SYMBOLCOMMON_NAMEaka. SYNONYMS
win.bunitu (Back to overview)

Bunitu


Bunitu is a trojan that exposes infected computers to be used as a proxy for remote clients. It registers itself at startup by providing its address and open ports. Access to Bunitu proxies is available by using criminal VPN services (e.g.VIP72).

References
2021-04-12PTSecurityPTSecurity
@online{ptsecurity:20210412:paas:1d06836, author = {PTSecurity}, title = {{PaaS, or how hackers evade antivirus software}}, date = {2021-04-12}, organization = {PTSecurity}, url = {https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/paas-or-how-hackers-evade-antivirus-software/}, language = {English}, urldate = {2021-04-12} } PaaS, or how hackers evade antivirus software
Amadey Bunitu Cerber Dridex ISFB KPOT Stealer Mailto Nemty Phobos Pony Predator The Thief QakBot Raccoon RTM SmokeLoader Zloader
2019-04-12BroadAnalysisAnalysis
@online{analysis:20190412:rig:0230572, author = {Analysis}, title = {{Rig Exploit Kit delivers Bunitu Malware}}, date = {2019-04-12}, organization = {BroadAnalysis}, url = {https://broadanalysis.com/2019/04/12/rig-exploit-kit-delivers-bunitu-malware/}, language = {English}, urldate = {2020-01-10} } Rig Exploit Kit delivers Bunitu Malware
Bunitu
2018-03-21Malware Breakdown BlogMalware Breakdown
@online{breakdown:20180321:fobos:15877e7, author = {Malware Breakdown}, title = {{Fobos Malvertising Campaign Delivers Bunitu Proxy Trojan via RIG EK}}, date = {2018-03-21}, organization = {Malware Breakdown Blog}, url = {https://malwarebreakdown.com/2018/03/21/fobos-malvertising-campaign-delivers-bunitu-proxy-trojan-via-rig-ek/}, language = {English}, urldate = {2019-10-13} } Fobos Malvertising Campaign Delivers Bunitu Proxy Trojan via RIG EK
Bunitu
2017-06-07Zerophage
@online{zerophage:20170607:rig:7e32e84, author = {Zerophage}, title = {{Rig EK via Fake EVE Online website drops Bunitu}}, date = {2017-06-07}, url = {https://zerophagemalware.com/2017/06/07/rig-ek-via-fake-eve-online-website-drops-bunitu/}, language = {English}, urldate = {2019-11-29} } Rig EK via Fake EVE Online website drops Bunitu
Bunitu
2017-05-09Malware Traffic AnalysisBrad Duncan
@online{duncan:20170509:rig:c6b2df9, author = {Brad Duncan}, title = {{RIG EK SENDS BUNITU TROJAN}}, date = {2017-05-09}, organization = {Malware Traffic Analysis}, url = {http://malware-traffic-analysis.net/2017/05/09/index.html}, language = {English}, urldate = {2020-01-08} } RIG EK SENDS BUNITU TROJAN
Bunitu
2015-08-05MalwarebytesMalwarebytes Labs
@online{labs:20150805:whos:972f567, author = {Malwarebytes Labs}, title = {{Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets}}, date = {2015-08-05}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2015/08/whos-behind-your-proxy-uncovering-bunitus-secrets/}, language = {English}, urldate = {2019-12-20} } Who’s Behind Your Proxy? Uncovering Bunitu’s Secrets
Bunitu
2015-07-13Malwarebyteshasherezade
@online{hasherezade:20150713:revisiting:391fe73, author = {hasherezade}, title = {{Revisiting The Bunitu Trojan}}, date = {2015-07-13}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2015/07/revisiting-the-bunitu-trojan/}, language = {English}, urldate = {2019-12-20} } Revisiting The Bunitu Trojan
Bunitu
Yara Rules
[TLP:WHITE] win_bunitu_auto (20221125 | Detects win.bunitu.)
rule win_bunitu_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-11-21"
        version = "1"
        description = "Detects win.bunitu."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.bunitu"
        malpedia_rule_date = "20221118"
        malpedia_hash = "e0702e2e6d1d00da65c8a29a4ebacd0a4c59e1af"
        malpedia_version = "20221125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 81c498f7ffff 57 8dbd9cf7ffff 2bc0 b968080000 f3aa }
            // n = 6, score = 1300
            //   81c498f7ffff         | add                 esp, 0xfffff798
            //   57                   | push                edi
            //   8dbd9cf7ffff         | lea                 edi, [ebp - 0x864]
            //   2bc0                 | sub                 eax, eax
            //   b968080000           | mov                 ecx, 0x868
            //   f3aa                 | rep stosb           byte ptr es:[edi], al

        $sequence_1 = { bf04000000 8b9d44feffff 56 53 ffb530feffff e8???????? }
            // n = 6, score = 1300
            //   bf04000000           | mov                 edi, 4
            //   8b9d44feffff         | mov                 ebx, dword ptr [ebp - 0x1bc]
            //   56                   | push                esi
            //   53                   | push                ebx
            //   ffb530feffff         | push                dword ptr [ebp - 0x1d0]
            //   e8????????           |                     

        $sequence_2 = { c6472402 c70721000000 6a25 57 }
            // n = 4, score = 1300
            //   c6472402             | mov                 byte ptr [edi + 0x24], 2
            //   c70721000000         | mov                 dword ptr [edi], 0x21
            //   6a25                 | push                0x25
            //   57                   | push                edi

        $sequence_3 = { 33c0 837d0c01 750f 6a00 }
            // n = 4, score = 1300
            //   33c0                 | xor                 eax, eax
            //   837d0c01             | cmp                 dword ptr [ebp + 0xc], 1
            //   750f                 | jne                 0x11
            //   6a00                 | push                0

        $sequence_4 = { c70003000000 ff75f0 8f4004 ff75ec }
            // n = 4, score = 1300
            //   c70003000000         | mov                 dword ptr [eax], 3
            //   ff75f0               | push                dword ptr [ebp - 0x10]
            //   8f4004               | pop                 dword ptr [eax + 4]
            //   ff75ec               | push                dword ptr [ebp - 0x14]

        $sequence_5 = { 898540feffff be04000000 bf04000000 8b9d44feffff }
            // n = 4, score = 1300
            //   898540feffff         | mov                 dword ptr [ebp - 0x1c0], eax
            //   be04000000           | mov                 esi, 4
            //   bf04000000           | mov                 edi, 4
            //   8b9d44feffff         | mov                 ebx, dword ptr [ebp - 0x1bc]

        $sequence_6 = { 50 6a00 68???????? 6a00 50 ff15???????? 6a00 }
            // n = 7, score = 1300
            //   50                   | push                eax
            //   6a00                 | push                0
            //   68????????           |                     
            //   6a00                 | push                0
            //   50                   | push                eax
            //   ff15????????         |                     
            //   6a00                 | push                0

        $sequence_7 = { 66898536fdffff 66c78534fdffff0200 8b85d8feffff 898538fdffff 6a10 }
            // n = 5, score = 1300
            //   66898536fdffff       | mov                 word ptr [ebp - 0x2ca], ax
            //   66c78534fdffff0200     | mov    word ptr [ebp - 0x2cc], 2
            //   8b85d8feffff         | mov                 eax, dword ptr [ebp - 0x128]
            //   898538fdffff         | mov                 dword ptr [ebp - 0x2c8], eax
            //   6a10                 | push                0x10

        $sequence_8 = { 8d9530fdffff 52 6800000100 51 68???????? 6800080000 6a00 }
            // n = 7, score = 1300
            //   8d9530fdffff         | lea                 edx, [ebp - 0x2d0]
            //   52                   | push                edx
            //   6800000100           | push                0x10000
            //   51                   | push                ecx
            //   68????????           |                     
            //   6800080000           | push                0x800
            //   6a00                 | push                0

        $sequence_9 = { ff75ec ff15???????? ff75ec ff15???????? 837df000 7614 }
            // n = 6, score = 1300
            //   ff75ec               | push                dword ptr [ebp - 0x14]
            //   ff15????????         |                     
            //   ff75ec               | push                dword ptr [ebp - 0x14]
            //   ff15????????         |                     
            //   837df000             | cmp                 dword ptr [ebp - 0x10], 0
            //   7614                 | jbe                 0x16

    condition:
        7 of them and filesize < 221184
}
Download all Yara Rules