SYMBOLCOMMON_NAMEaka. SYNONYMS
win.darktequila (Back to overview)

DarkTequila

VTCollection    

Dark Tequila is a complex malicious campaign targeting Mexican users, with the primary purpose of stealing financial information, as well as login credentials to popular websites that range from code versioning repositories to public file storage accounts and domain registrars.

References
2018-08-21Kaspersky LabsGReAT
Dark Tequila Añejo
DarkTequila
Yara Rules
[TLP:WHITE] win_darktequila_auto (20241030 | Detects win.darktequila.)
rule win_darktequila_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2024-10-31"
        version = "1"
        description = "Detects win.darktequila."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.darktequila"
        malpedia_rule_date = "20241030"
        malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4"
        malpedia_version = "20241030"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { b803000000 e8???????? 6a0b 50 e8???????? 8b4310 }
            // n = 6, score = 200
            //   b803000000           | mov                 eax, 3
            //   e8????????           |                     
            //   6a0b                 | push                0xb
            //   50                   | push                eax
            //   e8????????           |                     
            //   8b4310               | mov                 eax, dword ptr [ebx + 0x10]

        $sequence_1 = { ff15???????? 85c0 740a c705????????01000000 b80b000000 }
            // n = 5, score = 200
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   740a                 | je                  0xc
            //   c705????????01000000     |     
            //   b80b000000           | mov                 eax, 0xb

        $sequence_2 = { 85c0 7423 8b4b10 803c085c 7404 c604085c }
            // n = 6, score = 200
            //   85c0                 | test                eax, eax
            //   7423                 | je                  0x25
            //   8b4b10               | mov                 ecx, dword ptr [ebx + 0x10]
            //   803c085c             | cmp                 byte ptr [eax + ecx], 0x5c
            //   7404                 | je                  6
            //   c604085c             | mov                 byte ptr [eax + ecx], 0x5c

        $sequence_3 = { 8945f8 85c0 7467 8b4b0c }
            // n = 4, score = 200
            //   8945f8               | mov                 dword ptr [ebp - 8], eax
            //   85c0                 | test                eax, eax
            //   7467                 | je                  0x69
            //   8b4b0c               | mov                 ecx, dword ptr [ebx + 0xc]

        $sequence_4 = { 85c0 740d 8d9b00000000 c60300 43 }
            // n = 5, score = 200
            //   85c0                 | test                eax, eax
            //   740d                 | je                  0xf
            //   8d9b00000000         | lea                 ebx, [ebx]
            //   c60300               | mov                 byte ptr [ebx], 0
            //   43                   | inc                 ebx

        $sequence_5 = { 8b4d08 8b15???????? 8901 8913 }
            // n = 4, score = 200
            //   8b4d08               | mov                 ecx, dword ptr [ebp + 8]
            //   8b15????????         |                     
            //   8901                 | mov                 dword ptr [ecx], eax
            //   8913                 | mov                 dword ptr [ebx], edx

        $sequence_6 = { 85c0 740d 894610 b801000000 }
            // n = 4, score = 200
            //   85c0                 | test                eax, eax
            //   740d                 | je                  0xf
            //   894610               | mov                 dword ptr [esi + 0x10], eax
            //   b801000000           | mov                 eax, 1

        $sequence_7 = { 895e0c 5b c3 8b5610 }
            // n = 4, score = 200
            //   895e0c               | mov                 dword ptr [esi + 0xc], ebx
            //   5b                   | pop                 ebx
            //   c3                   | ret                 
            //   8b5610               | mov                 edx, dword ptr [esi + 0x10]

        $sequence_8 = { 8bc1 894308 8b45d8 8b4dfc 33cd }
            // n = 5, score = 200
            //   8bc1                 | mov                 eax, ecx
            //   894308               | mov                 dword ptr [ebx + 8], eax
            //   8b45d8               | mov                 eax, dword ptr [ebp - 0x28]
            //   8b4dfc               | mov                 ecx, dword ptr [ebp - 4]
            //   33cd                 | xor                 ecx, ebp

        $sequence_9 = { 85db 0f84c2000000 56 57 8d4102 e8???????? }
            // n = 6, score = 200
            //   85db                 | test                ebx, ebx
            //   0f84c2000000         | je                  0xc8
            //   56                   | push                esi
            //   57                   | push                edi
            //   8d4102               | lea                 eax, [ecx + 2]
            //   e8????????           |                     

    condition:
        7 of them and filesize < 1827840
}
Download all Yara Rules