SYMBOLCOMMON_NAMEaka. SYNONYMS
win.feodo (Back to overview)

Feodo

aka: Cridex, Bugat
URLhaus    

Feodo (also known as Cridex or Bugat) is a Trojan used to commit e-banking fraud and to steal sensitive information from the victims computer, such as credit card details or credentials.

References
2020-10-03WikipediaWikpedia
@online{wikpedia:20201003:wikipedia:70dbf1e, author = {Wikpedia}, title = {{Wikipedia Page: Maksim Yakubets}}, date = {2020-10-03}, organization = {Wikipedia}, url = {https://en.wikipedia.org/wiki/Maksim_Yakubets}, language = {English}, urldate = {2020-11-02} } Wikipedia Page: Maksim Yakubets
Dridex Feodo Evil Corp
2018abuse.chabuse.ch
@online{abusech:2018:feodo:3a9a017, author = {abuse.ch}, title = {{Feodo Tracker}}, date = {2018}, organization = {abuse.ch}, url = {https://feodotracker.abuse.ch/}, language = {English}, urldate = {2019-11-17} } Feodo Tracker
Feodo
2017-05-25Kaspersky LabsNikita Slepogin
@online{slepogin:20170525:dridex:90a70d9, author = {Nikita Slepogin}, title = {{Dridex: A History of Evolution}}, date = {2017-05-25}, organization = {Kaspersky Labs}, url = {https://securelist.com/analysis/publications/78531/dridex-a-history-of-evolution/}, language = {English}, urldate = {2022-08-31} } Dridex: A History of Evolution
Dridex Feodo
2012-08-03Contagio DumpAndre DiMino
@online{dimino:20120803:cridex:eab5b19, author = {Andre DiMino}, title = {{Cridex Analysis using Volatility}}, date = {2012-08-03}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/08/cridex-analysis-using-volatility-by.html}, language = {English}, urldate = {2019-12-18} } Cridex Analysis using Volatility
Feodo
2012-08-02Andre M. DiMino
@online{dimino:20120802:cridex:a9b195f, author = {Andre M. DiMino}, title = {{Cridex Analysis using Volatility}}, date = {2012-08-02}, url = {http://www.sempersecurus.org/2012/08/cridex-analysis-using-volatility.html}, language = {English}, urldate = {2019-10-23} } Cridex Analysis using Volatility
Feodo
Yara Rules
[TLP:WHITE] win_feodo_auto (20230407 | Detects win.feodo.)
rule win_feodo_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-03-28"
        version = "1"
        description = "Detects win.feodo."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.feodo"
        malpedia_rule_date = "20230328"
        malpedia_hash = "9d2d75cef573c1c2d861f5197df8f563b05a305d"
        malpedia_version = "20230407"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { ff15???????? 85c0 7405 8b442408 }
            // n = 4, score = 1100
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   7405                 | je                  7
            //   8b442408             | mov                 eax, dword ptr [esp + 8]

        $sequence_1 = { 85c0 7421 8b54240c 6a00 }
            // n = 4, score = 1100
            //   85c0                 | test                eax, eax
            //   7421                 | je                  0x23
            //   8b54240c             | mov                 edx, dword ptr [esp + 0xc]
            //   6a00                 | push                0

        $sequence_2 = { 52 ff15???????? 8bf0 83feff 7457 8d44240c 50 }
            // n = 7, score = 1100
            //   52                   | push                edx
            //   ff15????????         |                     
            //   8bf0                 | mov                 esi, eax
            //   83feff               | cmp                 esi, -1
            //   7457                 | je                  0x59
            //   8d44240c             | lea                 eax, [esp + 0xc]
            //   50                   | push                eax

        $sequence_3 = { 56 e8???????? 83c408 85c0 7418 6a00 }
            // n = 6, score = 1100
            //   56                   | push                esi
            //   e8????????           |                     
            //   83c408               | add                 esp, 8
            //   85c0                 | test                eax, eax
            //   7418                 | je                  0x1a
            //   6a00                 | push                0

        $sequence_4 = { 7412 f6c308 740d 6a02 6a00 }
            // n = 5, score = 1100
            //   7412                 | je                  0x14
            //   f6c308               | test                bl, 8
            //   740d                 | je                  0xf
            //   6a02                 | push                2
            //   6a00                 | push                0

        $sequence_5 = { 85f6 75e0 6a00 57 }
            // n = 4, score = 1100
            //   85f6                 | test                esi, esi
            //   75e0                 | jne                 0xffffffe2
            //   6a00                 | push                0
            //   57                   | push                edi

        $sequence_6 = { ff15???????? c3 8b4c2404 33c0 50 50 8b442410 }
            // n = 7, score = 1100
            //   ff15????????         |                     
            //   c3                   | ret                 
            //   8b4c2404             | mov                 ecx, dword ptr [esp + 4]
            //   33c0                 | xor                 eax, eax
            //   50                   | push                eax
            //   50                   | push                eax
            //   8b442410             | mov                 eax, dword ptr [esp + 0x10]

        $sequence_7 = { 56 e8???????? 83c408 85c0 7418 6a00 6a00 }
            // n = 7, score = 1100
            //   56                   | push                esi
            //   e8????????           |                     
            //   83c408               | add                 esp, 8
            //   85c0                 | test                eax, eax
            //   7418                 | je                  0x1a
            //   6a00                 | push                0
            //   6a00                 | push                0

        $sequence_8 = { ff15???????? 85c0 741f 8b0424 6a00 }
            // n = 5, score = 1100
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   741f                 | je                  0x21
            //   8b0424               | mov                 eax, dword ptr [esp]
            //   6a00                 | push                0

        $sequence_9 = { 8bc2 50 ff15???????? f7d8 1bc0 }
            // n = 5, score = 1100
            //   8bc2                 | mov                 eax, edx
            //   50                   | push                eax
            //   ff15????????         |                     
            //   f7d8                 | neg                 eax
            //   1bc0                 | sbb                 eax, eax

    condition:
        7 of them and filesize < 270336
}
Download all Yara Rules