SYMBOLCOMMON_NAMEaka. SYNONYMS
win.appleseed (Back to overview)

Appleseed

aka: JamBog

Actor(s): Kimsuky

VTCollection    

There is no description at this point.

References
2025-06-09GeniansGenians
Analysis of the Triple Combo Threat of the Kimsuky Group
FlowerPower Appleseed BabyShark
2024-02-07Medium s2wlabJiho Kim, Sebin Lee
Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer
AlphaSeed Appleseed Troll Stealer
2023-12-28AhnLabSanseo
Trend Analysis on Kimsuky Group’s Attacks Using AppleSeed
AlphaSeed Appleseed
2023-12-01ASECASEC
Kimsuky Group Uses AutoIt to Create Malware (RftRAT, Amadey)
XRat Amadey Appleseed PEBBLEDASH
2023-06-28AhnLabSanseo
Kimsuky Attack Group Abusing Chrome Remote Desktop
Appleseed
2022-11-02ASECASEC
Appleseed Being Distributed to Nuclear Power Plant-Related Companies
Appleseed
2022-07-21ASECASEC Analysis Team
Dissemination of AppleSeed to Specific Military Maintenance Companies
Appleseed
2022-07-11ASECASEC
AppleSeed Disguised as Purchase Order and Request Form Being Distributed
Appleseed
2022-01-05AhnLabASEC Analysis Team
Analysis Report on Kimsuky Group’s APT Attacks (AppleSeed, PebbleDash)
Appleseed Kimsuky PEBBLEDASH
2021-11-16AhnLabASEC Analysis Team
Analysis Report of Kimsuky Group's APT Attacks (AppleSeed, PebbleDash)
Appleseed PEBBLEDASH
2021-11-03TelsyTelsy Research Team
Dissecting new AppleSeed backdoor of Kimsuky threat actor
Appleseed
2021-10-07S2W Inc.Jaeki Kim, Kyoung-ju Kwak, Sojun Ryu
Operation Newton: Hi Kimsuky? Did an Apple(seed) really fall on Newton’s head?
Appleseed Kimsuky
2021-09-02AhnLabASEC Analysis Team
Attacks using metasploit meterpreter
Appleseed Meterpreter
2021-06-11TEAMT5Linda Kuo, Zih-Cing Liao
Story of the ‘Phisherman’ -Dissecting Phishing Techniques of CloudDragon APT (slides)
Appleseed BabyShark
2021-06-11YouTube (Hack In The Box Security Conference)Linda Kuo, Zih-Cing Liao
Dissecting Phishing Techniques Of CloudDragon APT
Appleseed BabyShark
2021-06-01MalwarebytesHossein Jazi
Kimsuky APT continues to target South Korean government using AppleSeed backdoor
Appleseed
2021-05-07TEAMT5Jhih-Lin Kuo, Zih-Cing Liao
"We Are About to Land": How CloudDragon Turns a Nightmare Into Reality
FlowerPower Appleseed BabyShark GoldDragon NavRAT
2021-02-28PWC UKPWC UK
Cyber Threats 2020: A Year in Retrospect
elf.wellmess FlowerPower PowGoop 8.t Dropper Agent.BTZ Agent Tesla Appleseed Ave Maria Bankshot BazarBackdoor BLINDINGCAN Chinoxy Conti Cotx RAT Crimson RAT DUSTMAN Emotet FriedEx FunnyDream Hakbit Mailto Maze METALJACK Nefilim Oblique RAT Pay2Key PlugX QakBot REvil Ryuk StoneDrill StrongPity SUNBURST SUPERNOVA TrickBot TurlaRPC Turla SilentMoon WastedLocker WellMess Winnti ZeroCleare APT10 APT23 APT27 APT31 APT41 BlackTech BRONZE EDGEWOOD Inception Framework MUSTANG PANDA Red Charon Red Nue Sea Turtle Tonto Team
2020-12-15KISAKrCERT
Operation MUZABI
Appleseed
Yara Rules
[TLP:WHITE] win_appleseed_auto (20251219 | Detects win.appleseed.)
rule win_appleseed_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2026-01-05"
        version = "1"
        description = "Detects win.appleseed."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.appleseed"
        malpedia_rule_date = "20260105"
        malpedia_hash = "19b79e7cab4eaf532122e5b45a77dd8f6bb5cc79"
        malpedia_version = "20251219"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 4989742410 41c6042400 49837f1810 7208 498b0f e8???????? 49c747180f000000 }
            // n = 7, score = 100
            //   4989742410           | dec                 eax
            //   41c6042400           | xor                 ecx, esp
            //   49837f1810           | dec                 eax
            //   7208                 | mov                 ebx, dword ptr [esp + 0xf8]
            //   498b0f               | mov                 byte ptr [ecx + 0x18], 1
            //   e8????????           |                     
            //   49c747180f000000     | dec                 ecx

        $sequence_1 = { 0f8414010000 488d15d2160200 488d4db8 e8???????? 90 488d55d8 488bc8 }
            // n = 7, score = 100
            //   0f8414010000         | dec                 eax
            //   488d15d2160200       | mov                 edx, eax
            //   488d4db8             | dec                 eax
            //   e8????????           |                     
            //   90                   | mov                 eax, dword ptr [edi + 0x18]
            //   488d55d8             | dec                 eax
            //   488bc8               | mov                 dword ptr [eax + ebp*8], edx

        $sequence_2 = { 48894c2470 33f6 89742440 48c741180f000000 48897110 408831 4533c0 }
            // n = 7, score = 100
            //   48894c2470           | dec                 eax
            //   33f6                 | lea                 ecx, [ebp + 0x10]
            //   89742440             | nop                 
            //   48c741180f000000     | dec                 eax
            //   48897110             | cmp                 dword ptr [ebx + 0x18], 0x10
            //   408831               | jb                  0xf47
            //   4533c0               | dec                 eax

