (slides)
Appleseed BabyShark
2021-06-11YouTube (Hack In The Box Security Conference)Linda Kuo, Zih-Cing Liao
Dissecting Phishing Techniques Of CloudDragon APT
Appleseed BabyShark
2021-06-01MalwarebytesHossein Jazi
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
Appleseed
2021-05-07TEAMT5Jhih-Lin Kuo, Zih-Cing Liao
"We Are About to Land": How CloudDragon Turns a Nightmare Into Reality
FlowerPower Appleseed BabyShark GoldDragon NavRAT
2021-02-28PWC UKPWC UK
Cyber Threats 2020: A Year in Retrospect
elf.wellmess FlowerPower PowGoop 8.t Dropper Agent.BTZ Agent Tesla Appleseed Ave Maria Bankshot BazarBackdoor BLINDINGCAN Chinoxy Conti Cotx RAT Crimson RAT DUSTMAN Emotet FriedEx FunnyDream Hakbit Mailto Maze METALJACK Nefilim Oblique RAT Pay2Key PlugX QakBot REvil Ryuk StoneDrill StrongPity SUNBURST SUPERNOVA TrickBot TurlaRPC Turla SilentMoon WastedLocker WellMess Winnti ZeroCleare APT10 APT23 APT27 APT31 APT41 BlackTech BRONZE EDGEWOOD Inception Framework MUSTANG PANDA Red Charon Red Nue Sea Turtle Tonto Team
2020-12-15KISAKrCERT
Operation MUZABI
Appleseed
Yara Rules
[TLP:WHITE] win_appleseed_auto (20241030 | Detects win.appleseed.)
rule win_appleseed_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2024-10-31"
        version = "1"
        description = "Detects win.appleseed."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.appleseed"
        malpedia_rule_date = "20241030"
        malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4"
        malpedia_version = "20241030"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 4881ecf0010000 48c745d8feffffff 48895810 48897018 488b05???????? }
            // n = 5, score = 100
            //   4881ecf0010000       | ret                 
            //   48c745d8feffffff     | dec                 eax
            //   48895810             | lea                 edx, [0x2cb74]
            //   48897018             | mov                 eax, ecx
            //   488b05????????       |                     

        $sequence_1 = { e8???????? 48833d????????00 0f842e020000 488d150c170200 488d4db8 e8???????? 90 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   48833d????????00     |                     
            //   0f842e020000         | mov                 edx, edi
            //   488d150c170200       | inc                 esp
            //   488d4db8             | mov                 eax, dword ptr [ecx + edi*4 + 0x2c3b0]
            //   e8????????           |                     
            //   90                   | inc                 ebp

        $sequence_2 = { 7367 4863d9 4c8d357a640100 488bfb 83e31f 48c1ff05 }
            // n = 6, score = 100
            //   7367                 | dec                 eax
            //   4863d9               | xor                 ecx, esp
            //   4c8d357a640100       | dec                 eax
            //   488bfb               | cmp                 dword ptr [ebp + 0xd8], 0x10
            //   83e31f               | dec                 eax
            //   48c1ff05             | cmovae              edx, dword ptr [ebp + 0xc0]

        $sequence_3 = { 85c0 74ac 488d15b2e10100 488bcb e8???????? 85c0 7499 }
            // n = 7, score = 100
            //   85c0                 | mov                 ecx, eax
            //   74ac                 | je                  0x492
            //   488d15b2e10100       | inc                 esp
            //   488bcb               | mov                 dword ptr [ebp + 0xa0], esi
            //   e8????????           |                     
            //   85c0                 | dec                 eax
            //   7499                 | lea                 edx, [ebp + 0x80]

        $sequence_4 = { 817d0063736de0 7528 48833d????????00 741e 488d0da9000100 e8???????? }
            // n = 6, score = 100
            //   817d0063736de0       | mov                 byte ptr [ebp + 0x20], 0
            //   7528                 | xor                 edx, edx
            //   48833d????????00     |                     
            //   741e                 | inc                 ecx
            //   488d0da9000100       | mov                 eax, 0x3ff
            //   e8????????           |                     

        $sequence_5 = { 488bf0 4889442478 4885c0 7506 }
            // n = 4, score = 100
            //   488bf0               | lea                 ecx, [0xfffe8f05]
            //   4889442478           | dec                 eax
            //   4885c0               | test                esi, esi
            //   7506                 | jle                 0xf3f

        $sequence_6 = { 48898540010000 48c745d80f000000 488975d0 c645c000 4d8bce 4533c0 498bd4 }
            // n = 7, score = 100
            //   48898540010000       | dec                 eax
            //   48c745d80f000000     | mov                 dword ptr [esp + 0x78], 0xf
            //   488975d0             | dec                 eax
            //   c645c000             | mov                 dword ptr [esp + 0x70], esi
            //   4d8bce               | mov                 byte ptr [esp + 0x60], 0
            //   4533c0               | dec                 eax
            //   498bd4               | cmp                 dword ptr [esp + 0x58], 0x10

        $sequence_7 = { 48833d????????00 0f8404040000 488d1552170200 488d4db8 e8???????? 90 488d55d8 }
            // n = 7, score = 100
            //   48833d????????00     |                     
            //   0f8404040000         | dec                 eax
            //   488d1552170200       | lea                 ecx, [ebp - 0x80]
            //   488d4db8             | nop                 
            //   e8????????           |                     
            //   90                   | dec                 eax
            //   488d55d8             | mov                 dword ptr [ebp - 0x40], esi

        $sequence_8 = { e9???????? 488d8af0000000 e9???????? 488b8a60000000 e9???????? 488d8a10010000 e9???????? }
            // n = 7, score = 100
            //   e9????????           |                     
            //   488d8af0000000       | mov                 dword ptr [ebp + 0x30], eax
            //   e9????????           |                     
            //   488b8a60000000       | inc                 ebp
            //   e9????????           |                     
            //   488d8a10010000       | mov                 esi, eax
            //   e9????????           |                     

        $sequence_9 = { 488d4b04 4c8d05df770000 418d5216 e8???????? 85c0 0f8544090000 }
            // n = 6, score = 100
            //   488d4b04             | dec                 eax
            //   4c8d05df770000       | lea                 ecx, [edx + 0x140]
            //   418d5216             | dec                 eax
            //   e8????????           |                     
            //   85c0                 | mov                 ecx, dword ptr [edx + 0x40]
            //   0f8544090000         | dec                 eax

    condition:
        7 of them and filesize < 497664
}
[TLP:WHITE] win_appleseed_w0   (20201015 | No description)
rule win_appleseed_w0 {
    meta:
        author = "KrCERT/CC Profound Analysis Team"
        date = "2020-12-4"
        info = "Operation MUZABI"
        hash = "43cc6d190238e851d33066cbe9be9ac8"
        hash = "fd10bd6013aabadbcb9edb8a23ba7331"
        hash = "16231e2e8991c60a42f293e0c33ff801"
        hash = "89fff6645013008cda57f88639b92990"
        hash = "030e2f992cbc4e61f0d5c994779caf3b"
        hash = "3620c22671641fbf32cf496b118b85f6"
        hash = "4876fc88c361743a1220a7b161f8f06f"
        hash = "94b8a0e4356d0202dc61046e3d8bdfe0"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.appleseed"
        malpedia_rule_date = "20201015"
        malpedia_version = "20201015"
        malpedia_license = "CC NC-BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    strings:
        $appleseed_str1 = {0f 8? ?? (00|01) 00 00 [0-1] 83 f? 20 0f 8? (01|00) 00 00}
        $appleseed_str2 = {88 45 [0-15] 0f b6 44 ?? 01}
        $appleseed_str3 = {83 f? 10 [0-5] 83 e? 10}
        $appleseed_key1 = {89 04 ?9 [0-6] ff 34 ?? e8 [10-16] 89 0c 98 8b ?? 0c [0-3] ff 34 98}
        $appleseed_key2 = {83 f? 10 [0-10] 32 4c 05 ?? ?? 88 4c ?? 0f}
        $appleseed_key3 = {89 04 ?9 49 83 ?? 04 48 ?? ?? 10 8b 0c a8 e8 [0-10] 48 8b ?? ?8}
        $seed_str1 = {44 0f b6 44 3d c0 45 32 c7 44 32 45 d4}
        $seed_str2 = {0f b6 44 3? ?? [0-25] 83 c4 0c}
        $seed_str3 = {32 45 c? ?? ?? ?? 32 45 e?}

    condition: 
            uint16(0) == 0x5a4d
        and
            filesize < 400KB
        and
            (2 of ($appleseed_str*))
        and
            (1 of ($seed_str*))
        and
            (1 of ($appleseed_key*))
}
Download all Yara Rules