SYMBOLCOMMON_NAMEaka. SYNONYMS
win.farseer (Back to overview)

Farseer


There is no description at this point.

References
2020-03-02Virus BulletinAlex Hinchliffe
@online{hinchliffe:20200302:pulling:35771e7, author = {Alex Hinchliffe}, title = {{Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary}}, date = {2020-03-02}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-pulling-pkplug-adversary-playbook-long-standing-espionage-activity-chinese-nation-state-adversary/}, language = {English}, urldate = {2020-03-02} } Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary
HenBox Farseer PlugX Poison Ivy
2019-10-03Palo Alto Networks Unit 42Alex Hinchliffe
@online{hinchliffe:20191003:pkplug:4a43ea5, author = {Alex Hinchliffe}, title = {{PKPLUG: Chinese Cyber Espionage Group Attacking Asia}}, date = {2019-10-03}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/}, language = {English}, urldate = {2020-01-07} } PKPLUG: Chinese Cyber Espionage Group Attacking Asia
HenBox Farseer PlugX
2019-02-26Palo Alto Networks Unit 42Alex Hinchliffe, Mike Harbison
@online{hinchliffe:20190226:farseer:62554e3, author = {Alex Hinchliffe and Mike Harbison}, title = {{Farseer: Previously Unknown Malware Family bolsters the Chinese armoury}}, date = {2019-02-26}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/farseer-previously-unknown-malware-family-bolsters-the-chinese-armoury/}, language = {English}, urldate = {2020-01-08} } Farseer: Previously Unknown Malware Family bolsters the Chinese armoury
Farseer
Yara Rules
[TLP:WHITE] win_farseer_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_farseer_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.farseer"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 7512 8b542418 52 ff15???????? b801000000 eb0d }
            // n = 6, score = 100
            //   7512                 | jne                 0x14
            //   8b542418             | mov                 edx, dword ptr [esp + 0x18]
            //   52                   | push                edx
            //   ff15????????         |                     
            //   b801000000           | mov                 eax, 1
            //   eb0d                 | jmp                 0xf

        $sequence_1 = { 85c0 7e0c 03f0 81fec8000000 7cdc 742a }
            // n = 6, score = 100
            //   85c0                 | test                eax, eax
            //   7e0c                 | jle                 0xe
            //   03f0                 | add                 esi, eax
            //   81fec8000000         | cmp                 esi, 0xc8
            //   7cdc                 | jl                  0xffffffde
            //   742a                 | je                  0x2c

        $sequence_2 = { e8???????? b35c 8d74244c e8???????? 8b442444 47 3bf8 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   b35c                 | mov                 bl, 0x5c
            //   8d74244c             | lea                 esi, [esp + 0x4c]
            //   e8????????           |                     
            //   8b442444             | mov                 eax, dword ptr [esp + 0x44]
            //   47                   | inc                 edi
            //   3bf8                 | cmp                 edi, eax

        $sequence_3 = { 0f87f5090000 ff24853e1d4100 33c0 838df4fbffffff 8985a0fbffff 8985c4fbffff 8985d4fbffff }
            // n = 7, score = 100
            //   0f87f5090000         | ja                  0x9fb
            //   ff24853e1d4100       | jmp                 dword ptr [eax*4 + 0x411d3e]
            //   33c0                 | xor                 eax, eax
            //   838df4fbffffff       | or                  dword ptr [ebp - 0x40c], 0xffffffff
            //   8985a0fbffff         | mov                 dword ptr [ebp - 0x460], eax
            //   8985c4fbffff         | mov                 dword ptr [ebp - 0x43c], eax
            //   8985d4fbffff         | mov                 dword ptr [ebp - 0x42c], eax

        $sequence_4 = { 8b0c8d20634200 83e61f c1e606 89040e }
            // n = 4, score = 100
            //   8b0c8d20634200       | mov                 ecx, dword ptr [ecx*4 + 0x426320]
            //   83e61f               | and                 esi, 0x1f
            //   c1e606               | shl                 esi, 6
            //   89040e               | mov                 dword ptr [esi + ecx], eax

        $sequence_5 = { 7304 8d4c245c 803c3122 7541 2bc7 83e802 8d4e01 }
            // n = 7, score = 100
            //   7304                 | jae                 6
            //   8d4c245c             | lea                 ecx, [esp + 0x5c]
            //   803c3122             | cmp                 byte ptr [ecx + esi], 0x22
            //   7541                 | jne                 0x43
            //   2bc7                 | sub                 eax, edi
            //   83e802               | sub                 eax, 2
            //   8d4e01               | lea                 ecx, [esi + 1]

        $sequence_6 = { e8???????? 83c408 c3 b9???????? e9???????? b9???????? e9???????? }
            // n = 7, score = 100
            //   e8????????           |                     
            //   83c408               | add                 esp, 8
            //   c3                   | ret                 
            //   b9????????           |                     
            //   e9????????           |                     
            //   b9????????           |                     
            //   e9????????           |                     

        $sequence_7 = { 50 ffd5 85c0 0f84bf000000 8b480c 8b11 8b02 }
            // n = 7, score = 100
            //   50                   | push                eax
            //   ffd5                 | call                ebp
            //   85c0                 | test                eax, eax
            //   0f84bf000000         | je                  0xc5
            //   8b480c               | mov                 ecx, dword ptr [eax + 0xc]
            //   8b11                 | mov                 edx, dword ptr [ecx]
            //   8b02                 | mov                 eax, dword ptr [edx]

        $sequence_8 = { 85c0 752b 8b15???????? a1???????? 8b0d???????? }
            // n = 5, score = 100
            //   85c0                 | test                eax, eax
            //   752b                 | jne                 0x2d
            //   8b15????????         |                     
            //   a1????????           |                     
            //   8b0d????????         |                     

        $sequence_9 = { 3bc1 0f87ad090000 ff24851d094100 838de8fdffffff 89b590fdffff }
            // n = 5, score = 100
            //   3bc1                 | cmp                 eax, ecx
            //   0f87ad090000         | ja                  0x9b3
            //   ff24851d094100       | jmp                 dword ptr [eax*4 + 0x41091d]
            //   838de8fdffffff       | or                  dword ptr [ebp - 0x218], 0xffffffff
            //   89b590fdffff         | mov                 dword ptr [ebp - 0x270], esi

    condition:
        7 of them and filesize < 347328
}
Download all Yara Rules