        $sequence_3 = { 48837dd010 7209 488b4db8 e8???????? 48833d????????00 0f847c180000 48c745d00f000000 }
            // n = 7, score = 100
            //   48837dd010           | dec                 eax
            //   7209                 | lea                 edx, [0x21bb7]
            //   488b4db8             | dec                 eax
            //   e8????????           |                     
            //   48833d????????00     |                     
            //   0f847c180000         | lea                 ecx, [ebp - 0x48]
            //   48c745d00f000000     | nop                 

        $sequence_4 = { 480f434daf 488b5d07 4c8bc3 4c8b75bf 4c3bf3 4d0f42c6 4d85c0 }
            // n = 7, score = 100
            //   480f434daf           | dec                 eax
            //   488b5d07             | sar                 ecx, 5
            //   4c8bc3               | dec                 ebp
            //   4c8b75bf             | imul                eax, eax, 0x58
            //   4c3bf3               | dec                 esp
            //   4d0f42c6             | add                 eax, dword ptr [eax + ecx*8 + 0x36700]
            //   4d85c0               | jmp                 0xaf2

        $sequence_5 = { 4889742440 4088742430 448d463c 488d1524b40100 488d4c2430 e8???????? 90 }
            // n = 7, score = 100
            //   4889742440           | dec                 eax
            //   4088742430           | lea                 edx, [0x2191d]
            //   448d463c             | dec                 eax
            //   488d1524b40100       | lea                 ecx, [ebp - 0x48]
            //   488d4c2430           | dec                 eax
            //   e8????????           |                     
            //   90                   | lea                 ecx, [ebp - 0x48]

        $sequence_6 = { 488b5c2438 4883c420 5e c3 488d0d887c0200 e8???????? }
            // n = 6, score = 100
            //   488b5c2438           | dec                 eax
            //   4883c420             | lea                 edx, [ebp + 0x10]
            //   5e                   | dec                 eax
            //   c3                   | lea                 ecx, [esp + 0x50]
            //   488d0d887c0200       | dec                 ecx
            //   e8????????           |                     

        $sequence_7 = { 48897310 c60300 48837d9810 7209 488b4d80 }
            // n = 5, score = 100
            //   48897310             | dec                 eax
            //   c60300               | mov                 edx, eax
            //   48837d9810           | dec                 eax
            //   7209                 | lea                 ecx, [ebp - 0x78]
            //   488b4d80             | nop                 

        $sequence_8 = { e8???????? 488325????????00 4883c428 c3 488d05310a0200 c3 4053 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   488325????????00     |                     
            //   4883c428             | dec                 eax
            //   c3                   | lea                 eax, [ebp - 0x80]
            //   488d05310a0200       | dec                 ecx
            //   c3                   | or                  eax, 0xffffffff
            //   4053                 | inc                 esp

        $sequence_9 = { 488bfa 488bf1 4533f6 4489742460 44887580 33d2 41b8ff030000 }
            // n = 7, score = 100
            //   488bfa               | lea                 esi, [0x2075d]
            //   488bf1               | dec                 esp
            //   4533f6               | lea                 edi, [0x2075a]
            //   4489742460           | dec                 esp
            //   44887580             | lea                 esp, [0x20757]
            //   33d2                 | dec                 ebp
            //   41b8ff030000         | sub                 edi, edx

    condition:
        7 of them and filesize < 497664
}
[TLP:WHITE] win_appleseed_w0   (20201015 | No description)
rule win_appleseed_w0 {
    meta:
        author = "KrCERT/CC Profound Analysis Team"
        date = "2020-12-4"
        info = "Operation MUZABI"
        hash = "43cc6d190238e851d33066cbe9be9ac8"
        hash = "fd10bd6013aabadbcb9edb8a23ba7331"
        hash = "16231e2e8991c60a42f293e0c33ff801"
        hash = "89fff6645013008cda57f88639b92990"
        hash = "030e2f992cbc4e61f0d5c994779caf3b"
        hash = "3620c22671641fbf32cf496b118b85f6"
        hash = "4876fc88c361743a1220a7b161f8f06f"
        hash = "94b8a0e4356d0202dc61046e3d8bdfe0"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.appleseed"
        malpedia_rule_date = "20201015"
        malpedia_version = "20201015"
        malpedia_license = "CC NC-BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    strings:
        $appleseed_str1 = {0f 8? ?? (00|01) 00 00 [0-1] 83 f? 20 0f 8? (01|00) 00 00}
        $appleseed_str2 = {88 45 [0-15] 0f b6 44 ?? 01}
        $appleseed_str3 = {83 f? 10 [0-5] 83 e? 10}
        $appleseed_key1 = {89 04 ?9 [0-6] ff 34 ?? e8 [10-16] 89 0c 98 8b ?? 0c [0-3] ff 34 98}
        $appleseed_key2 = {83 f? 10 [0-10] 32 4c 05 ?? ?? 88 4c ?? 0f}
        $appleseed_key3 = {89 04 ?9 49 83 ?? 04 48 ?? ?? 10 8b 0c a8 e8 [0-10] 48 8b ?? ?8}
        $seed_str1 = {44 0f b6 44 3d c0 45 32 c7 44 32 45 d4}
        $seed_str2 = {0f b6 44 3? ?? [0-25] 83 c4 0c}
        $seed_str3 = {32 45 c? ?? ?? ?? 32 45 e?}

    condition: 
            uint16(0) == 0x5a4d
        and
            filesize < 400KB
        and
            (2 of ($appleseed_str*))
        and
            (1 of ($seed_str*))
        and
            (1 of ($appleseed_key*))
}
Download all Yara Rules