Actor(s): APT37
Malware family used to deliver follow up payloads, variants using Microsoft Graph API and Google Web Apps have been observed.
rule win_bluelight_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-07-11" version = "1" description = "Detects win.bluelight." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.bluelight" malpedia_rule_date = "20230705" malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41" malpedia_version = "20230715" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { e9???????? 8d4dd8 e9???????? 8d4da4 e9???????? 8d4db0 e9???????? } // n = 7, score = 100 // e9???????? | // 8d4dd8 | lea ecx, [ebp - 0x28] // e9???????? | // 8d4da4 | lea ecx, [ebp - 0x5c] // e9???????? | // 8d4db0 | lea ecx, [ebp - 0x50] // e9???????? | $sequence_1 = { eb04 2bc6 8bf0 81fe00280000 7605 33ff 47 } // n = 7, score = 100 // eb04 | jmp 6 // 2bc6 | sub eax, esi // 8bf0 | mov esi, eax // 81fe00280000 | cmp esi, 0x2800 // 7605 | jbe 7 // 33ff | xor edi, edi // 47 | inc edi $sequence_2 = { 8b4728 895ddc c60701 8945fc 0f8e77010000 8b00 8365e400 } // n = 7, score = 100 // 8b4728 | mov eax, dword ptr [edi + 0x28] // 895ddc | mov dword ptr [ebp - 0x24], ebx // c60701 | mov byte ptr [edi], 1 // 8945fc | mov dword ptr [ebp - 4], eax // 0f8e77010000 | jle 0x17d // 8b00 | mov eax, dword ptr [eax] // 8365e400 | and dword ptr [ebp - 0x1c], 0 $sequence_3 = { eb15 33d2 8bce e8???????? eb0a 807e0505 7504 } // n = 7, score = 100 // eb15 | jmp 0x17 // 33d2 | xor edx, edx // 8bce | mov ecx, esi // e8???????? | // eb0a | jmp 0xc // 807e0505 | cmp byte ptr [esi + 5], 5 // 7504 | jne 6 $sequence_4 = { ff7594 50 e8???????? 83c410 837da800 7421 837da000 } // n = 7, score = 100 // ff7594 | push dword ptr [ebp - 0x6c] // 50 | push eax // e8???????? | // 83c410 | add esp, 0x10 // 837da800 | cmp dword ptr [ebp - 0x58], 0 // 7421 | je 0x23 // 837da000 | cmp dword ptr [ebp - 0x60], 0 $sequence_5 = { e8???????? 8b45fc f7401c00400000 7426 8bce e8???????? eb16 } // n = 7, score = 100 // e8???????? | // 8b45fc | mov eax, dword ptr [ebp - 4] // f7401c00400000 | test dword ptr [eax + 0x1c], 0x4000 // 7426 | je 0x28 // 8bce | mov ecx, esi // e8???????? | // eb16 | jmp 0x18 $sequence_6 = { ff770c e8???????? 83c414 8944240c 53 e8???????? 8b5c2410 } // n = 7, score = 100 // ff770c | push dword ptr [edi + 0xc] // e8???????? | // 83c414 | add esp, 0x14 // 8944240c | mov dword ptr [esp + 0xc], eax // 53 | push ebx // e8???????? | // 8b5c2410 | mov ebx, dword ptr [esp + 0x10] $sequence_7 = { eb13 8b442410 33d2 6a00 8bc8 897018 e8???????? } // n = 7, score = 100 // eb13 | jmp 0x15 // 8b442410 | mov eax, dword ptr [esp + 0x10] // 33d2 | xor edx, edx // 6a00 | push 0 // 8bc8 | mov ecx, eax // 897018 | mov dword ptr [eax + 0x18], esi // e8???????? | $sequence_8 = { 8bd8 894df4 8b4610 8b440804 8945ec 85c0 742c } // n = 7, score = 100 // 8bd8 | mov ebx, eax // 894df4 | mov dword ptr [ebp - 0xc], ecx // 8b4610 | mov eax, dword ptr [esi + 0x10] // 8b440804 | mov eax, dword ptr [eax + ecx + 4] // 8945ec | mov dword ptr [ebp - 0x14], eax // 85c0 | test eax, eax // 742c | je 0x2e $sequence_9 = { ff770c e8???????? 8b550c 8bcf 6aff e8???????? 6a00 } // n = 7, score = 100 // ff770c | push dword ptr [edi + 0xc] // e8???????? | // 8b550c | mov edx, dword ptr [ebp + 0xc] // 8bcf | mov ecx, edi // 6aff | push -1 // e8???????? | // 6a00 | push 0 condition: 7 of them and filesize < 2191360 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY