SYMBOLCOMMON_NAMEaka. SYNONYMS
win.downdelph (Back to overview)

Downdelph

aka: DELPHACY

Actor(s): Sofacy


There is no description at this point.

References
2020-05-21PICUS SecuritySüleyman Özarslan
@online{zarslan:20200521:t1055:4400f98, author = {Süleyman Özarslan}, title = {{T1055 Process Injection}}, date = {2020-05-21}, organization = {PICUS Security}, url = {https://www.picussecurity.com/blog/picus-10-critical-mitre-attck-techniques-t1055-process-injection}, language = {English}, urldate = {2020-06-03} } T1055 Process Injection
BlackEnergy Cardinal RAT Downdelph Emotet Kazuar RokRAT SOUNDBITE
2017-02-20Contagio DumpMila Parkour
@online{parkour:20170220:part:c54b5de, author = {Mila Parkour}, title = {{Part I. Russian APT - APT28 collection of samples including OSX XAgent}}, date = {2017-02-20}, organization = {Contagio Dump}, url = {https://contagiodump.blogspot.de/2017/02/russian-apt-apt28-collection-of-samples.html}, language = {English}, urldate = {2019-11-26} } Part I. Russian APT - APT28 collection of samples including OSX XAgent
X-Agent Komplex Coreshell Downdelph HideDRV SEADADDY Sedreco Seduploader X-Agent XTunnel
2016-09-11ESET ResearchESET Research
@techreport{research:20160911:en:28dbd06, author = {ESET Research}, title = {{En Route with Sednit - Part 3: A Mysterious Downloader}}, date = {2016-09-11}, institution = {ESET Research}, url = {http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf}, language = {English}, urldate = {2019-10-12} } En Route with Sednit - Part 3: A Mysterious Downloader
Downdelph
Yara Rules
[TLP:WHITE] win_downdelph_auto (20200817 | autogenerated rule brought to you by yara-signator)
rule win_downdelph_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-08-17"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.downdelph"
        malpedia_rule_date = "20200817"
        malpedia_hash = "8c895fd01eccb47a6225bcb1a3ba53cbb98644c5"
        malpedia_version = "20200817"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 81ce00ffffff 46 884df7 0fb68435bcfeffff }
            // n = 4, score = 400
            //   81ce00ffffff         | or                  esi, 0xffffff00
            //   46                   | inc                 esi
            //   884df7               | mov                 byte ptr [ebp - 9], cl
            //   0fb68435bcfeffff     | movzx               eax, byte ptr [ebp + esi - 0x144]

        $sequence_1 = { 8b4ff8 85ed 0f8408010000 51 8b4f04 }
            // n = 5, score = 400
            //   8b4ff8               | mov                 ecx, dword ptr [edi - 8]
            //   85ed                 | test                ebp, ebp
            //   0f8408010000         | je                  0x10e
            //   51                   | push                ecx
            //   8b4f04               | mov                 ecx, dword ptr [edi + 4]

        $sequence_2 = { 68000000a0 6a2f 68???????? 8b45e8 50 e8???????? 85c0 }
            // n = 7, score = 400
            //   68000000a0           | push                0xa0000000
            //   6a2f                 | push                0x2f
            //   68????????           |                     
            //   8b45e8               | mov                 eax, dword ptr [ebp - 0x18]
            //   50                   | push                eax
            //   e8????????           |                     
            //   85c0                 | test                eax, eax

        $sequence_3 = { 742e 80f90b 744e 80f912 7438 }
            // n = 5, score = 400
            //   742e                 | je                  0x30
            //   80f90b               | cmp                 cl, 0xb
            //   744e                 | je                  0x50
            //   80f912               | cmp                 cl, 0x12
            //   7438                 | je                  0x3a

        $sequence_4 = { 7414 6a00 8d45f4 50 56 57 53 }
            // n = 7, score = 400
            //   7414                 | je                  0x16
            //   6a00                 | push                0
            //   8d45f4               | lea                 eax, [ebp - 0xc]
            //   50                   | push                eax
            //   56                   | push                esi
            //   57                   | push                edi
            //   53                   | push                ebx

        $sequence_5 = { 8bc3 51 b934000000 99 f7f9 59 0fb64415bc }
            // n = 7, score = 400
            //   8bc3                 | mov                 eax, ebx
            //   51                   | push                ecx
            //   b934000000           | mov                 ecx, 0x34
            //   99                   | cdq                 
            //   f7f9                 | idiv                ecx
            //   59                   | pop                 ecx
            //   0fb64415bc           | movzx               eax, byte ptr [ebp + edx - 0x44]

        $sequence_6 = { e8???????? 83c404 8b45fc e8???????? 8b55fc 33c9 }
            // n = 6, score = 400
            //   e8????????           |                     
            //   83c404               | add                 esp, 4
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   e8????????           |                     
            //   8b55fc               | mov                 edx, dword ptr [ebp - 4]
            //   33c9                 | xor                 ecx, ecx

        $sequence_7 = { e8???????? 50 e8???????? 8bd8 83fbff 7414 }
            // n = 6, score = 400
            //   e8????????           |                     
            //   50                   | push                eax
            //   e8????????           |                     
            //   8bd8                 | mov                 ebx, eax
            //   83fbff               | cmp                 ebx, -1
            //   7414                 | je                  0x16

        $sequence_8 = { e8???????? 833d????????00 7402 b301 }
            // n = 4, score = 300
            //   e8????????           |                     
            //   833d????????00       |                     
            //   7402                 | je                  4
            //   b301                 | mov                 bl, 1

        $sequence_9 = { 83ffff 7509 8bc8 807c0bff00 7476 3bc6 }
            // n = 6, score = 200
            //   83ffff               | cmp                 edi, -1
            //   7509                 | jne                 0xb
            //   8bc8                 | mov                 ecx, eax
            //   807c0bff00           | cmp                 byte ptr [ebx + ecx - 1], 0
            //   7476                 | je                  0x78
            //   3bc6                 | cmp                 eax, esi

        $sequence_10 = { e8???????? 89de 8bf8 83ef02 3bf7 7f2e 83c701 }
            // n = 7, score = 200
            //   e8????????           |                     
            //   89de                 | mov                 esi, ebx
            //   8bf8                 | mov                 edi, eax
            //   83ef02               | sub                 edi, 2
            //   3bf7                 | cmp                 esi, edi
            //   7f2e                 | jg                  0x30
            //   83c701               | add                 edi, 1

        $sequence_11 = { 83e930 85c9 7c05 83f909 7e17 }
            // n = 5, score = 200
            //   83e930               | sub                 ecx, 0x30
            //   85c9                 | test                ecx, ecx
            //   7c05                 | jl                  7
            //   83f909               | cmp                 ecx, 9
            //   7e17                 | jle                 0x19

        $sequence_12 = { 807c0bff00 7476 3bc6 7532 eb03 83e801 }
            // n = 6, score = 200
            //   807c0bff00           | cmp                 byte ptr [ebx + ecx - 1], 0
            //   7476                 | je                  0x78
            //   3bc6                 | cmp                 eax, esi
            //   7532                 | jne                 0x34
            //   eb03                 | jmp                 5
            //   83e801               | sub                 eax, 1

        $sequence_13 = { 3bc6 7763 83ffff 750a 8bc8 66837c4bfe00 }
            // n = 6, score = 200
            //   3bc6                 | cmp                 eax, esi
            //   7763                 | ja                  0x65
            //   83ffff               | cmp                 edi, -1
            //   750a                 | jne                 0xc
            //   8bc8                 | mov                 ecx, eax
            //   66837c4bfe00         | cmp                 word ptr [ebx + ecx*2 - 2], 0

        $sequence_14 = { 894c242c eb51 8b4c242c c1e104 }
            // n = 4, score = 200
            //   894c242c             | mov                 dword ptr [esp + 0x2c], ecx
            //   eb51                 | jmp                 0x53
            //   8b4c242c             | mov                 ecx, dword ptr [esp + 0x2c]
            //   c1e104               | shl                 ecx, 4

        $sequence_15 = { 83c001 8bc8 66c7444bfe0000 eb22 c7c1e9fd0000 }
            // n = 5, score = 200
            //   83c001               | add                 eax, 1
            //   8bc8                 | mov                 ecx, eax
            //   66c7444bfe0000       | mov                 word ptr [ebx + ecx*2 - 2], 0
            //   eb22                 | jmp                 0x24
            //   c7c1e9fd0000         | mov                 ecx, 0xfde9

    condition:
        7 of them and filesize < 311296
}
Download all Yara Rules