Actor(s): Leviathan
There is no description at this point.
rule win_dadstache_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-07-11" version = "1" description = "Detects win.dadstache." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.dadstache" malpedia_rule_date = "20230705" malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41" malpedia_version = "20230715" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 3bc6 77c0 eb03 8b45fc 3bc6 0f8578020000 ffb30c020000 } // n = 7, score = 500 // 3bc6 | cmp eax, esi // 77c0 | ja 0xffffffc2 // eb03 | jmp 5 // 8b45fc | mov eax, dword ptr [ebp - 4] // 3bc6 | cmp eax, esi // 0f8578020000 | jne 0x27e // ffb30c020000 | push dword ptr [ebx + 0x20c] $sequence_1 = { 83ec18 56 8b7510 57 56 } // n = 5, score = 500 // 83ec18 | sub esp, 0x18 // 56 | push esi // 8b7510 | mov esi, dword ptr [ebp + 0x10] // 57 | push edi // 56 | push esi $sequence_2 = { 8d431c 8bca 50 6a00 } // n = 4, score = 500 // 8d431c | lea eax, [ebx + 0x1c] // 8bca | mov ecx, edx // 50 | push eax // 6a00 | push 0 $sequence_3 = { e8???????? 8b442444 c744242c0f000000 c744242800000000 c644241800 83f810 } // n = 6, score = 500 // e8???????? | // 8b442444 | mov eax, dword ptr [esp + 0x44] // c744242c0f000000 | mov dword ptr [esp + 0x2c], 0xf // c744242800000000 | mov dword ptr [esp + 0x28], 0 // c644241800 | mov byte ptr [esp + 0x18], 0 // 83f810 | cmp eax, 0x10 $sequence_4 = { ffb010020000 e8???????? 83c40c 8d45fc } // n = 4, score = 500 // ffb010020000 | push dword ptr [eax + 0x210] // e8???????? | // 83c40c | add esp, 0xc // 8d45fc | lea eax, [ebp - 4] $sequence_5 = { 85d2 7465 8b3d???????? b982000000 } // n = 4, score = 500 // 85d2 | test edx, edx // 7465 | je 0x67 // 8b3d???????? | // b982000000 | mov ecx, 0x82 $sequence_6 = { c1e108 0bc8 c745e408000000 0fb64205 } // n = 4, score = 500 // c1e108 | shl ecx, 8 // 0bc8 | or ecx, eax // c745e408000000 | mov dword ptr [ebp - 0x1c], 8 // 0fb64205 | movzx eax, byte ptr [edx + 5] $sequence_7 = { 80787400 7412 ffb30c020000 e8???????? 5f } // n = 5, score = 500 // 80787400 | cmp byte ptr [eax + 0x74], 0 // 7412 | je 0x14 // ffb30c020000 | push dword ptr [ebx + 0x20c] // e8???????? | // 5f | pop edi $sequence_8 = { 0f2965c0 83c060 660f6e5024 8d8040010000 } // n = 4, score = 200 // 0f2965c0 | movaps xmmword ptr [ebp - 0x40], xmm4 // 83c060 | add eax, 0x60 // 660f6e5024 | movd xmm2, dword ptr [eax + 0x24] // 8d8040010000 | lea eax, [eax + 0x140] $sequence_9 = { 895508 33ff 8945fc 397a18 7644 90 8b04b8 } // n = 7, score = 200 // 895508 | mov dword ptr [ebp + 8], edx // 33ff | xor edi, edi // 8945fc | mov dword ptr [ebp - 4], eax // 397a18 | cmp dword ptr [edx + 0x18], edi // 7644 | jbe 0x46 // 90 | nop // 8b04b8 | mov eax, dword ptr [eax + edi*4] $sequence_10 = { ff55f0 8bd8 85db 750a } // n = 4, score = 200 // ff55f0 | call dword ptr [ebp - 0x10] // 8bd8 | mov ebx, eax // 85db | test ebx, ebx // 750a | jne 0xc $sequence_11 = { 57 6a1c 6a40 ffd0 } // n = 4, score = 200 // 57 | push edi // 6a1c | push 0x1c // 6a40 | push 0x40 // ffd0 | call eax $sequence_12 = { 50 ffd7 8945f8 85c0 7515 8b45fc c7401802000000 } // n = 7, score = 200 // 50 | push eax // ffd7 | call edi // 8945f8 | mov dword ptr [ebp - 8], eax // 85c0 | test eax, eax // 7515 | jne 0x17 // 8b45fc | mov eax, dword ptr [ebp - 4] // c7401802000000 | mov dword ptr [eax + 0x18], 2 $sequence_13 = { 85c0 74e5 8d1418 8b4220 } // n = 4, score = 200 // 85c0 | test eax, eax // 74e5 | je 0xffffffe7 // 8d1418 | lea edx, [eax + ebx] // 8b4220 | mov eax, dword ptr [edx + 0x20] $sequence_14 = { 0fb75006 05f8000000 8955e4 8945f0 85d2 0f8e92010000 } // n = 6, score = 200 // 0fb75006 | movzx edx, word ptr [eax + 6] // 05f8000000 | add eax, 0xf8 // 8955e4 | mov dword ptr [ebp - 0x1c], edx // 8945f0 | mov dword ptr [ebp - 0x10], eax // 85d2 | test edx, edx // 0f8e92010000 | jle 0x198 $sequence_15 = { 03c2 8945ec 33f6 897df4 894df8 0fb75006 } // n = 6, score = 200 // 03c2 | add eax, edx // 8945ec | mov dword ptr [ebp - 0x14], eax // 33f6 | xor esi, esi // 897df4 | mov dword ptr [ebp - 0xc], edi // 894df8 | mov dword ptr [ebp - 8], ecx // 0fb75006 | movzx edx, word ptr [eax + 6] condition: 7 of them and filesize < 580608 }
rule win_dadstache_w0 { meta: author = "Elastic Security" description = "APT40 second stage implant" source = "https://www.elastic.co/blog/advanced-techniques-used-in-malaysian-focused-apt-campaign" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.dadstache" malpedia_version = "20200626" malpedia_license = "CC BY-NC-SA 4.0" malpedia_sharing = "TLP:WHITE" strings: $a = "/list_direction" fullword wide $b = "/post_document" fullword wide $c = "/postlogin" fullword wide $d = "Download Read Path Failed %s" fullword ascii $e = "Open Pipe Failed %s" fullword ascii $f = "Open Remote File %s Failed For: %s" fullword ascii $g = "Download Read Path Failed %s" fullword ascii $h = "\\cmd.exe" fullword wide condition: all of them }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY