SYMBOLCOMMON_NAMEaka. SYNONYMS
win.feodo (Back to overview)

Feodo

aka: Cridex, Bugat
URLhaus    

Feodo (also known as Cridex or Bugat) is a Trojan used to commit e-banking fraud and to steal sensitive information from the victims computer, such as credit card details or credentials.

References
2020-10-03WikipediaWikpedia
@online{wikpedia:20201003:wikipedia:70dbf1e, author = {Wikpedia}, title = {{Wikipedia Page: Maksim Yakubets}}, date = {2020-10-03}, organization = {Wikipedia}, url = {https://en.wikipedia.org/wiki/Maksim_Yakubets}, language = {English}, urldate = {2020-11-02} } Wikipedia Page: Maksim Yakubets
Dridex Feodo Evil Corp
2018abuse.chabuse.ch
@online{abusech:2018:feodo:3a9a017, author = {abuse.ch}, title = {{Feodo Tracker}}, date = {2018}, organization = {abuse.ch}, url = {https://feodotracker.abuse.ch/}, language = {English}, urldate = {2019-11-17} } Feodo Tracker
Feodo
2017-05-25Kaspersky LabsNikita Slepogin
@online{slepogin:20170525:dridex:90a70d9, author = {Nikita Slepogin}, title = {{Dridex: A History of Evolution}}, date = {2017-05-25}, organization = {Kaspersky Labs}, url = {https://securelist.com/analysis/publications/78531/dridex-a-history-of-evolution/}, language = {English}, urldate = {2022-08-31} } Dridex: A History of Evolution
Dridex Feodo
2012-08-03Contagio DumpAndre DiMino
@online{dimino:20120803:cridex:eab5b19, author = {Andre DiMino}, title = {{Cridex Analysis using Volatility}}, date = {2012-08-03}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html}, language = {English}, urldate = {2019-12-18} } Cridex Analysis using Volatility
Feodo
2012-08-02Andre M. DiMino
@online{dimino:20120802:cridex:a9b195f, author = {Andre M. DiMino}, title = {{Cridex Analysis using Volatility}}, date = {2012-08-02}, url = {http://www.sempersecurus.org/2012/08/cridex-analysis-using-volatility.html}, language = {English}, urldate = {2019-10-23} } Cridex Analysis using Volatility
Feodo
Yara Rules
[TLP:WHITE] win_feodo_auto (20220808 | Detects win.feodo.)
rule win_feodo_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-08-05"
        version = "1"
        description = "Detects win.feodo."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.feodo"
        malpedia_rule_date = "20220805"
        malpedia_hash = "6ec06c64bcfdbeda64eff021c766b4ce34542b71"
        malpedia_version = "20220808"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 51 8b4c2410 8b54240c 6a00 8d442404 50 }
            // n = 6, score = 1100
            //   51                   | push                ecx
            //   8b4c2410             | mov                 ecx, dword ptr [esp + 0x10]
            //   8b54240c             | mov                 edx, dword ptr [esp + 0xc]
            //   6a00                 | push                0
            //   8d442404             | lea                 eax, [esp + 4]
            //   50                   | push                eax

        $sequence_1 = { 81ec08020000 6808020000 8d442404 50 }
            // n = 4, score = 1100
            //   81ec08020000         | sub                 esp, 0x208
            //   6808020000           | push                0x208
            //   8d442404             | lea                 eax, [esp + 4]
            //   50                   | push                eax

        $sequence_2 = { 83c001 83f801 72f2 83f801 750c }
            // n = 5, score = 1100
            //   83c001               | add                 eax, 1
            //   83f801               | cmp                 eax, 1
            //   72f2                 | jb                  0xfffffff4
            //   83f801               | cmp                 eax, 1
            //   750c                 | jne                 0xe

        $sequence_3 = { 81ec08020000 53 8b9c2414020000 8bc3 56 2500070000 3d00040000 }
            // n = 7, score = 1100
            //   81ec08020000         | sub                 esp, 0x208
            //   53                   | push                ebx
            //   8b9c2414020000       | mov                 ebx, dword ptr [esp + 0x214]
            //   8bc3                 | mov                 eax, ebx
            //   56                   | push                esi
            //   2500070000           | and                 eax, 0x700
            //   3d00040000           | cmp                 eax, 0x400

