There is no description at this point.
rule win_corebot_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-07-11" version = "1" description = "Detects win.corebot." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.corebot" malpedia_rule_date = "20230705" malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41" malpedia_version = "20230715" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 8a1c08 84db 741c 01c8 } // n = 4, score = 1100 // 8a1c08 | mov bl, byte ptr [eax + ecx] // 84db | test bl, bl // 741c | je 0x1e // 01c8 | add eax, ecx $sequence_1 = { b907000000 0fb610 8955e8 c745ec07000000 8d0412 84d2 8945e8 } // n = 7, score = 1100 // b907000000 | mov ecx, 7 // 0fb610 | movzx edx, byte ptr [eax] // 8955e8 | mov dword ptr [ebp - 0x18], edx // c745ec07000000 | mov dword ptr [ebp - 0x14], 7 // 8d0412 | lea eax, [edx + edx] // 84d2 | test dl, dl // 8945e8 | mov dword ptr [ebp - 0x18], eax $sequence_2 = { c70600000000 31c0 5e 5d c20800 55 } // n = 6, score = 1100 // c70600000000 | mov dword ptr [esi], 0 // 31c0 | xor eax, eax // 5e | pop esi // 5d | pop ebp // c20800 | ret 8 // 55 | push ebp $sequence_3 = { 85c0 7418 8b0e 6a00 ff750c ff7508 } // n = 6, score = 1100 // 85c0 | test eax, eax // 7418 | je 0x1a // 8b0e | mov ecx, dword ptr [esi] // 6a00 | push 0 // ff750c | push dword ptr [ebp + 0xc] // ff7508 | push dword ptr [ebp + 8] $sequence_4 = { a2???????? 8035????????01 8035????????02 8035????????03 8035????????04 } // n = 5, score = 1100 // a2???????? | // 8035????????01 | // 8035????????02 | // 8035????????03 | // 8035????????04 | $sequence_5 = { 8b45d8 8d4801 894dd8 b907000000 0fb618 } // n = 5, score = 1100 // 8b45d8 | mov eax, dword ptr [ebp - 0x28] // 8d4801 | lea ecx, [eax + 1] // 894dd8 | mov dword ptr [ebp - 0x28], ecx // b907000000 | mov ecx, 7 // 0fb618 | movzx ebx, byte ptr [eax] $sequence_6 = { ff7508 51 ff15???????? 85c0 0f95c0 eb08 } // n = 6, score = 1100 // ff7508 | push dword ptr [ebp + 8] // 51 | push ecx // ff15???????? | // 85c0 | test eax, eax // 0f95c0 | setne al // eb08 | jmp 0xa $sequence_7 = { 8b31 85f6 7410 89f1 e8???????? 56 } // n = 6, score = 1100 // 8b31 | mov esi, dword ptr [ecx] // 85f6 | test esi, esi // 7410 | je 0x12 // 89f1 | mov ecx, esi // e8???????? | // 56 | push esi $sequence_8 = { ff15???????? 807e5000 7509 ff764c ff15???????? 8d4634 50 } // n = 7, score = 1000 // ff15???????? | // 807e5000 | cmp byte ptr [esi + 0x50], 0 // 7509 | jne 0xb // ff764c | push dword ptr [esi + 0x4c] // ff15???????? | // 8d4634 | lea eax, [esi + 0x34] // 50 | push eax $sequence_9 = { ff15???????? 8d4634 50 ff15???????? 8d4e0c e8???????? } // n = 6, score = 1000 // ff15???????? | // 8d4634 | lea eax, [esi + 0x34] // 50 | push eax // ff15???????? | // 8d4e0c | lea ecx, [esi + 0xc] // e8???????? | $sequence_10 = { 807e5800 7509 ff7654 ff15???????? 807e5000 7509 } // n = 6, score = 1000 // 807e5800 | cmp byte ptr [esi + 0x58], 0 // 7509 | jne 0xb // ff7654 | push dword ptr [esi + 0x54] // ff15???????? | // 807e5000 | cmp byte ptr [esi + 0x50], 0 // 7509 | jne 0xb $sequence_11 = { 85ff 740f 57 ff7508 } // n = 4, score = 1000 // 85ff | test edi, edi // 740f | je 0x11 // 57 | push edi // ff7508 | push dword ptr [ebp + 8] $sequence_12 = { 85c0 7515 8b4624 3b4620 } // n = 4, score = 1000 // 85c0 | test eax, eax // 7515 | jne 0x17 // 8b4624 | mov eax, dword ptr [esi + 0x24] // 3b4620 | cmp eax, dword ptr [esi + 0x20] $sequence_13 = { ff7010 ff7014 e8???????? 8b45e0 } // n = 4, score = 1000 // ff7010 | push dword ptr [eax + 0x10] // ff7014 | push dword ptr [eax + 0x14] // e8???????? | // 8b45e0 | mov eax, dword ptr [ebp - 0x20] $sequence_14 = { eb10 6800800000 6a00 56 } // n = 4, score = 1000 // eb10 | jmp 0x12 // 6800800000 | push 0x8000 // 6a00 | push 0 // 56 | push esi $sequence_15 = { ff742428 e8???????? 8b442424 8d4c2410 } // n = 4, score = 1000 // ff742428 | push dword ptr [esp + 0x28] // e8???????? | // 8b442424 | mov eax, dword ptr [esp + 0x24] // 8d4c2410 | lea ecx, [esp + 0x10] condition: 7 of them and filesize < 1302528 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY