SYMBOLCOMMON_NAMEaka. SYNONYMS
win.compfun (Back to overview)

COMpfun

aka: Reductor RAT

There is no description at this point.

References
2020-09-03Kaspersky LabsDavid Emm
@online{emm:20200903:it:99f6d5f, author = {David Emm}, title = {{IT threat evolution Q2 2020}}, date = {2020-09-03}, organization = {Kaspersky Labs}, url = {https://securelist.com/it-threat-evolution-q2-2020/98230}, language = {English}, urldate = {2022-08-28} } IT threat evolution Q2 2020
PhantomLance Aria-body COMpfun Vicious Panda
2020-05-14Kaspersky LabsGReAT
@online{great:20200514:compfun:eda09d1, author = {GReAT}, title = {{COMpfun authors spoof visa application with HTTP status-based Trojan}}, date = {2020-05-14}, organization = {Kaspersky Labs}, url = {https://securelist.com/compfun-http-status-based-trojan/96874/}, language = {English}, urldate = {2020-05-14} } COMpfun authors spoof visa application with HTTP status-based Trojan
COMpfun
2019-10-03Kaspersky LabsGReAT
@online{great:20191003:compfun:fd13b9e, author = {GReAT}, title = {{COMpfun successor Reductor infects files on the fly to compromise TLS traffic}}, date = {2019-10-03}, organization = {Kaspersky Labs}, url = {https://securelist.com/compfun-successor-reductor/93633/}, language = {English}, urldate = {2020-01-08} } COMpfun successor Reductor infects files on the fly to compromise TLS traffic
COMpfun
2019-08-01Kaspersky LabsGReAT
@online{great:20190801:trends:5e25d5b, author = {GReAT}, title = {{APT trends report Q2 2019}}, date = {2019-08-01}, organization = {Kaspersky Labs}, url = {https://securelist.com/apt-trends-report-q2-2019/91897/}, language = {English}, urldate = {2020-08-13} } APT trends report Q2 2019
ZooPark magecart POWERSTATS Chaperone COMpfun EternalPetya FinFisher RAT HawkEye Keylogger HOPLIGHT Microcin NjRAT Olympic Destroyer PLEAD RokRAT Triton Zebrocy
2014-10-30G DataG Data
@online{data:20141030:com:0da80b3, author = {G Data}, title = {{COM Object hijacking: the discreet way of persistence}}, date = {2014-10-30}, organization = {G Data}, url = {https://www.gdatasoftware.com/blog/2014/10/23941-com-object-hijacking-the-discreet-way-of-persistence}, language = {English}, urldate = {2020-01-07} } COM Object hijacking: the discreet way of persistence
COMpfun
Yara Rules
[TLP:WHITE] win_compfun_auto (20221125 | Detects win.compfun.)
rule win_compfun_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-11-21"
        version = "1"
        description = "Detects win.compfun."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.compfun"
        malpedia_rule_date = "20221118"
        malpedia_hash = "e0702e2e6d1d00da65c8a29a4ebacd0a4c59e1af"
        malpedia_version = "20221125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { c74608697a6520 c70647657446 c74604696c6553 c6460b00 8bc6 }
            // n = 5, score = 300
            //   c74608697a6520       | mov                 dword ptr [esi + 8], 0x20657a69
            //   c70647657446         | mov                 dword ptr [esi], 0x46746547
            //   c74604696c6553       | mov                 dword ptr [esi + 4], 0x53656c69
            //   c6460b00             | mov                 byte ptr [esi + 0xb], 0
            //   8bc6                 | mov                 eax, esi

        $sequence_1 = { 8b7508 6880000000 6a00 56 e8???????? }
            // n = 5, score = 300
            //   8b7508               | mov                 esi, dword ptr [ebp + 8]
            //   6880000000           | push                0x80
            //   6a00                 | push                0
            //   56                   | push                esi
            //   e8????????           |                     

        $sequence_2 = { c7460832466972 c6460f00 8bc6 5e 5d }
            // n = 5, score = 300
            //   c7460832466972       | mov                 dword ptr [esi + 8], 0x72694632
            //   c6460f00             | mov                 byte ptr [esi + 0xf], 0
            //   8bc6                 | mov                 eax, esi
            //   5e                   | pop                 esi
            //   5d                   | pop                 ebp

        $sequence_3 = { c7460476696365 c74608456e756d c7460c65726174 c746106f722063 c746146c617373 c6461800 8bc6 }
            // n = 7, score = 300
            //   c7460476696365       | mov                 dword ptr [esi + 4], 0x65636976
            //   c74608456e756d       | mov                 dword ptr [esi + 8], 0x6d756e45
            //   c7460c65726174       | mov                 dword ptr [esi + 0xc], 0x74617265
            //   c746106f722063       | mov                 dword ptr [esi + 0x10], 0x6320726f
            //   c746146c617373       | mov                 dword ptr [esi + 0x14], 0x7373616c
            //   c6461800             | mov                 byte ptr [esi + 0x18], 0
            //   8bc6                 | mov                 eax, esi

