SYMBOLCOMMON_NAMEaka. SYNONYMS
win.asruex (Back to overview)

Asruex

Actor(s): DarkHotel


There is no description at this point.

References
2020-06-14BushidoTokenBushidoToken
@online{bushidotoken:20200614:deepdive:3a375ca, author = {BushidoToken}, title = {{Deep-dive: The DarkHotel APT}}, date = {2020-06-14}, organization = {BushidoToken}, url = {https://blog.bushidotoken.net/2020/06/deep-dive-darkhotel-apt.html}, language = {English}, urldate = {2020-06-16} } Deep-dive: The DarkHotel APT
Asruex Ghost RAT Ramsay Retro Unidentified 076 (Higaisa LNK to Shellcode)
2019-08-22Trend MicroIan Mercado, Mhica Romero
@online{mercado:20190822:asruex:9284e85, author = {Ian Mercado and Mhica Romero}, title = {{Asruex Backdoor Variant Infects Word Documents and PDFs Through Old MS Office and Adobe Vulnerabilities}}, date = {2019-08-22}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/asruex-backdoor-variant-infects-word-documents-and-pdfs-through-old-ms-office-and-adobe-vulnerabilities/}, language = {English}, urldate = {2020-01-13} } Asruex Backdoor Variant Infects Word Documents and PDFs Through Old MS Office and Adobe Vulnerabilities
Asruex
Yara Rules
[TLP:WHITE] win_asruex_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_asruex_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.asruex"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { ff15???????? 85c0 7407 3d14270000 }
            // n = 4, score = 200
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   7407                 | je                  9
            //   3d14270000           | cmp                 eax, 0x2714

        $sequence_1 = { 740c 3c09 7408 3c0d 7404 3c0a 7516 }
            // n = 7, score = 200
            //   740c                 | je                  0xe
            //   3c09                 | cmp                 al, 9
            //   7408                 | je                  0xa
            //   3c0d                 | cmp                 al, 0xd
            //   7404                 | je                  6
            //   3c0a                 | cmp                 al, 0xa
            //   7516                 | jne                 0x18

        $sequence_2 = { 3c0d 7404 3c0a 7516 }
            // n = 4, score = 200
            //   3c0d                 | cmp                 al, 0xd
            //   7404                 | je                  6
            //   3c0a                 | cmp                 al, 0xa
            //   7516                 | jne                 0x18

        $sequence_3 = { 83f801 740e 83f803 7409 83f802 }
            // n = 5, score = 200
            //   83f801               | cmp                 eax, 1
            //   740e                 | je                  0x10
            //   83f803               | cmp                 eax, 3
            //   7409                 | je                  0xb
            //   83f802               | cmp                 eax, 2

        $sequence_4 = { 3c78 7404 3c58 7505 bb01000000 }
            // n = 5, score = 200
            //   3c78                 | cmp                 al, 0x78
            //   7404                 | je                  6
            //   3c58                 | cmp                 al, 0x58
            //   7505                 | jne                 7
            //   bb01000000           | mov                 ebx, 1

        $sequence_5 = { 7408 3c0d 7404 3c0a 7516 }
            // n = 5, score = 200
            //   7408                 | je                  0xa
            //   3c0d                 | cmp                 al, 0xd
            //   7404                 | je                  6
            //   3c0a                 | cmp                 al, 0xa
            //   7516                 | jne                 0x18

        $sequence_6 = { e8???????? 83f8ff 7407 3d0000a000 }
            // n = 4, score = 200
            //   e8????????           |                     
            //   83f8ff               | cmp                 eax, -1
            //   7407                 | je                  9
            //   3d0000a000           | cmp                 eax, 0xa00000

        $sequence_7 = { 3c09 7408 3c0d 7404 3c0a 7516 }
            // n = 6, score = 200
            //   3c09                 | cmp                 al, 9
            //   7408                 | je                  0xa
            //   3c0d                 | cmp                 al, 0xd
            //   7404                 | je                  6
            //   3c0a                 | cmp                 al, 0xa
            //   7516                 | jne                 0x18

        $sequence_8 = { 85c0 740e 85ed 740a }
            // n = 4, score = 200
            //   85c0                 | test                eax, eax
            //   740e                 | je                  0x10
            //   85ed                 | test                ebp, ebp
            //   740a                 | je                  0xc

        $sequence_9 = { 7404 3c58 7505 bb01000000 }
            // n = 4, score = 200
            //   7404                 | je                  6
            //   3c58                 | cmp                 al, 0x58
            //   7505                 | jne                 7
            //   bb01000000           | mov                 ebx, 1

    condition:
        7 of them and filesize < 1564672
}
Download all Yara Rules