SYMBOLCOMMON_NAMEaka. SYNONYMS
win.confucius (Back to overview)

Confucius


There is no description at this point.

References
2021-08-17Trend MicroDaniel Lunghi
@online{lunghi:20210817:confucius:f0f4578, author = {Daniel Lunghi}, title = {{Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military}}, date = {2021-08-17}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/h/confucius-uses-pegasus-spyware-related-lures-to-target-pakistani.html}, language = {English}, urldate = {2021-08-23} } Confucius Uses Pegasus Spyware-related Lures to Target Pakistani Military
Chrysaor Confucius
2021-01-12UptycsAbhijit Mohanta, Ashwin Vamshi
@online{mohanta:20210112:confucius:865bcc8, author = {Abhijit Mohanta and Ashwin Vamshi}, title = {{Confucius APT deploys Warzone RAT}}, date = {2021-01-12}, organization = {Uptycs}, url = {https://www.uptycs.com/blog/confucius-apt-deploys-warzone-rat}, language = {English}, urldate = {2021-01-13} } Confucius APT deploys Warzone RAT
Ave Maria Confucius
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
@online{soo:20171102:recent:af4616a, author = {Jacob Soo and Josh Grunzweig}, title = {{Recent InPage Exploits Lead to Multiple Malware Families}}, date = {2017-11-02}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2017/11/unit42-recent-inpage-exploits-lead-multiple-malware-families/}, language = {English}, urldate = {2019-12-20} } Recent InPage Exploits Lead to Multiple Malware Families
Confucius
2016-09-28Palo Alto Networks Unit 42Tom Lancaster, Micah Yates
@online{lancaster:20160928:confucius:24e8de3, author = {Tom Lancaster and Micah Yates}, title = {{Confucius Says…Malware Families Get Further By Abusing Legitimate Websites}}, date = {2016-09-28}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2016/09/unit42-confucius-says-malware-families-get-further-by-abusing-legitimate-websites/}, language = {English}, urldate = {2019-12-20} } Confucius Says…Malware Families Get Further By Abusing Legitimate Websites
Confucius SNEEPY
Yara Rules
[TLP:WHITE] win_confucius_auto (20230407 | Detects win.confucius.)
rule win_confucius_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-03-29"
        version = "1"
        description = "Detects win.confucius."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.confucius"
        malpedia_rule_date = "20230328"
        malpedia_hash = "9d2d75cef573c1c2d861f5197df8f563b05a305d"
        malpedia_version = "20230407"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 55 57 68???????? 6801400000 53 e8???????? 8b442470 }
            // n = 7, score = 100
            //   55                   | push                ebp
            //   57                   | push                edi
            //   68????????           |                     
            //   6801400000           | push                0x4001
            //   53                   | push                ebx
            //   e8????????           |                     
            //   8b442470             | mov                 eax, dword ptr [esp + 0x70]

        $sequence_1 = { a1???????? a3???????? a1???????? a3???????? eb28 33c0 40 }
            // n = 7, score = 100
            //   a1????????           |                     
            //   a3????????           |                     
            //   a1????????           |                     
            //   a3????????           |                     
            //   eb28                 | jmp                 0x2a
            //   33c0                 | xor                 eax, eax
            //   40                   | inc                 eax

        $sequence_2 = { 7425 ffb568f7ffff e8???????? 84c0 7507 56 57 }
            // n = 7, score = 100
            //   7425                 | je                  0x27
            //   ffb568f7ffff         | push                dword ptr [ebp - 0x898]
            //   e8????????           |                     
            //   84c0                 | test                al, al
            //   7507                 | jne                 9
            //   56                   | push                esi
            //   57                   | push                edi

        $sequence_3 = { 68???????? 57 e8???????? 8b6c2420 83c410 c744241407000000 e9???????? }
            // n = 7, score = 100
            //   68????????           |                     
            //   57                   | push                edi
            //   e8????????           |                     
            //   8b6c2420             | mov                 ebp, dword ptr [esp + 0x20]
            //   83c410               | add                 esp, 0x10
            //   c744241407000000     | mov                 dword ptr [esp + 0x14], 7
            //   e9????????           |                     

        $sequence_4 = { 3bc7 0f8419010000 83f8ff 0f8410010000 a1???????? 83f8ff }
            // n = 6, score = 100
            //   3bc7                 | cmp                 eax, edi
            //   0f8419010000         | je                  0x11f
            //   83f8ff               | cmp                 eax, -1
            //   0f8410010000         | je                  0x116
            //   a1????????           |                     
            //   83f8ff               | cmp                 eax, -1

