SYMBOLCOMMON_NAMEaka. SYNONYMS
win.bart (Back to overview)

Bart


There is no description at this point.

References
2020-08-20CERT-FRCERT-FR
@techreport{certfr:20200820:development:d518522, author = {CERT-FR}, title = {{Development of the Activity of the TA505 Cybercriminal Group}}, date = {2020-08-20}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-009.pdf}, language = {English}, urldate = {2020-08-28} } Development of the Activity of the TA505 Cybercriminal Group
AndroMut Bart Clop Dridex FlawedAmmyy FlawedGrace Get2 Locky Marap QuantLoader SDBbot ServHelper tRat TrickBot
2020-06-22CERT-FRCERT-FR
@techreport{certfr:20200622:volution:fba1cfa, author = {CERT-FR}, title = {{Évolution De Lactivité du Groupe Cybercriminel TA505}}, date = {2020-06-22}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-006.pdf}, language = {French}, urldate = {2020-06-24} } Évolution De Lactivité du Groupe Cybercriminel TA505
Amadey AndroMut Bart Clop Dridex FlawedGrace Gandcrab Get2 GlobeImposter Jaff Locky Marap Philadephia Ransom QuantLoader Scarab Ransomware SDBbot ServHelper Silence tRat TrickBot
2020-05-21Intel 471Intel 471
@online{471:20200521:brief:048d164, author = {Intel 471}, title = {{A brief history of TA505}}, date = {2020-05-21}, organization = {Intel 471}, url = {https://intel471.com/blog/a-brief-history-of-ta505}, language = {English}, urldate = {2022-02-14} } A brief history of TA505
AndroMut Bart Dridex FlawedAmmyy FlawedGrace Gandcrab Get2 GlobeImposter Jaff Kegotip Locky Necurs Philadephia Ransom Pony QuantLoader Rockloader SDBbot ServHelper Shifu Snatch TrickBot
Yara Rules
[TLP:WHITE] win_bart_auto (20220516 | Detects win.bart.)
rule win_bart_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.bart."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.bart"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 3bfb 7443 8b4304 3b4708 7627 56 }
            // n = 6, score = 100
            //   3bfb                 | cmp                 edi, ebx
            //   7443                 | je                  0x45
            //   8b4304               | mov                 eax, dword ptr [ebx + 4]
            //   3b4708               | cmp                 eax, dword ptr [edi + 8]
            //   7627                 | jbe                 0x29
            //   56                   | push                esi

        $sequence_1 = { e8???????? ffb578ffffff 8bd6 8bce 53 57 e8???????? }
            // n = 7, score = 100
            //   e8????????           |                     
            //   ffb578ffffff         | push                dword ptr [ebp - 0x88]
            //   8bd6                 | mov                 edx, esi
            //   8bce                 | mov                 ecx, esi
            //   53                   | push                ebx
            //   57                   | push                edi
            //   e8????????           |                     

        $sequence_2 = { 56 33f6 84d2 7e11 0fb6c2 8d9b00000000 0b31 }
            // n = 7, score = 100
            //   56                   | push                esi
            //   33f6                 | xor                 esi, esi
            //   84d2                 | test                dl, dl
            //   7e11                 | jle                 0x13
            //   0fb6c2               | movzx               eax, dl
            //   8d9b00000000         | lea                 ebx, [ebx]
            //   0b31                 | or                  esi, dword ptr [ecx]

        $sequence_3 = { 8d45e0 50 ff15???????? 8b9570ffffff 8d4d84 6a07 ffb57cffffff }
            // n = 7, score = 100
            //   8d45e0               | lea                 eax, [ebp - 0x20]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8b9570ffffff         | mov                 edx, dword ptr [ebp - 0x90]
            //   8d4d84               | lea                 ecx, [ebp - 0x7c]
            //   6a07                 | push                7
            //   ffb57cffffff         | push                dword ptr [ebp - 0x84]

        $sequence_4 = { 8bc8 fec3 2bce 49 }
            // n = 4, score = 100
            //   8bc8                 | mov                 ecx, eax
            //   fec3                 | inc                 bl
            //   2bce                 | sub                 ecx, esi
            //   49                   | dec                 ecx

        $sequence_5 = { 8b87b0000000 53 ffd0 33d2 8d4704 83c420 8945b8 }
            // n = 7, score = 100
            //   8b87b0000000         | mov                 eax, dword ptr [edi + 0xb0]
            //   53                   | push                ebx
            //   ffd0                 | call                eax
            //   33d2                 | xor                 edx, edx
            //   8d4704               | lea                 eax, [edi + 4]
            //   83c420               | add                 esp, 0x20
            //   8945b8               | mov                 dword ptr [ebp - 0x48], eax

        $sequence_6 = { ffd0 8a85ccfeffff 83c410 8b95c0feffff 84c0 7e20 0fb6c8 }
            // n = 7, score = 100
            //   ffd0                 | call                eax
            //   8a85ccfeffff         | mov                 al, byte ptr [ebp - 0x134]
            //   83c410               | add                 esp, 0x10
            //   8b95c0feffff         | mov                 edx, dword ptr [ebp - 0x140]
            //   84c0                 | test                al, al
            //   7e20                 | jle                 0x22
            //   0fb6c8               | movzx               ecx, al

        $sequence_7 = { 6a00 6a02 6800000040 ff31 ff15???????? 83f8ff 7509 }
            // n = 7, score = 100
            //   6a00                 | push                0
            //   6a02                 | push                2
            //   6800000040           | push                0x40000000
            //   ff31                 | push                dword ptr [ecx]
            //   ff15????????         |                     
            //   83f8ff               | cmp                 eax, -1
            //   7509                 | jne                 0xb

        $sequence_8 = { 8b4d08 8d45e4 83c40c c6043e00 897de8 50 e8???????? }
            // n = 7, score = 100
            //   8b4d08               | mov                 ecx, dword ptr [ebp + 8]
            //   8d45e4               | lea                 eax, [ebp - 0x1c]
            //   83c40c               | add                 esp, 0xc
            //   c6043e00             | mov                 byte ptr [esi + edi], 0
            //   897de8               | mov                 dword ptr [ebp - 0x18], edi
            //   50                   | push                eax
            //   e8????????           |                     

        $sequence_9 = { 68???????? 895de8 8b7b04 8975ac 897de0 e8???????? }
            // n = 6, score = 100
            //   68????????           |                     
            //   895de8               | mov                 dword ptr [ebp - 0x18], ebx
            //   8b7b04               | mov                 edi, dword ptr [ebx + 4]
            //   8975ac               | mov                 dword ptr [ebp - 0x54], esi
            //   897de0               | mov                 dword ptr [ebp - 0x20], edi
            //   e8????????           |                     

    condition:
        7 of them and filesize < 163840
}
Download all Yara Rules