SYMBOLCOMMON_NAMEaka. SYNONYMS
win.downdelph (Back to overview)

Downdelph

aka: DELPHACY

Actor(s): Sofacy


There is no description at this point.

References
2020-05-21PICUS SecuritySüleyman Özarslan
@online{zarslan:20200521:t1055:4400f98, author = {Süleyman Özarslan}, title = {{T1055 Process Injection}}, date = {2020-05-21}, organization = {PICUS Security}, url = {https://www.picussecurity.com/blog/picus-10-critical-mitre-attck-techniques-t1055-process-injection}, language = {English}, urldate = {2020-06-03} } T1055 Process Injection
BlackEnergy Cardinal RAT Downdelph Emotet Kazuar RokRAT SOUNDBITE
2017-02-20Contagio DumpMila Parkour
@online{parkour:20170220:part:c54b5de, author = {Mila Parkour}, title = {{Part I. Russian APT - APT28 collection of samples including OSX XAgent}}, date = {2017-02-20}, organization = {Contagio Dump}, url = {https://contagiodump.blogspot.de/2017/02/russian-apt-apt28-collection-of-samples.html}, language = {English}, urldate = {2019-11-26} } Part I. Russian APT - APT28 collection of samples including OSX XAgent
X-Agent Komplex Coreshell Downdelph HideDRV SEADADDY Sedreco Seduploader X-Agent XTunnel
2016-09-11ESET ResearchESET Research
@techreport{research:20160911:en:28dbd06, author = {ESET Research}, title = {{En Route with Sednit - Part 3: A Mysterious Downloader}}, date = {2016-09-11}, institution = {ESET Research}, url = {http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf}, language = {English}, urldate = {2019-10-12} } En Route with Sednit - Part 3: A Mysterious Downloader
Downdelph
Yara Rules
[TLP:WHITE] win_downdelph_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_downdelph_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.downdelph"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 6800000080 6a00 68???????? 68???????? }
            // n = 4, score = 400
            //   6800000080           | push                0x80000000
            //   6a00                 | push                0
            //   68????????           |                     
            //   68????????           |                     

        $sequence_1 = { 83e802 50 8d45fc b901000000 8b15???????? e8???????? }
            // n = 6, score = 400
            //   83e802               | sub                 eax, 2
            //   50                   | push                eax
            //   8d45fc               | lea                 eax, [ebp - 4]
            //   b901000000           | mov                 ecx, 1
            //   8b15????????         |                     
            //   e8????????           |                     

        $sequence_2 = { e8???????? 53 e8???????? 3b75f4 7504 }
            // n = 5, score = 400
            //   e8????????           |                     
            //   53                   | push                ebx
            //   e8????????           |                     
            //   3b75f4               | cmp                 esi, dword ptr [ebp - 0xc]
            //   7504                 | jne                 6

        $sequence_3 = { 0fb645f7 888435bcfeffff 43 47 81fb00010000 75b3 }
            // n = 6, score = 400
            //   0fb645f7             | movzx               eax, byte ptr [ebp - 9]
            //   888435bcfeffff       | mov                 byte ptr [ebp + esi - 0x144], al
            //   43                   | inc                 ebx
            //   47                   | inc                 edi
            //   81fb00010000         | cmp                 ebx, 0x100
            //   75b3                 | jne                 0xffffffb5

        $sequence_4 = { c605????????01 d93d???????? 8b450c 48 0f8537010000 e8???????? }
            // n = 6, score = 400
            //   c605????????01       |                     
            //   d93d????????         |                     
            //   8b450c               | mov                 eax, dword ptr [ebp + 0xc]
            //   48                   | dec                 eax
            //   0f8537010000         | jne                 0x13d
            //   e8????????           |                     

        $sequence_5 = { 53 33db 68???????? 6a00 6a00 }
            // n = 5, score = 400
            //   53                   | push                ebx
            //   33db                 | xor                 ebx, ebx
            //   68????????           |                     
            //   6a00                 | push                0
            //   6a00                 | push                0

