SYMBOLCOMMON_NAMEaka. SYNONYMS
win.emdivi (Back to overview)

Emdivi

Actor(s): Stone Panda


There is no description at this point.

References
2019-11-11Virus BulletinShusei Tomonaga, Tomoaki Tani, Hiroshi Soeda, Wataru Takahashi
@online{tomonaga:20191111:cases:ac5f1b3, author = {Shusei Tomonaga and Tomoaki Tani and Hiroshi Soeda and Wataru Takahashi}, title = {{APT cases exploiting vulnerabilities in region‑specific software}}, date = {2019-11-11}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2020/05/vb2019-paper-apt-cases-exploiting-vulnerabilities-regionspecific-software/}, language = {English}, urldate = {2020-05-13} } APT cases exploiting vulnerabilities in region‑specific software
NodeRAT Emdivi PlugX
2017-07-27Trend MicroBenson Sy, CH Lei, Kawabata Kohei
@online{sy:20170727:chessmaster:7d3e4b3, author = {Benson Sy and CH Lei and Kawabata Kohei}, title = {{ChessMaster Makes its Move: A Look into the Campaign’s Cyberespionage Arsenal}}, date = {2017-07-27}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/chessmaster-cyber-espionage-campaign/}, language = {English}, urldate = {2020-01-13} } ChessMaster Makes its Move: A Look into the Campaign’s Cyberespionage Arsenal
Emdivi
2015-11-19JPCERT/CCYou Nakatsuru
@online{nakatsuru:20151119:decrypting:8be1808, author = {You Nakatsuru}, title = {{Decrypting Strings in Emdivi}}, date = {2015-11-19}, organization = {JPCERT/CC}, url = {http://blog.jpcert.or.jp/2015/11/decrypting-strings-in-emdivi.html}, language = {English}, urldate = {2019-11-28} } Decrypting Strings in Emdivi
Emdivi
2015-09-01Trend MicroBenson Sy
@online{sy:20150901:attackers:3703ecf, author = {Benson Sy}, title = {{Attackers Target Organizations in Japan; Transform Local Sites into C&C Servers for EMDIVI Backdoor}}, date = {2015-09-01}, organization = {Trend Micro}, url = {http://blog.trendmicro.com/trendlabs-security-intelligence/attackers-target-organizations-in-japan-transform-local-sites-into-cc-servers-for-emdivi-backdoor/}, language = {English}, urldate = {2019-12-17} } Attackers Target Organizations in Japan; Transform Local Sites into C&C Servers for EMDIVI Backdoor
Emdivi
2015-08-20Kaspersky LabsSuguru Ishimaru
@online{ishimaru:20150820:new:d553aa4, author = {Suguru Ishimaru}, title = {{New activity of the Blue Termite APT}}, date = {2015-08-20}, organization = {Kaspersky Labs}, url = {https://securelist.com/new-activity-of-the-blue-termite-apt/71876/}, language = {English}, urldate = {2019-12-20} } New activity of the Blue Termite APT
Emdivi
Yara Rules
[TLP:WHITE] win_emdivi_auto (20200529 | autogenerated rule brought to you by yara-signator)
rule win_emdivi_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-05-30"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.emdivi"
        malpedia_rule_date = "20200529"
        malpedia_hash = "92c362319514e5a6da26204961446caa3a8b32a8"
        malpedia_version = "20200529"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 2bc8 03ca 880c32 42 3bd0 }
            // n = 5, score = 300
            //   2bc8                 | sub                 ecx, eax
            //   03ca                 | add                 ecx, edx
            //   880c32               | mov                 byte ptr [edx + esi], cl
            //   42                   | inc                 edx
            //   3bd0                 | cmp                 edx, eax

        $sequence_1 = { f7d9 0bc8 8bf9 57 }
            // n = 4, score = 300
            //   f7d9                 | neg                 ecx
            //   0bc8                 | or                  ecx, eax
            //   8bf9                 | mov                 edi, ecx
            //   57                   | push                edi

        $sequence_2 = { 59 59 6a07 59 c745e401000000 c745e803000000 c745ec05000000 }
            // n = 7, score = 300
            //   59                   | pop                 ecx
            //   59                   | pop                 ecx
            //   6a07                 | push                7
            //   59                   | pop                 ecx
            //   c745e401000000       | mov                 dword ptr [ebp - 0x1c], 1
            //   c745e803000000       | mov                 dword ptr [ebp - 0x18], 3
            //   c745ec05000000       | mov                 dword ptr [ebp - 0x14], 5

        $sequence_3 = { 8d4601 50 e8???????? 8bf8 8bc6 }
            // n = 5, score = 300
            //   8d4601               | lea                 eax, [esi + 1]
            //   50                   | push                eax
            //   e8????????           |                     
            //   8bf8                 | mov                 edi, eax
            //   8bc6                 | mov                 eax, esi

        $sequence_4 = { 58 99 f7ff 8365fc00 }
            // n = 4, score = 300
            //   58                   | pop                 eax
            //   99                   | cdq                 
            //   f7ff                 | idiv                edi
            //   8365fc00             | and                 dword ptr [ebp - 4], 0

        $sequence_5 = { 750a c68415b4fdffff2c eb07 888415b4fdffff 42 41 }
            // n = 6, score = 300
            //   750a                 | jne                 0xc
            //   c68415b4fdffff2c     | mov                 byte ptr [ebp + edx - 0x24c], 0x2c
            //   eb07                 | jmp                 9
            //   888415b4fdffff       | mov                 byte ptr [ebp + edx - 0x24c], al
            //   42                   | inc                 edx
            //   41                   | inc                 ecx

        $sequence_6 = { e8???????? 59 8bcf e8???????? 8b4dfc }
            // n = 5, score = 300
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   8bcf                 | mov                 ecx, edi
            //   e8????????           |                     
            //   8b4dfc               | mov                 ecx, dword ptr [ebp - 4]

        $sequence_7 = { e8???????? eb1f 8bc6 e8???????? ff7508 }
            // n = 5, score = 300
            //   e8????????           |                     
            //   eb1f                 | jmp                 0x21
            //   8bc6                 | mov                 eax, esi
            //   e8????????           |                     
            //   ff7508               | push                dword ptr [ebp + 8]

        $sequence_8 = { e8???????? 8bd8 8bc6 59 c6432000 8d7801 }
            // n = 6, score = 300
            //   e8????????           |                     
            //   8bd8                 | mov                 ebx, eax
            //   8bc6                 | mov                 eax, esi
            //   59                   | pop                 ecx
            //   c6432000             | mov                 byte ptr [ebx + 0x20], 0
            //   8d7801               | lea                 edi, [eax + 1]

        $sequence_9 = { 8b07 3bc3 7415 69c060ea0000 }
            // n = 4, score = 300
            //   8b07                 | mov                 eax, dword ptr [edi]
            //   3bc3                 | cmp                 eax, ebx
            //   7415                 | je                  0x17
            //   69c060ea0000         | imul                eax, eax, 0xea60

    condition:
        7 of them and filesize < 581632
}
Download all Yara Rules