SYMBOLCOMMON_NAMEaka. SYNONYMS
win.farseer (Back to overview)

Farseer


There is no description at this point.

References
2020-03-02Virus BulletinAlex Hinchliffe
@online{hinchliffe:20200302:pulling:35771e7, author = {Alex Hinchliffe}, title = {{Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary}}, date = {2020-03-02}, organization = {Virus Bulletin}, url = {https://www.virusbulletin.com/virusbulletin/2020/03/vb2019-paper-pulling-pkplug-adversary-playbook-long-standing-espionage-activity-chinese-nation-state-adversary/}, language = {English}, urldate = {2020-03-02} } Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary
HenBox Farseer PlugX Poison Ivy
2019-10-03Palo Alto Networks Unit 42Alex Hinchliffe
@online{hinchliffe:20191003:pkplug:4a43ea5, author = {Alex Hinchliffe}, title = {{PKPLUG: Chinese Cyber Espionage Group Attacking Asia}}, date = {2019-10-03}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/}, language = {English}, urldate = {2020-01-07} } PKPLUG: Chinese Cyber Espionage Group Attacking Asia
HenBox Farseer PlugX
2019-02-26Palo Alto Networks Unit 42Alex Hinchliffe, Mike Harbison
@online{hinchliffe:20190226:farseer:62554e3, author = {Alex Hinchliffe and Mike Harbison}, title = {{Farseer: Previously Unknown Malware Family bolsters the Chinese armoury}}, date = {2019-02-26}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/farseer-previously-unknown-malware-family-bolsters-the-chinese-armoury/}, language = {English}, urldate = {2020-01-08} } Farseer: Previously Unknown Malware Family bolsters the Chinese armoury
Farseer
Yara Rules
[TLP:WHITE] win_farseer_auto (20210616 | Detects win.farseer.)
rule win_farseer_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2021-06-10"
        version = "1"
        description = "Detects win.farseer."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.farseer"
        malpedia_rule_date = "20210604"
        malpedia_hash = "be09d5d71e77373c0f538068be31a2ad4c69cfbd"
        malpedia_version = "20210616"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b7c241c 8b742424 e9???????? 8b4c2418 }
            // n = 4, score = 100
            //   8b7c241c             | mov                 edi, dword ptr [esp + 0x1c]
            //   8b742424             | mov                 esi, dword ptr [esp + 0x24]
            //   e9????????           |                     
            //   8b4c2418             | mov                 ecx, dword ptr [esp + 0x18]

        $sequence_1 = { 83c404 39742448 720d 8b442434 50 }
            // n = 5, score = 100
            //   83c404               | add                 esp, 4
            //   39742448             | cmp                 dword ptr [esp + 0x48], esi
            //   720d                 | jb                  0xf
            //   8b442434             | mov                 eax, dword ptr [esp + 0x34]
            //   50                   | push                eax

        $sequence_2 = { 0fb7c0 83c404 50 ff15???????? 8b15???????? 8b35???????? 6a15 }
            // n = 7, score = 100
            //   0fb7c0               | movzx               eax, ax
            //   83c404               | add                 esp, 4
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8b15????????         |                     
            //   8b35????????         |                     
            //   6a15                 | push                0x15

        $sequence_3 = { 83c40c 8dbc2408090000 be???????? e8???????? 8a942408090000 8b2d???????? 80ea31 }
            // n = 7, score = 100
            //   83c40c               | add                 esp, 0xc
            //   8dbc2408090000       | lea                 edi, dword ptr [esp + 0x908]
            //   be????????           |                     
            //   e8????????           |                     
            //   8a942408090000       | mov                 dl, byte ptr [esp + 0x908]
            //   8b2d????????         |                     
            //   80ea31               | sub                 dl, 0x31

        $sequence_4 = { 895c2444 885c2434 39b424b4000000 7210 8b8c24a0000000 51 }
            // n = 6, score = 100
            //   895c2444             | mov                 dword ptr [esp + 0x44], ebx
            //   885c2434             | mov                 byte ptr [esp + 0x34], bl
            //   39b424b4000000       | cmp                 dword ptr [esp + 0xb4], esi
            //   7210                 | jb                  0x12
            //   8b8c24a0000000       | mov                 ecx, dword ptr [esp + 0xa0]
            //   51                   | push                ecx

        $sequence_5 = { 50 ff15???????? 8d542436 8bff }
            // n = 4, score = 100
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8d542436             | lea                 edx, dword ptr [esp + 0x36]
            //   8bff                 | mov                 edi, edi

        $sequence_6 = { 7254 33c0 83fe02 0f95c0 3bc3 }
            // n = 5, score = 100
            //   7254                 | jb                  0x56
            //   33c0                 | xor                 eax, eax
            //   83fe02               | cmp                 esi, 2
            //   0f95c0               | setne               al
            //   3bc3                 | cmp                 eax, ebx

        $sequence_7 = { 8b8424d0020000 50 e9???????? e8???????? }
            // n = 4, score = 100
            //   8b8424d0020000       | mov                 eax, dword ptr [esp + 0x2d0]
            //   50                   | push                eax
            //   e9????????           |                     
            //   e8????????           |                     

        $sequence_8 = { 395c2454 7534 68???????? 8d4c2434 e8???????? 668b442462 6683f843 }
            // n = 7, score = 100
            //   395c2454             | cmp                 dword ptr [esp + 0x54], ebx
            //   7534                 | jne                 0x36
            //   68????????           |                     
            //   8d4c2434             | lea                 ecx, dword ptr [esp + 0x34]
            //   e8????????           |                     
            //   668b442462           | mov                 ax, word ptr [esp + 0x62]
            //   6683f843             | cmp                 ax, 0x43

        $sequence_9 = { 56 03c2 33f6 83f802 7636 6a01 }
            // n = 6, score = 100
            //   56                   | push                esi
            //   03c2                 | add                 eax, edx
            //   33f6                 | xor                 esi, esi
            //   83f802               | cmp                 eax, 2
            //   7636                 | jbe                 0x38
            //   6a01                 | push                1

    condition:
        7 of them and filesize < 347328
}
Download all Yara Rules