        $sequence_6 = { 6683e820 7316 8bc6 e8???????? }
            // n = 4, score = 400
            //   6683e820             | sub                 ax, 0x20
            //   7316                 | jae                 0x18
            //   8bc6                 | mov                 eax, esi
            //   e8????????           |                     

        $sequence_7 = { e8???????? 8b55fc 33c9 92 }
            // n = 4, score = 400
            //   e8????????           |                     
            //   8b55fc               | mov                 edx, dword ptr [ebp - 4]
            //   33c9                 | xor                 ecx, ecx
            //   92                   | xchg                eax, edx

        $sequence_8 = { e8???????? 833d????????00 7402 b301 }
            // n = 4, score = 300
            //   e8????????           |                     
            //   833d????????00       |                     
            //   7402                 | je                  4
            //   b301                 | mov                 bl, 1

        $sequence_9 = { 8bc8 66817c4bfeffdf 7708 83e801 eb03 83c001 }
            // n = 6, score = 200
            //   8bc8                 | mov                 ecx, eax
            //   66817c4bfeffdf       | cmp                 word ptr [ebx + ecx*2 - 2], 0xdfff
            //   7708                 | ja                  0xa
            //   83e801               | sub                 eax, 1
            //   eb03                 | jmp                 5
            //   83c001               | add                 eax, 1

        $sequence_10 = { 894d34 8985c4000000 8b4534 3985c4000000 0f8fbe040000 8b4534 83c001 }
            // n = 7, score = 200
            //   894d34               | mov                 dword ptr [ebp + 0x34], ecx
            //   8985c4000000         | mov                 dword ptr [ebp + 0xc4], eax
            //   8b4534               | mov                 eax, dword ptr [ebp + 0x34]
            //   3985c4000000         | cmp                 dword ptr [ebp + 0xc4], eax
            //   0f8fbe040000         | jg                  0x4c4
            //   8b4534               | mov                 eax, dword ptr [ebp + 0x34]
            //   83c001               | add                 eax, 1

        $sequence_11 = { eb11 3bf8 750a 83c701 893e }
            // n = 5, score = 200
            //   eb11                 | jmp                 0x13
            //   3bf8                 | cmp                 edi, eax
            //   750a                 | jne                 0xc
            //   83c701               | add                 edi, 1
            //   893e                 | mov                 dword ptr [esi], edi

        $sequence_12 = { e8???????? 85c0 7405 b001 884543 }
            // n = 5, score = 200
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7405                 | je                  7
            //   b001                 | mov                 al, 1
            //   884543               | mov                 byte ptr [ebp + 0x43], al

        $sequence_13 = { 0f8489000000 8bc8 f7c100040000 7474 }
            // n = 4, score = 200
            //   0f8489000000         | je                  0x8f
            //   8bc8                 | mov                 ecx, eax
            //   f7c100040000         | test                ecx, 0x400
            //   7474                 | je                  0x76

        $sequence_14 = { 83e930 894c242c eb51 8b4c242c c1e104 }
            // n = 5, score = 200
            //   83e930               | sub                 ecx, 0x30
            //   894c242c             | mov                 dword ptr [esp + 0x2c], ecx
            //   eb51                 | jmp                 0x53
            //   8b4c242c             | mov                 ecx, dword ptr [esp + 0x2c]
            //   c1e104               | shl                 ecx, 4

        $sequence_15 = { 0f8e4effffff 90 eb62 3bf8 7f5d 8b4c242c }
            // n = 6, score = 200
            //   0f8e4effffff         | jle                 0xffffff54
            //   90                   | nop                 
            //   eb62                 | jmp                 0x64
            //   3bf8                 | cmp                 edi, eax
            //   7f5d                 | jg                  0x5f
            //   8b4c242c             | mov                 ecx, dword ptr [esp + 0x2c]

    condition:
        7 of them and filesize < 311296
}
Download all Yara Rules