        $sequence_5 = { 53 e8???????? 8b54242c 83c408 8bc7 c6464d00 5f }
            // n = 7, score = 100
            //   53                   | push                ebx
            //   e8????????           |                     
            //   8b54242c             | mov                 edx, dword ptr [esp + 0x2c]
            //   83c408               | add                 esp, 8
            //   8bc7                 | mov                 eax, edi
            //   c6464d00             | mov                 byte ptr [esi + 0x4d], 0
            //   5f                   | pop                 edi

        $sequence_6 = { 56 e8???????? 59 59 8b0d???????? 85c9 7406 }
            // n = 7, score = 100
            //   56                   | push                esi
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   59                   | pop                 ecx
            //   8b0d????????         |                     
            //   85c9                 | test                ecx, ecx
            //   7406                 | je                  8

        $sequence_7 = { 33d1 03542414 8dbc17d15d8485 8bd7 c1e215 c1ef0b 0bd7 }
            // n = 7, score = 100
            //   33d1                 | xor                 edx, ecx
            //   03542414             | add                 edx, dword ptr [esp + 0x14]
            //   8dbc17d15d8485       | lea                 edi, [edi + edx - 0x7a7ba22f]
            //   8bd7                 | mov                 edx, edi
            //   c1e215               | shl                 edx, 0x15
            //   c1ef0b               | shr                 edi, 0xb
            //   0bd7                 | or                  edx, edi

        $sequence_8 = { 668901 c605????????01 6afc 58 2bc7 01450c 837d0c04 }
            // n = 7, score = 100
            //   668901               | mov                 word ptr [ecx], ax
            //   c605????????01       |                     
            //   6afc                 | push                -4
            //   58                   | pop                 eax
            //   2bc7                 | sub                 eax, edi
            //   01450c               | add                 dword ptr [ebp + 0xc], eax
            //   837d0c04             | cmp                 dword ptr [ebp + 0xc], 4

        $sequence_9 = { 6aff e8???????? bf???????? 83c9ff 33c0 68???????? f2ae }
            // n = 7, score = 100
            //   6aff                 | push                -1
            //   e8????????           |                     
            //   bf????????           |                     
            //   83c9ff               | or                  ecx, 0xffffffff
            //   33c0                 | xor                 eax, eax
            //   68????????           |                     
            //   f2ae                 | repne scasb         al, byte ptr es:[edi]

        $sequence_10 = { 5b 83c408 c3 8bfb 83c9ff 33c0 f2ae }
            // n = 7, score = 100
            //   5b                   | pop                 ebx
            //   83c408               | add                 esp, 8
            //   c3                   | ret                 
            //   8bfb                 | mov                 edi, ebx
            //   83c9ff               | or                  ecx, 0xffffffff
            //   33c0                 | xor                 eax, eax
            //   f2ae                 | repne scasb         al, byte ptr es:[edi]

        $sequence_11 = { 83c404 8986c4000000 85c0 750a 5f 5e 5d }
            // n = 7, score = 100
            //   83c404               | add                 esp, 4
            //   8986c4000000         | mov                 dword ptr [esi + 0xc4], eax
            //   85c0                 | test                eax, eax
            //   750a                 | jne                 0xc
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   5d                   | pop                 ebp

        $sequence_12 = { 56 ff15???????? 381d???????? 7419 891d???????? 381d???????? }
            // n = 6, score = 100
            //   56                   | push                esi
            //   ff15????????         |                     
            //   381d????????         |                     
            //   7419                 | je                  0x1b
            //   891d????????         |                     
            //   381d????????         |                     

        $sequence_13 = { 53 e8???????? 50 56 ff15???????? eb08 }
            // n = 6, score = 100
            //   53                   | push                ebx
            //   e8????????           |                     
            //   50                   | push                eax
            //   56                   | push                esi
            //   ff15????????         |                     
            //   eb08                 | jmp                 0xa

        $sequence_14 = { be???????? 8d85fcfbffff 56 7408 50 e8???????? eb08 }
            // n = 7, score = 100
            //   be????????           |                     
            //   8d85fcfbffff         | lea                 eax, [ebp - 0x404]
            //   56                   | push                esi
            //   7408                 | je                  0xa
            //   50                   | push                eax
            //   e8????????           |                     
            //   eb08                 | jmp                 0xa

        $sequence_15 = { 0f84f6000000 e9???????? 8b9634010000 8b8d34010000 8b02 8b11 50 }
            // n = 7, score = 100
            //   0f84f6000000         | je                  0xfc
            //   e9????????           |                     
            //   8b9634010000         | mov                 edx, dword ptr [esi + 0x134]
            //   8b8d34010000         | mov                 ecx, dword ptr [ebp + 0x134]
            //   8b02                 | mov                 eax, dword ptr [edx]
            //   8b11                 | mov                 edx, dword ptr [ecx]
            //   50                   | push                eax

    condition:
        7 of them and filesize < 598016
}
Download all Yara Rules