SYMBOLCOMMON_NAMEaka. SYNONYMS
win.bbsrat (Back to overview)

BBSRAT


There is no description at this point.

References
2020-06-03Trend MicroDaniel Lunghi
@techreport{lunghi:20200603:how:4f28e63, author = {Daniel Lunghi}, title = {{How to perform long term monitoring of careless threat actors}}, date = {2020-06-03}, institution = {Trend Micro}, url = {https://www.sstic.org/media/SSTIC2020/SSTIC-actes/pivoter_tel_bernard_ou_comment_monitorer_des_attaq/SSTIC2020-Slides-pivoter_tel_bernard_ou_comment_monitorer_des_attaquants_ngligents-lunghi.pdf}, language = {English}, urldate = {2020-06-05} } How to perform long term monitoring of careless threat actors
BBSRAT HyperBro Trochilus RAT
2016-03-14Palo Alto Networks Unit 42Josh Grunzweig, Robert Falcone, Bryan Lee
@online{grunzweig:20160314:digital:b6ddc60, author = {Josh Grunzweig and Robert Falcone and Bryan Lee}, title = {{Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government}}, date = {2016-03-14}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/03/digital-quartermaster-scenario-demonstrated-in-attacks-against-the-mongolian-government/}, language = {English}, urldate = {2019-12-20} } Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government
BBSRAT CMSTAR
Yara Rules
[TLP:WHITE] win_bbsrat_auto (20200529 | autogenerated rule brought to you by yara-signator)
rule win_bbsrat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-05-30"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.bbsrat"
        malpedia_rule_date = "20200529"
        malpedia_hash = "92c362319514e5a6da26204961446caa3a8b32a8"
        malpedia_version = "20200529"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 50 8d4e0c 51 8d542428 6808020000 52 e8???????? }
            // n = 7, score = 100
            //   50                   | push                eax
            //   8d4e0c               | lea                 ecx, [esi + 0xc]
            //   51                   | push                ecx
            //   8d542428             | lea                 edx, [esp + 0x28]
            //   6808020000           | push                0x208
            //   52                   | push                edx
            //   e8????????           |                     

        $sequence_1 = { c20800 81ec30020000 a1???????? 33c4 8984242c020000 56 57 }
            // n = 7, score = 100
            //   c20800               | ret                 8
            //   81ec30020000         | sub                 esp, 0x230
            //   a1????????           |                     
            //   33c4                 | xor                 eax, esp
            //   8984242c020000       | mov                 dword ptr [esp + 0x22c], eax
            //   56                   | push                esi
            //   57                   | push                edi

        $sequence_2 = { c6401000 c7400c00000000 8bf0 eb02 33f6 8b0d???????? }
            // n = 6, score = 100
            //   c6401000             | mov                 byte ptr [eax + 0x10], 0
            //   c7400c00000000       | mov                 dword ptr [eax + 0xc], 0
            //   8bf0                 | mov                 esi, eax
            //   eb02                 | jmp                 4
            //   33f6                 | xor                 esi, esi
            //   8b0d????????         |                     

        $sequence_3 = { 89542428 83f904 73d6 85c9 0f8442010000 8b4c2414 8a09 }
            // n = 7, score = 100
            //   89542428             | mov                 dword ptr [esp + 0x28], edx
            //   83f904               | cmp                 ecx, 4
            //   73d6                 | jae                 0xffffffd8
            //   85c9                 | test                ecx, ecx
            //   0f8442010000         | je                  0x148
            //   8b4c2414             | mov                 ecx, dword ptr [esp + 0x14]
            //   8a09                 | mov                 cl, byte ptr [ecx]

        $sequence_4 = { 52 ff15???????? 85c0 750a 47 83c508 3b3e }
            // n = 7, score = 100
            //   52                   | push                edx
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   750a                 | jne                 0xc
            //   47                   | inc                 edi
            //   83c508               | add                 ebp, 8
            //   3b3e                 | cmp                 edi, dword ptr [esi]

        $sequence_5 = { e8???????? 8be5 5d c20c00 51 e8???????? 8be5 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   8be5                 | mov                 esp, ebp
            //   5d                   | pop                 ebp
            //   c20c00               | ret                 0xc
            //   51                   | push                ecx
            //   e8????????           |                     
            //   8be5                 | mov                 esp, ebp

        $sequence_6 = { 895014 8b4e68 8b5640 6a00 8d442414 }
            // n = 5, score = 100
            //   895014               | mov                 dword ptr [eax + 0x14], edx
            //   8b4e68               | mov                 ecx, dword ptr [esi + 0x68]
            //   8b5640               | mov                 edx, dword ptr [esi + 0x40]
            //   6a00                 | push                0
            //   8d442414             | lea                 eax, [esp + 0x14]

        $sequence_7 = { e8???????? 29be40020000 8b4310 83c418 }
            // n = 4, score = 100
            //   e8????????           |                     
            //   29be40020000         | sub                 dword ptr [esi + 0x240], edi
            //   8b4310               | mov                 eax, dword ptr [ebx + 0x10]
            //   83c418               | add                 esp, 0x18

        $sequence_8 = { 83c020 0fb70f 8d51bf 83fa19 7703 83c120 5f }
            // n = 7, score = 100
            //   83c020               | add                 eax, 0x20
            //   0fb70f               | movzx               ecx, word ptr [edi]
            //   8d51bf               | lea                 edx, [ecx - 0x41]
            //   83fa19               | cmp                 edx, 0x19
            //   7703                 | ja                  5
            //   83c120               | add                 ecx, 0x20
            //   5f                   | pop                 edi

        $sequence_9 = { 50 56 e8???????? 85c0 7419 e8???????? 5b }
            // n = 7, score = 100
            //   50                   | push                eax
            //   56                   | push                esi
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7419                 | je                  0x1b
            //   e8????????           |                     
            //   5b                   | pop                 ebx

    condition:
        7 of them and filesize < 434176
}
Download all Yara Rules