        $sequence_4 = { 6a03 6800000080 8d542458 52 ff15???????? }
            // n = 5, score = 1100
            //   6a03                 | push                3
            //   6800000080           | push                0x80000000
            //   8d542458             | lea                 edx, [esp + 0x58]
            //   52                   | push                edx
            //   ff15????????         |                     

        $sequence_5 = { 83c120 8d51d0 83fa09 7704 }
            // n = 4, score = 1100
            //   83c120               | add                 ecx, 0x20
            //   8d51d0               | lea                 edx, [ecx - 0x30]
            //   83fa09               | cmp                 edx, 9
            //   7704                 | ja                  6

        $sequence_6 = { 56 56 56 56 ff15???????? 8bf8 3bfe }
            // n = 7, score = 1100
            //   56                   | push                esi
            //   56                   | push                esi
            //   56                   | push                esi
            //   56                   | push                esi
            //   ff15????????         |                     
            //   8bf8                 | mov                 edi, eax
            //   3bfe                 | cmp                 edi, esi

        $sequence_7 = { 50 8b442414 50 ff15???????? 85c0 7405 8b442408 }
            // n = 7, score = 1100
            //   50                   | push                eax
            //   8b442414             | mov                 eax, dword ptr [esp + 0x14]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   7405                 | je                  7
            //   8b442408             | mov                 eax, dword ptr [esp + 8]

        $sequence_8 = { a0???????? 3583be044c 4c 5b cf }
            // n = 5, score = 100
            //   a0????????           |                     
            //   3583be044c           | xor                 eax, 0x4c04be83
            //   4c                   | dec                 esp
            //   5b                   | pop                 ebx
            //   cf                   | iretd               

        $sequence_9 = { 68???????? 7272 7272 7210 3beb 004072 }
            // n = 6, score = 100
            //   68????????           |                     
            //   7272                 | jb                  0x74
            //   7272                 | jb                  0x74
            //   7210                 | jb                  0x12
            //   3beb                 | cmp                 ebp, ebx
            //   004072               | add                 byte ptr [eax + 0x72], al

        $sequence_10 = { 782e 1463 ab 007538 034568 }
            // n = 5, score = 100
            //   782e                 | js                  0x30
            //   1463                 | adc                 al, 0x63
            //   ab                   | stosd               dword ptr es:[edi], eax
            //   007538               | add                 byte ptr [ebp + 0x38], dh
            //   034568               | add                 eax, dword ptr [ebp + 0x68]

        $sequence_11 = { 53 3052e9 b000 cd0f }
            // n = 4, score = 100
            //   53                   | push                ebx
            //   3052e9               | xor                 byte ptr [edx - 0x17], dl
            //   b000                 | mov                 al, 0
            //   cd0f                 | int                 0xf

        $sequence_12 = { 16 0d68107475 3bc3 5a 83814aa8882ea8 2e2e76e5 }
            // n = 6, score = 100
            //   16                   | push                ss
            //   0d68107475           | or                  eax, 0x75741068
            //   3bc3                 | cmp                 eax, ebx
            //   5a                   | pop                 edx
            //   83814aa8882ea8       | add                 dword ptr [ecx + 0x2e88a84a], -0x58
            //   2e2e76e5             | jbe                 0xffffffe9

        $sequence_13 = { 53 53 53 2e2eb42e 2e44 }
            // n = 5, score = 100
            //   53                   | push                ebx
            //   53                   | push                ebx
            //   53                   | push                ebx
            //   2e2eb42e             | mov                 ah, 0x2e
            //   2e44                 | inc                 esp

        $sequence_14 = { 0d14f45269 6969697f3cc3af e2c3 7474 7474 7474 }
            // n = 6, score = 100
            //   0d14f45269           | or                  eax, 0x6952f414
            //   6969697f3cc3af       | imul                ebp, dword ptr [ecx + 0x69], 0xafc33c7f
            //   e2c3                 | loop                0xffffffc5
            //   7474                 | je                  0x76
            //   7474                 | je                  0x76
            //   7474                 | je                  0x76

        $sequence_15 = { 0404 042e 2e2e2e2e2e2e2e2e2e020404 0404 }
            // n = 4, score = 100
            //   0404                 | add                 al, 4
            //   042e                 | add                 al, 0x2e
            //   2e2e2e2e2e2e2e2e2e020404     | add    al, byte ptr cs:[esp + eax]
            //   0404                 | add                 al, 4

    condition:
        7 of them and filesize < 270336
}
Download all Yara Rules