SYMBOLCOMMON_NAMEaka. SYNONYMS
win.cuegoe (Back to overview)

Cuegoe

Actor(s): APT32


There is no description at this point.

References
2017-05-14FireEyeNick Carr
@online{carr:20170514:cyber:0ac720f, author = {Nick Carr}, title = {{Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations}}, date = {2017-05-14}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html}, language = {English}, urldate = {2019-12-20} } Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations
OceanLotus Cuegoe KOMPROGO SOUNDBITE APT32
2014-08-24Malware Must Die!unixfreaxjp
@online{unixfreaxjp:20140824:another:e402338, author = {unixfreaxjp}, title = {{Another country-sponsored #malware: Vietnam APT Campaign}}, date = {2014-08-24}, organization = {Malware Must Die!}, url = {http://blog.malwaremustdie.org/2014/08/another-country-sponsored-malware.html}, language = {English}, urldate = {2020-01-12} } Another country-sponsored #malware: Vietnam APT Campaign
Cuegoe
2014-01-19Electronic Frontier FoundationEva Galperin, Morgan Marquis-Boire
@online{galperin:20140119:vietnamese:6ff15b6, author = {Eva Galperin and Morgan Marquis-Boire}, title = {{Vietnamese Malware Gets Very Personal}}, date = {2014-01-19}, organization = {Electronic Frontier Foundation}, url = {https://www.eff.org/deeplinks/2014/01/vietnamese-malware-gets-personal}, language = {English}, urldate = {2020-01-13} } Vietnamese Malware Gets Very Personal
Cuegoe
Yara Rules
[TLP:WHITE] win_cuegoe_auto (20230715 | Detects win.cuegoe.)
rule win_cuegoe_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.cuegoe."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.cuegoe"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 894590 8b4514 8bf1 8bda 50 897588 }
            // n = 6, score = 200
            //   894590               | mov                 dword ptr [ebp - 0x70], eax
            //   8b4514               | mov                 eax, dword ptr [ebp + 0x14]
            //   8bf1                 | mov                 esi, ecx
            //   8bda                 | mov                 ebx, edx
            //   50                   | push                eax
            //   897588               | mov                 dword ptr [ebp - 0x78], esi

        $sequence_1 = { 0fb703 33d2 c745c402000000 6685c0 7415 0fb7c8 }
            // n = 6, score = 200
            //   0fb703               | movzx               eax, word ptr [ebx]
            //   33d2                 | xor                 edx, edx
            //   c745c402000000       | mov                 dword ptr [ebp - 0x3c], 2
            //   6685c0               | test                ax, ax
            //   7415                 | je                  0x17
            //   0fb7c8               | movzx               ecx, ax

        $sequence_2 = { 6a01 8d4dd4 e8???????? 8bc6 e9???????? 8d45a8 e8???????? }
            // n = 7, score = 200
            //   6a01                 | push                1
            //   8d4dd4               | lea                 ecx, [ebp - 0x2c]
            //   e8????????           |                     
            //   8bc6                 | mov                 eax, esi
            //   e9????????           |                     
            //   8d45a8               | lea                 eax, [ebp - 0x58]
            //   e8????????           |                     

        $sequence_3 = { 8b4604 fe8804c40310 8b4604 80b804c4031000 7f15 56 e8???????? }
            // n = 7, score = 200
            //   8b4604               | mov                 eax, dword ptr [esi + 4]
            //   fe8804c40310         | dec                 byte ptr [eax + 0x1003c404]
            //   8b4604               | mov                 eax, dword ptr [esi + 4]
            //   80b804c4031000       | cmp                 byte ptr [eax + 0x1003c404], 0
            //   7f15                 | jg                  0x17
            //   56                   | push                esi
            //   e8????????           |                     

        $sequence_4 = { b8???????? e8???????? 8bf1 8b7d0c 8b460c 2b7d08 }
            // n = 6, score = 200
            //   b8????????           |                     
            //   e8????????           |                     
            //   8bf1                 | mov                 esi, ecx
            //   8b7d0c               | mov                 edi, dword ptr [ebp + 0xc]
            //   8b460c               | mov                 eax, dword ptr [esi + 0xc]
            //   2b7d08               | sub                 edi, dword ptr [ebp + 8]

        $sequence_5 = { 56 8d5c243c e8???????? 85c0 7522 8b44242c 8b5004 }
            // n = 7, score = 200
            //   56                   | push                esi
            //   8d5c243c             | lea                 ebx, [esp + 0x3c]
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7522                 | jne                 0x24
            //   8b44242c             | mov                 eax, dword ptr [esp + 0x2c]
            //   8b5004               | mov                 edx, dword ptr [eax + 4]

        $sequence_6 = { ff15???????? 53 6a01 8d7538 e8???????? eb21 c745185f250000 }
            // n = 7, score = 200
            //   ff15????????         |                     
            //   53                   | push                ebx
            //   6a01                 | push                1
            //   8d7538               | lea                 esi, [ebp + 0x38]
            //   e8????????           |                     
            //   eb21                 | jmp                 0x23
            //   c745185f250000       | mov                 dword ptr [ebp + 0x18], 0x255f

        $sequence_7 = { 0bc1 f644242001 668b4c2410 66890e 8b8d540c0000 8d340a 8b4c2410 }
            // n = 7, score = 200
            //   0bc1                 | or                  eax, ecx
            //   f644242001           | test                byte ptr [esp + 0x20], 1
            //   668b4c2410           | mov                 cx, word ptr [esp + 0x10]
            //   66890e               | mov                 word ptr [esi], cx
            //   8b8d540c0000         | mov                 ecx, dword ptr [ebp + 0xc54]
            //   8d340a               | lea                 esi, [edx + ecx]
            //   8b4c2410             | mov                 ecx, dword ptr [esp + 0x10]

        $sequence_8 = { 25c0010000 83f840 7430 3975e8 7626 8b07 8b4004 }
            // n = 7, score = 200
            //   25c0010000           | and                 eax, 0x1c0
            //   83f840               | cmp                 eax, 0x40
            //   7430                 | je                  0x32
            //   3975e8               | cmp                 dword ptr [ebp - 0x18], esi
            //   7626                 | jbe                 0x28
            //   8b07                 | mov                 eax, dword ptr [edi]
            //   8b4004               | mov                 eax, dword ptr [eax + 4]

        $sequence_9 = { 59 8d75bc e8???????? ff75bc e8???????? 59 397d14 }
            // n = 7, score = 200
            //   59                   | pop                 ecx
            //   8d75bc               | lea                 esi, [ebp - 0x44]
            //   e8????????           |                     
            //   ff75bc               | push                dword ptr [ebp - 0x44]
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   397d14               | cmp                 dword ptr [ebp + 0x14], edi

    condition:
        7 of them and filesize < 540672
}
Download all Yara Rules