SYMBOLCOMMON_NAMEaka. SYNONYMS
win.carrotbat (Back to overview)

CarrotBat


There is no description at this point.

References
2020-01-23Palo Alto Networks Unit 42Adrian McCabe, Unit42
@online{mccabe:20200123:fractured:399ff15, author = {Adrian McCabe and Unit42}, title = {{The Fractured Statue Campaign: U.S. Government Targeted in Spear-Phishing Attacks}}, date = {2020-01-23}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/the-fractured-statue-campaign-u-s-government-targeted-in-spear-phishing-attacks/}, language = {English}, urldate = {2020-01-26} } The Fractured Statue Campaign: U.S. Government Targeted in Spear-Phishing Attacks
CARROTBALL CarrotBat Syscon
2019-11-29Palo Alto Networks Unit 42Josh Grunzweig, Kyle Wilhoit
@online{grunzweig:20191129:fractured:65257b7, author = {Josh Grunzweig and Kyle Wilhoit}, title = {{The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia}}, date = {2019-11-29}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/unit42-the-fractured-block-campaign-carrotbat-malware-used-to-deliver-malware-targeting-southeast-asia/}, language = {English}, urldate = {2020-01-12} } The Fractured Block Campaign: CARROTBAT Used to Deliver Malware Targeting Southeast Asia
CarrotBat
Yara Rules
[TLP:WHITE] win_carrotbat_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_carrotbat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.carrotbat"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { ebe9 33c0 8945e4 3d00010000 7d10 8a8c181d010000 888878dc4000 }
            // n = 7, score = 100
            //   ebe9                 | jmp                 0xffffffeb
            //   33c0                 | xor                 eax, eax
            //   8945e4               | mov                 dword ptr [ebp - 0x1c], eax
            //   3d00010000           | cmp                 eax, 0x100
            //   7d10                 | jge                 0x12
            //   8a8c181d010000       | mov                 cl, byte ptr [eax + ebx + 0x11d]
            //   888878dc4000         | mov                 byte ptr [eax + 0x40dc78], cl

        $sequence_1 = { 8bec 8b4508 56 8d34c5a0d54000 833e00 }
            // n = 5, score = 100
            //   8bec                 | mov                 ebp, esp
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   56                   | push                esi
            //   8d34c5a0d54000       | lea                 esi, [eax*8 + 0x40d5a0]
            //   833e00               | cmp                 dword ptr [esi], 0

        $sequence_2 = { 5f 660fbef9 66f7d7 66f7d7 c744241480000000 }
            // n = 5, score = 100
            //   5f                   | pop                 edi
            //   660fbef9             | movsx               di, cl
            //   66f7d7               | not                 di
            //   66f7d7               | not                 di
            //   c744241480000000     | mov                 dword ptr [esp + 0x14], 0x80

        $sequence_3 = { 6bc930 8975e0 8db190dd4000 8975e4 }
            // n = 4, score = 100
            //   6bc930               | imul                ecx, ecx, 0x30
            //   8975e0               | mov                 dword ptr [ebp - 0x20], esi
            //   8db190dd4000         | lea                 esi, [ecx + 0x40dd90]
            //   8975e4               | mov                 dword ptr [ebp - 0x1c], esi

        $sequence_4 = { 8d1c8520ee4000 8b03 83e71f c1e706 }
            // n = 4, score = 100
            //   8d1c8520ee4000       | lea                 ebx, [eax*4 + 0x40ee20]
            //   8b03                 | mov                 eax, dword ptr [ebx]
            //   83e71f               | and                 edi, 0x1f
            //   c1e706               | shl                 edi, 6

        $sequence_5 = { 0fb6ca 0fbe8940d44000 85c9 750d }
            // n = 4, score = 100
            //   0fb6ca               | movzx               ecx, dl
            //   0fbe8940d44000       | movsx               ecx, byte ptr [ecx + 0x40d440]
            //   85c9                 | test                ecx, ecx
            //   750d                 | jne                 0xf

        $sequence_6 = { c744241c50054100 53 9c ff35???????? }
            // n = 4, score = 100
            //   c744241c50054100     | mov                 dword ptr [esp + 0x1c], 0x410550
            //   53                   | push                ebx
            //   9c                   | pushfd              
            //   ff35????????         |                     

        $sequence_7 = { 60 9c 52 8d642428 }
            // n = 4, score = 100
            //   60                   | pushal              
            //   9c                   | pushfd              
            //   52                   | push                edx
            //   8d642428             | lea                 esp, [esp + 0x28]

        $sequence_8 = { 0f83f9feffff 54 60 8d642424 c9 }
            // n = 5, score = 100
            //   0f83f9feffff         | jae                 0xfffffeff
            //   54                   | push                esp
            //   60                   | pushal              
            //   8d642424             | lea                 esp, [esp + 0x24]
            //   c9                   | leave               

        $sequence_9 = { 53 c7042405000000 e8???????? ff35???????? }
            // n = 4, score = 100
            //   53                   | push                ebx
            //   c7042405000000       | mov                 dword ptr [esp], 5
            //   e8????????           |                     
            //   ff35????????         |                     

    condition:
        7 of them and filesize < 360448
}
Download all Yara Rules