SYMBOLCOMMON_NAMEaka. SYNONYMS
win.bandook (Back to overview)

Bandook

aka: Bandok

Actor(s): Dark Caracal


Bandook malware is a remote access trojan (RAT) first seen in 2007 and has been active for several years. Written in both Delphi and C++, it was first seen as a commercial RAT developed by a Lebanese creator named PrinceAli. Over the years, several variants of Bandook were leaked online, and the malware became available for public download.

References
2023-02-10Electronic Frontier FoundationCooper Quintin
@online{quintin:20230210:uncle:8c22271, author = {Cooper Quintin}, title = {{Uncle Sow: Dark Caracal in Latin America}}, date = {2023-02-10}, organization = {Electronic Frontier Foundation}, url = {https://www.eff.org/deeplinks/2023/02/uncle-sow-dark-caracal-latin-america}, language = {English}, urldate = {2023-02-21} } Uncle Sow: Dark Caracal in Latin America
Bandook
2021-07-19ProofpointJoe Wise, Konstantin Klinger, Selena Larson, Proofpoint Threat Research Team
@online{wise:20210719:new:cb02a85, author = {Joe Wise and Konstantin Klinger and Selena Larson and Proofpoint Threat Research Team}, title = {{New Threat Actor Uses Spanish Language Lures to Distribute Seldom Observed Bandook Malware}}, date = {2021-07-19}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/blog/threat-insight/new-threat-actor-uses-spanish-language-lures-distribute-seldom-observed-bandook}, language = {English}, urldate = {2021-07-26} } New Threat Actor Uses Spanish Language Lures to Distribute Seldom Observed Bandook Malware
Bandook
2021-07-07ESET ResearchFernando Tavella, Matías Porolli
@online{tavella:20210707:bandidos:f734d08, author = {Fernando Tavella and Matías Porolli}, title = {{Bandidos at large: A spying campaign in Latin America}}, date = {2021-07-07}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2021/07/07/bandidos-at-large-spying-campaign-latin-america/}, language = {English}, urldate = {2021-07-09} } Bandidos at large: A spying campaign in Latin America
Bandook
2020-12-10Electronic Frontier FoundationCooper Quintin, Eva Galperin
@online{quintin:20201210:dark:8ea58ac, author = {Cooper Quintin and Eva Galperin}, title = {{Dark Caracal: You Missed a Spot}}, date = {2020-12-10}, organization = {Electronic Frontier Foundation}, url = {https://www.eff.org/deeplinks/2020/12/dark-caracal-you-missed-spot}, language = {English}, urldate = {2020-12-11} } Dark Caracal: You Missed a Spot
Bandook
2020-11-26CheckpointCheck Point Research
@online{research:20201126:bandook:7796023, author = {Check Point Research}, title = {{Bandook: Signed & Delivered}}, date = {2020-11-26}, organization = {Checkpoint}, url = {https://research.checkpoint.com/2020/bandook-signed-delivered/}, language = {English}, urldate = {2020-12-01} } Bandook: Signed & Delivered
Bandook
2020-11-26Check PointCheckpoint Research
@online{research:20201126:bandook:c06ea4b, author = {Checkpoint Research}, title = {{Bandook: Signed & Delivered}}, date = {2020-11-26}, organization = {Check Point}, url = {https://research.checkpoint.com/2020/bandook-signed-delivered}, language = {English}, urldate = {2022-07-13} } Bandook: Signed & Delivered
Bandook Dark Caracal
2018-01-18LookoutAndrew Blaich, Apurva Kumar, Jeremy Richards, Michael Flossman, Cooper Quintin, Eva Galperin
@techreport{blaich:20180118:dark:31c31f6, author = {Andrew Blaich and Apurva Kumar and Jeremy Richards and Michael Flossman and Cooper Quintin and Eva Galperin}, title = {{Dark Caracal: Cyber-espionage at a Global Scal}}, date = {2018-01-18}, institution = {Lookout}, url = {https://info.lookout.com/rs/051-ESQ-475/images/Lookout_Dark-Caracal_srr_20180118_us_v.1.0.pdf}, language = {English}, urldate = {2020-06-08} } Dark Caracal: Cyber-espionage at a Global Scal
CrossRAT Bandook Dark Caracal
2016-08Electronic Frontier FoundationEva Galperin, Cooper Quintin, Morgan Marquis-Boire, Claudio Guarnieri
@techreport{galperin:201608:operation:38ba7ff, author = {Eva Galperin and Cooper Quintin and Morgan Marquis-Boire and Claudio Guarnieri}, title = {{Operation Manul}}, date = {2016-08}, institution = {Electronic Frontier Foundation}, url = {https://www.eff.org/files/2018/01/29/operation-manul.pdf}, language = {English}, urldate = {2020-06-08} } Operation Manul
jRAT Bandook
Yara Rules
[TLP:WHITE] win_bandook_auto (20230125 | Detects win.bandook.)
rule win_bandook_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.bandook."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.bandook"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 7e0d b001 5f 5e c3 6aff ff15???????? }
            // n = 7, score = 100
            //   7e0d                 | jle                 0xf
            //   b001                 | mov                 al, 1
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   c3                   | ret                 
            //   6aff                 | push                -1
            //   ff15????????         |                     

        $sequence_1 = { 03f8 0f101f 03f8 807c241600 0f295c2460 0f29542450 0f294c2440 }
            // n = 7, score = 100
            //   03f8                 | add                 edi, eax
            //   0f101f               | movups              xmm3, xmmword ptr [edi]
            //   03f8                 | add                 edi, eax
            //   807c241600           | cmp                 byte ptr [esp + 0x16], 0
            //   0f295c2460           | movaps              xmmword ptr [esp + 0x60], xmm3
            //   0f29542450           | movaps              xmmword ptr [esp + 0x50], xmm2
            //   0f294c2440           | movaps              xmmword ptr [esp + 0x40], xmm1

        $sequence_2 = { ab b865637572 ab b869747949 ab b86e666f00 ab }
            // n = 7, score = 100
            //   ab                   | stosd               dword ptr es:[edi], eax
            //   b865637572           | mov                 eax, 0x72756365
            //   ab                   | stosd               dword ptr es:[edi], eax
            //   b869747949           | mov                 eax, 0x49797469
            //   ab                   | stosd               dword ptr es:[edi], eax
            //   b86e666f00           | mov                 eax, 0x6f666e
            //   ab                   | stosd               dword ptr es:[edi], eax

        $sequence_3 = { 1bc0 83c801 85c0 b930000000 b8???????? 0f44f1 }
            // n = 6, score = 100
            //   1bc0                 | sbb                 eax, eax
            //   83c801               | or                  eax, 1
            //   85c0                 | test                eax, eax
            //   b930000000           | mov                 ecx, 0x30
            //   b8????????           |                     
            //   0f44f1               | cmove               esi, ecx

        $sequence_4 = { 8975dc c645fc04 8b4318 85c0 7503 8d431c 50 }
            // n = 7, score = 100
            //   8975dc               | mov                 dword ptr [ebp - 0x24], esi
            //   c645fc04             | mov                 byte ptr [ebp - 4], 4
            //   8b4318               | mov                 eax, dword ptr [ebx + 0x18]
            //   85c0                 | test                eax, eax
            //   7503                 | jne                 5
            //   8d431c               | lea                 eax, [ebx + 0x1c]
            //   50                   | push                eax

        $sequence_5 = { 55 8b6c2414 8bd9 85ed 0f84b3000000 8b4b60 56 }
            // n = 7, score = 100
            //   55                   | push                ebp
            //   8b6c2414             | mov                 ebp, dword ptr [esp + 0x14]
            //   8bd9                 | mov                 ebx, ecx
            //   85ed                 | test                ebp, ebp
            //   0f84b3000000         | je                  0xb9
            //   8b4b60               | mov                 ecx, dword ptr [ebx + 0x60]
            //   56                   | push                esi

        $sequence_6 = { 668906 8b048d08d91e13 6a0a 8854382a 8b048d08d91e13 8874382b 8b048d08d91e13 }
            // n = 7, score = 100
            //   668906               | mov                 word ptr [esi], ax
            //   8b048d08d91e13       | mov                 eax, dword ptr [ecx*4 + 0x131ed908]
            //   6a0a                 | push                0xa
            //   8854382a             | mov                 byte ptr [eax + edi + 0x2a], dl
            //   8b048d08d91e13       | mov                 eax, dword ptr [ecx*4 + 0x131ed908]
            //   8874382b             | mov                 byte ptr [eax + edi + 0x2b], dh
            //   8b048d08d91e13       | mov                 eax, dword ptr [ecx*4 + 0x131ed908]

        $sequence_7 = { 50 8dbd1cfeffff b847657455 ab b87365724e ab b8616d6541 }
            // n = 7, score = 100
            //   50                   | push                eax
            //   8dbd1cfeffff         | lea                 edi, [ebp - 0x1e4]
            //   b847657455           | mov                 eax, 0x55746547
            //   ab                   | stosd               dword ptr es:[edi], eax
            //   b87365724e           | mov                 eax, 0x4e726573
            //   ab                   | stosd               dword ptr es:[edi], eax
            //   b8616d6541           | mov                 eax, 0x41656d61

        $sequence_8 = { c6858cfbffff00 8bce ffb58cfbffff 57 e8???????? 83bd08ffffff10 8d8df4feffff }
            // n = 7, score = 100
            //   c6858cfbffff00       | mov                 byte ptr [ebp - 0x474], 0
            //   8bce                 | mov                 ecx, esi
            //   ffb58cfbffff         | push                dword ptr [ebp - 0x474]
            //   57                   | push                edi
            //   e8????????           |                     
            //   83bd08ffffff10       | cmp                 dword ptr [ebp - 0xf8], 0x10
            //   8d8df4feffff         | lea                 ecx, [ebp - 0x10c]

        $sequence_9 = { 84c0 75f3 8b8da0beffff 8d95f8efffff 2bd1 0f1f440000 8a01 }
            // n = 7, score = 100
            //   84c0                 | test                al, al
            //   75f3                 | jne                 0xfffffff5
            //   8b8da0beffff         | mov                 ecx, dword ptr [ebp - 0x4160]
            //   8d95f8efffff         | lea                 edx, [ebp - 0x1008]
            //   2bd1                 | sub                 edx, ecx
            //   0f1f440000           | nop                 dword ptr [eax + eax]
            //   8a01                 | mov                 al, byte ptr [ecx]

    condition:
        7 of them and filesize < 23088128
}
Download all Yara Rules