        $sequence_4 = { e8???????? 83c40c c7460450252020 c7062554454d }
            // n = 4, score = 300
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   c7460450252020       | mov                 dword ptr [esi + 4], 0x20202550
            //   c7062554454d         | mov                 dword ptr [esi], 0x4d455425

        $sequence_5 = { c7064765744e c7460461746976 c7460865537973 c7460c74656d49 c6461300 8bc6 }
            // n = 6, score = 300
            //   c7064765744e         | mov                 dword ptr [esi], 0x4e746547
            //   c7460461746976       | mov                 dword ptr [esi + 4], 0x76697461
            //   c7460865537973       | mov                 dword ptr [esi + 8], 0x73795365
            //   c7460c74656d49       | mov                 dword ptr [esi + 0xc], 0x496d6574
            //   c6461300             | mov                 byte ptr [esi + 0x13], 0
            //   8bc6                 | mov                 eax, esi

        $sequence_6 = { 57 ffd3 894608 85c0 741d 68???????? e8???????? }
            // n = 7, score = 300
            //   57                   | push                edi
            //   ffd3                 | call                ebx
            //   894608               | mov                 dword ptr [esi + 8], eax
            //   85c0                 | test                eax, eax
            //   741d                 | je                  0x1f
            //   68????????           |                     
            //   e8????????           |                     

        $sequence_7 = { c7461066657220 c70652746c44 c7460465636f6d c7460870726573 c7460c73427566 c6461300 8bc6 }
            // n = 7, score = 300
            //   c7461066657220       | mov                 dword ptr [esi + 0x10], 0x20726566
            //   c70652746c44         | mov                 dword ptr [esi], 0x446c7452
            //   c7460465636f6d       | mov                 dword ptr [esi + 4], 0x6d6f6365
            //   c7460870726573       | mov                 dword ptr [esi + 8], 0x73657270
            //   c7460c73427566       | mov                 dword ptr [esi + 0xc], 0x66754273
            //   c6461300             | mov                 byte ptr [esi + 0x13], 0
            //   8bc6                 | mov                 eax, esi

        $sequence_8 = { 034c2460 488b442450 894820 488b4c2450 }
            // n = 4, score = 100
            //   034c2460             | lea                 edx, [esp + 0x40]
            //   488b442450           | dec                 eax
            //   894820               | mov                 ecx, dword ptr [esp + 0x70]
            //   488b4c2450           | add                 ecx, dword ptr [esp + 0x2c]

        $sequence_9 = { 03c1 89442420 8b542438 486bd218 }
            // n = 4, score = 100
            //   03c1                 | movzx               eax, byte ptr [eax + eax]
            //   89442420             | mov                 byte ptr [ecx + edx], al
            //   8b542438             | mov                 eax, dword ptr [esp + 0x18]
            //   486bd218             | add                 eax, ecx

        $sequence_10 = { 0344242c 8bc8 e8???????? 4889442448 }
            // n = 4, score = 100
            //   0344242c             | add                 eax, dword ptr [esp + 0x2c]
            //   8bc8                 | mov                 ecx, eax
            //   e8????????           |                     
            //   4889442448           | dec                 eax

        $sequence_11 = { 03c1 89442420 8b442420 83c001 }
            // n = 4, score = 100
            //   03c1                 | add                 ecx, dword ptr [esp + 0x60]
            //   89442420             | dec                 eax
            //   8b442420             | mov                 eax, dword ptr [esp + 0x50]
            //   83c001               | mov                 dword ptr [eax + 0x20], ecx

        $sequence_12 = { 03c1 4863d0 488b4c2430 488b442438 }
            // n = 4, score = 100
            //   03c1                 | add                 ecx, dword ptr [esp + 0x60]
            //   4863d0               | dec                 eax
            //   488b4c2430           | mov                 eax, dword ptr [esp + 0x50]
            //   488b442438           | mov                 dword ptr [eax + 0x20], ecx

        $sequence_13 = { 03c1 89442420 8b4c2438 488b442450 }
            // n = 4, score = 100
            //   03c1                 | dec                 eax
            //   89442420             | mov                 eax, dword ptr [esp + 0x38]
            //   8b4c2438             | inc                 edx
            //   488b442450           | movzx               eax, byte ptr [eax + eax]

        $sequence_14 = { 034c242c 488b442470 894820 488d542440 }
            // n = 4, score = 100
            //   034c242c             | add                 eax, dword ptr [esp + 0x2c]
            //   488b442470           | mov                 ecx, eax
            //   894820               | dec                 eax
            //   488d542440           | mov                 dword ptr [esp + 0x48], eax

        $sequence_15 = { 03c1 89442434 8b442430 39442434 }
            // n = 4, score = 100
            //   03c1                 | mov                 dword ptr [esp + 0x20], eax
            //   89442434             | mov                 eax, dword ptr [esp + 0x20]
            //   8b442430             | add                 eax, 0xa
            //   39442434             | add                 eax, ecx

    condition:
        7 of them and filesize < 402432
}
Download all Yara Rules