SYMBOLCOMMON_NAMEaka. SYNONYMS
win.downdelph (Back to overview)

Downdelph

aka: DELPHACY

Actor(s): Sofacy


There is no description at this point.

References
2021-04-19Sentinel LABSMarco Figueroa
@online{figueroa:20210419:deep:f5cf649, author = {Marco Figueroa}, title = {{A Deep Dive into Zebrocy’s Dropper Docs}}, date = {2021-04-19}, organization = {Sentinel LABS}, url = {https://labs.sentinelone.com/a-deep-dive-into-zebrocys-dropper-docs/}, language = {English}, urldate = {2021-04-20} } A Deep Dive into Zebrocy’s Dropper Docs
Downdelph
2020-05-21PICUS SecuritySüleyman Özarslan
@online{zarslan:20200521:t1055:4400f98, author = {Süleyman Özarslan}, title = {{T1055 Process Injection}}, date = {2020-05-21}, organization = {PICUS Security}, url = {https://www.picussecurity.com/blog/picus-10-critical-mitre-attck-techniques-t1055-process-injection}, language = {English}, urldate = {2020-06-03} } T1055 Process Injection
BlackEnergy Cardinal RAT Downdelph Emotet Kazuar RokRAT SOUNDBITE
2017-02-20Contagio DumpMila Parkour
@online{parkour:20170220:part:c54b5de, author = {Mila Parkour}, title = {{Part I. Russian APT - APT28 collection of samples including OSX XAgent}}, date = {2017-02-20}, organization = {Contagio Dump}, url = {https://contagiodump.blogspot.de/2017/02/russian-apt-apt28-collection-of-samples.html}, language = {English}, urldate = {2019-11-26} } Part I. Russian APT - APT28 collection of samples including OSX XAgent
X-Agent Komplex Coreshell Downdelph HideDRV SEADADDY Sedreco Seduploader X-Agent XTunnel
2016-09-11ESET ResearchESET Research
@techreport{research:20160911:en:28dbd06, author = {ESET Research}, title = {{En Route with Sednit - Part 3: A Mysterious Downloader}}, date = {2016-09-11}, institution = {ESET Research}, url = {http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part3.pdf}, language = {English}, urldate = {2019-10-12} } En Route with Sednit - Part 3: A Mysterious Downloader
Downdelph
Yara Rules
[TLP:WHITE] win_downdelph_auto (20220808 | Detects win.downdelph.)
rule win_downdelph_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-08-05"
        version = "1"
        description = "Detects win.downdelph."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.downdelph"
        malpedia_rule_date = "20220805"
        malpedia_hash = "6ec06c64bcfdbeda64eff021c766b4ce34542b71"
        malpedia_version = "20220808"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 39d7 7517 bafeffffff d3c2 21148554da8900 7507 }
            // n = 6, score = 100
            //   39d7                 | cmp                 edi, edx
            //   7517                 | jne                 0x19
            //   bafeffffff           | mov                 edx, 0xfffffffe
            //   d3c2                 | rol                 edx, cl
            //   21148554da8900       | and                 dword ptr [eax*4 + 0x89da54], edx
            //   7507                 | jne                 9

        $sequence_1 = { 8d45f4 33c9 ba06000000 e8???????? 8d45f4 }
            // n = 5, score = 100
            //   8d45f4               | lea                 eax, [ebp - 0xc]
            //   33c9                 | xor                 ecx, ecx
            //   ba06000000           | mov                 edx, 6
            //   e8????????           |                     
            //   8d45f4               | lea                 eax, [ebp - 0xc]

        $sequence_2 = { 7d18 8bd3 2bd7 0faf55ec 8b45ec }
            // n = 5, score = 100
            //   7d18                 | jge                 0x1a
            //   8bd3                 | mov                 edx, ebx
            //   2bd7                 | sub                 edx, edi
            //   0faf55ec             | imul                edx, dword ptr [ebp - 0x14]
            //   8b45ec               | mov                 eax, dword ptr [ebp - 0x14]

        $sequence_3 = { 83c4f8 8bf2 33d2 8bdc 8bca 0fb6f8 }
            // n = 6, score = 100
            //   83c4f8               | add                 esp, -8
            //   8bf2                 | mov                 esi, edx
            //   33d2                 | xor                 edx, edx
            //   8bdc                 | mov                 ebx, esp
            //   8bca                 | mov                 ecx, edx
            //   0fb6f8               | movzx               edi, al

        $sequence_4 = { b201 8b45fc e8???????? 84c0 }
            // n = 4, score = 100
            //   b201                 | mov                 dl, 1
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   e8????????           |                     
            //   84c0                 | test                al, al

        $sequence_5 = { b9???????? ba???????? 8b45f0 e8???????? 8b55c4 8d45f4 e8???????? }
            // n = 7, score = 100
            //   b9????????           |                     
            //   ba????????           |                     
            //   8b45f0               | mov                 eax, dword ptr [ebp - 0x10]
            //   e8????????           |                     
            //   8b55c4               | mov                 edx, dword ptr [ebp - 0x3c]
            //   8d45f4               | lea                 eax, [ebp - 0xc]
            //   e8????????           |                     

        $sequence_6 = { 8b45f4 e8???????? 84c0 7407 b301 e9???????? 68???????? }
            // n = 7, score = 100
            //   8b45f4               | mov                 eax, dword ptr [ebp - 0xc]
            //   e8????????           |                     
            //   84c0                 | test                al, al
            //   7407                 | je                  9
            //   b301                 | mov                 bl, 1
            //   e9????????           |                     
            //   68????????           |                     

        $sequence_7 = { 0fb608 80e101 02d1 40 4e 75f2 }
            // n = 6, score = 100
            //   0fb608               | movzx               ecx, byte ptr [eax]
            //   80e101               | and                 cl, 1
            //   02d1                 | add                 dl, cl
            //   40                   | inc                 eax
            //   4e                   | dec                 esi
            //   75f2                 | jne                 0xfffffff4

        $sequence_8 = { b8???????? e8???????? 8bd0 42 8b45fc }
            // n = 5, score = 100
            //   b8????????           |                     
            //   e8????????           |                     
            //   8bd0                 | mov                 edx, eax
            //   42                   | inc                 edx
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]

        $sequence_9 = { 56 57 8bf1 8bfa 8945fc 8b45fc e8???????? }
            // n = 7, score = 100
            //   56                   | push                esi
            //   57                   | push                edi
            //   8bf1                 | mov                 esi, ecx
            //   8bfa                 | mov                 edi, edx
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   e8????????           |                     

    condition:
        7 of them and filesize < 172032
}
Download all Yara Rules