SYMBOLCOMMON_NAMEaka. SYNONYMS
win.chinoxy (Back to overview)

Chinoxy


There is no description at this point.

References
2020-11-16BitdefenderVictor Vrabie, Liviu Arsene
@techreport{vrabie:20201116:dissecting:1b39d4d, author = {Victor Vrabie and Liviu Arsene}, title = {{Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions}}, date = {2020-11-16}, institution = {Bitdefender}, url = {https://www.bitdefender.com/files/News/CaseStudies/study/379/Bitdefender-Whitepaper-Chinese-APT.pdf}, language = {English}, urldate = {2020-11-18} } Dissecting a Chinese APT Targeting South Eastern Asian Government Institutions
Chinoxy FunnyDream
2020-09-16RiskIQJon Gross
@online{gross:20200916:riskiq:da4b864, author = {Jon Gross}, title = {{RiskIQ: Adventures in Cookie Land - Part 2}}, date = {2020-09-16}, organization = {RiskIQ}, url = {https://community.riskiq.com/article/56fa1b2f}, language = {English}, urldate = {2020-09-23} } RiskIQ: Adventures in Cookie Land - Part 2
8.t Dropper Chinoxy Poison Ivy
2020-08-19RiskIQJon Gross, Cory Kennedy
@online{gross:20200819:riskiq:94e5ccf, author = {Jon Gross and Cory Kennedy}, title = {{RiskIQ Adventures in Cookie Land - Part 1}}, date = {2020-08-19}, organization = {RiskIQ}, url = {https://community.riskiq.com/article/5fe2da7f}, language = {English}, urldate = {2020-09-23} } RiskIQ Adventures in Cookie Land - Part 1
8.t Dropper Chinoxy
2020-07-08Medium (@sevdraven)Sébastien Larinier
@online{larinier:20200708:how:7d692bb, author = {Sébastien Larinier}, title = {{How to unpack Chinoxy backdoor and decipher the configuration of the backdoor}}, date = {2020-07-08}, organization = {Medium (@sevdraven)}, url = {https://medium.com/@Sebdraven/how-to-unpack-chinoxy-backdoor-and-decipher-the-configuration-of-the-backdoor-4ffd98ca2a02}, language = {English}, urldate = {2020-07-11} } How to unpack Chinoxy backdoor and decipher the configuration of the backdoor
Chinoxy
2020-03-20Medium SebdravenSébastien Larinier
@online{larinier:20200320:new:3da1211, author = {Sébastien Larinier}, title = {{New version of chinoxy backdoor using COVID19 alerts document lure}}, date = {2020-03-20}, organization = {Medium Sebdraven}, url = {https://medium.com/@Sebdraven/new-version-of-chinoxy-backdoor-using-covid19-document-lure-83fa294c0746}, language = {English}, urldate = {2020-03-26} } New version of chinoxy backdoor using COVID19 alerts document lure
8.t Dropper Chinoxy
Yara Rules
[TLP:WHITE] win_chinoxy_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_chinoxy_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.chinoxy"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { ff15???????? 83c40c 8d8c2474020000 53 51 ff15???????? eb21 }
            // n = 7, score = 100
            //   ff15????????         |                     
            //   83c40c               | add                 esp, 0xc
            //   8d8c2474020000       | lea                 ecx, [esp + 0x274]
            //   53                   | push                ebx
            //   51                   | push                ecx
            //   ff15????????         |                     
            //   eb21                 | jmp                 0x23

        $sequence_1 = { 899e50200000 c706???????? 885e3c 66895e48 8bc6 }
            // n = 5, score = 100
            //   899e50200000         | mov                 dword ptr [esi + 0x2050], ebx
            //   c706????????         |                     
            //   885e3c               | mov                 byte ptr [esi + 0x3c], bl
            //   66895e48             | mov                 word ptr [esi + 0x48], bx
            //   8bc6                 | mov                 eax, esi

        $sequence_2 = { e8???????? 8be8 668b06 50 e8???????? 83e003 83c418 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   8be8                 | mov                 ebp, eax
            //   668b06               | mov                 ax, word ptr [esi]
            //   50                   | push                eax
            //   e8????????           |                     
            //   83e003               | and                 eax, 3
            //   83c418               | add                 esp, 0x18

        $sequence_3 = { 56 40 52 50 e8???????? 83c414 85c0 }
            // n = 7, score = 100
            //   56                   | push                esi
            //   40                   | inc                 eax
            //   52                   | push                edx
            //   50                   | push                eax
            //   e8????????           |                     
            //   83c414               | add                 esp, 0x14
            //   85c0                 | test                eax, eax

        $sequence_4 = { 72bd 8b5c2410 85db 740a 83c304 53 ff15???????? }
            // n = 7, score = 100
            //   72bd                 | jb                  0xffffffbf
            //   8b5c2410             | mov                 ebx, dword ptr [esp + 0x10]
            //   85db                 | test                ebx, ebx
            //   740a                 | je                  0xc
            //   83c304               | add                 ebx, 4
            //   53                   | push                ebx
            //   ff15????????         |                     

        $sequence_5 = { 8d4d50 6a14 51 c644243002 e8???????? 8bcd c644241c03 }
            // n = 7, score = 100
            //   8d4d50               | lea                 ecx, [ebp + 0x50]
            //   6a14                 | push                0x14
            //   51                   | push                ecx
            //   c644243002           | mov                 byte ptr [esp + 0x30], 2
            //   e8????????           |                     
            //   8bcd                 | mov                 ecx, ebp
            //   c644241c03           | mov                 byte ptr [esp + 0x1c], 3

        $sequence_6 = { 56 8bf1 57 8974240c 8dbe5c0c0000 c706???????? c707???????? }
            // n = 7, score = 100
            //   56                   | push                esi
            //   8bf1                 | mov                 esi, ecx
            //   57                   | push                edi
            //   8974240c             | mov                 dword ptr [esp + 0xc], esi
            //   8dbe5c0c0000         | lea                 edi, [esi + 0xc5c]
            //   c706????????         |                     
            //   c707????????         |                     

        $sequence_7 = { 68???????? 50 64892500000000 53 56 8b742418 85f6 }
            // n = 7, score = 100
            //   68????????           |                     
            //   50                   | push                eax
            //   64892500000000       | mov                 dword ptr fs:[0], esp
            //   53                   | push                ebx
            //   56                   | push                esi
            //   8b742418             | mov                 esi, dword ptr [esp + 0x18]
            //   85f6                 | test                esi, esi

        $sequence_8 = { 8bf8 83c404 85ff 897d34 740c b900100000 33c0 }
            // n = 7, score = 100
            //   8bf8                 | mov                 edi, eax
            //   83c404               | add                 esp, 4
            //   85ff                 | test                edi, edi
            //   897d34               | mov                 dword ptr [ebp + 0x34], edi
            //   740c                 | je                  0xe
            //   b900100000           | mov                 ecx, 0x1000
            //   33c0                 | xor                 eax, eax

        $sequence_9 = { e8???????? 83c608 4f 75ee 5f 5e b801000000 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   83c608               | add                 esi, 8
            //   4f                   | dec                 edi
            //   75ee                 | jne                 0xfffffff0
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   b801000000           | mov                 eax, 1

    condition:
        7 of them and filesize < 1138688
}
Download all Yara Rules