There is no description at this point.
rule win_citadel_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2022-04-08" version = "1" description = "Detects win.citadel." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.citadel" malpedia_rule_date = "20220405" malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a" malpedia_version = "20220411" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { eb0e 6800800000 53 57 56 ff15???????? } // n = 6, score = 4900 // eb0e | jmp 0x10 // 6800800000 | push 0x8000 // 53 | push ebx // 57 | push edi // 56 | push esi // ff15???????? | $sequence_1 = { e8???????? 8bd0 85d2 741b 8b4d08 } // n = 5, score = 4800 // e8???????? | // 8bd0 | mov edx, eax // 85d2 | test edx, edx // 741b | je 0x1d // 8b4d08 | mov ecx, dword ptr [ebp + 8] $sequence_2 = { ff15???????? 85c0 0f8566010000 57 } // n = 4, score = 4800 // ff15???????? | // 85c0 | test eax, eax // 0f8566010000 | jne 0x16c // 57 | push edi $sequence_3 = { e8???????? 8b4d08 8bd3 89442414 e8???????? 84c0 } // n = 6, score = 4800 // e8???????? | // 8b4d08 | mov ecx, dword ptr [ebp + 8] // 8bd3 | mov edx, ebx // 89442414 | mov dword ptr [esp + 0x14], eax // e8???????? | // 84c0 | test al, al $sequence_4 = { e8???????? 8b4d08 8bd8 e8???????? 50 51 8bce } // n = 7, score = 4800 // e8???????? | // 8b4d08 | mov ecx, dword ptr [ebp + 8] // 8bd8 | mov ebx, eax // e8???????? | // 50 | push eax // 51 | push ecx // 8bce | mov ecx, esi $sequence_5 = { e8???????? ff74241c e8???????? 807c240f00 } // n = 4, score = 4800 // e8???????? | // ff74241c | push dword ptr [esp + 0x1c] // e8???????? | // 807c240f00 | cmp byte ptr [esp + 0xf], 0 $sequence_6 = { e8???????? 8bf0 85f6 75c1 eb0d 53 83c8ff } // n = 7, score = 4800 // e8???????? | // 8bf0 | mov esi, eax // 85f6 | test esi, esi // 75c1 | jne 0xffffffc3 // eb0d | jmp 0xf // 53 | push ebx // 83c8ff | or eax, 0xffffffff $sequence_7 = { ff15???????? 85c0 7504 c6450b01 a1???????? 8b35???????? } // n = 6, score = 4800 // ff15???????? | // 85c0 | test eax, eax // 7504 | jne 6 // c6450b01 | mov byte ptr [ebp + 0xb], 1 // a1???????? | // 8b35???????? | $sequence_8 = { 8a5608 8a4e02 ffd0 884602 } // n = 4, score = 3700 // 8a5608 | mov dl, byte ptr [esi + 8] // 8a4e02 | mov cl, byte ptr [esi + 2] // ffd0 | call eax // 884602 | mov byte ptr [esi + 2], al $sequence_9 = { 8a4e01 ffd0 884601 33c0 6689460c ff4df8 } // n = 6, score = 3700 // 8a4e01 | mov cl, byte ptr [esi + 1] // ffd0 | call eax // 884601 | mov byte ptr [esi + 1], al // 33c0 | xor eax, eax // 6689460c | mov word ptr [esi + 0xc], ax // ff4df8 | dec dword ptr [ebp - 8] $sequence_10 = { 8845fe c645ff00 763c 8a06 2a45ff } // n = 5, score = 3700 // 8845fe | mov byte ptr [ebp - 2], al // c645ff00 | mov byte ptr [ebp - 1], 0 // 763c | jbe 0x3e // 8a06 | mov al, byte ptr [esi] // 2a45ff | sub al, byte ptr [ebp - 1] $sequence_11 = { 0f8417010000 85ff 0f84dd000000 53 837df800 0f84d1000000 803e00 } // n = 7, score = 3700 // 0f8417010000 | je 0x11d // 85ff | test edi, edi // 0f84dd000000 | je 0xe3 // 53 | push ebx // 837df800 | cmp dword ptr [ebp - 8], 0 // 0f84d1000000 | je 0xd7 // 803e00 | cmp byte ptr [esi], 0 $sequence_12 = { 33c0 85c0 740b 8a5604 8a4e01 ffd0 884601 } // n = 7, score = 3700 // 33c0 | xor eax, eax // 85c0 | test eax, eax // 740b | je 0xd // 8a5604 | mov dl, byte ptr [esi + 4] // 8a4e01 | mov cl, byte ptr [esi + 1] // ffd0 | call eax // 884601 | mov byte ptr [esi + 1], al $sequence_13 = { 6685c0 7432 66ff460c 6639460c 7228 8b4610 8a4e05 } // n = 7, score = 3700 // 6685c0 | test ax, ax // 7432 | je 0x34 // 66ff460c | inc word ptr [esi + 0xc] // 6639460c | cmp word ptr [esi + 0xc], ax // 7228 | jb 0x2a // 8b4610 | mov eax, dword ptr [esi + 0x10] // 8a4e05 | mov cl, byte ptr [esi + 5] $sequence_14 = { fec8 32d0 8ac2 3245fe 85c9 7408 } // n = 6, score = 3700 // fec8 | dec al // 32d0 | xor dl, al // 8ac2 | mov al, dl // 3245fe | xor al, byte ptr [ebp - 2] // 85c9 | test ecx, ecx // 7408 | je 0xa $sequence_15 = { ff4df8 47 0f8525ffffff 5b b001 eb30 d0e8 } // n = 7, score = 3700 // ff4df8 | dec dword ptr [ebp - 8] // 47 | inc edi // 0f8525ffffff | jne 0xffffff2b // 5b | pop ebx // b001 | mov al, 1 // eb30 | jmp 0x32 // d0e8 | shr al, 1 condition: 7 of them and filesize < 1236992 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY