SYMBOLCOMMON_NAMEaka. SYNONYMS
win.flawedgrace (Back to overview)

FlawedGrace

aka: GraceWire

Actor(s): TA505

VTCollection    

According to ProofPoint, FlawedGrace is written in C++ and can be categorized as a Remote Access Trojan (RAT). It seems to have been developed in the second half of 2017 mainly.

FlawedGrace uses a series of commands:
FlawedGrace also uses a series of commands, provided below for reference:
* desktop_stat
* destroy_os
* target_download
* target_module_load
* target_module_load_external
* target_module_unload
* target_passwords
* target_rdp
* target_reboot
* target_remove
* target_script
* target_servers
* target_update
* target_upload

References
2023-12-30Rewterz Information SecurityRewterz Information Security
Rewterz Threat Alert – Widely Abused MSIX App Installer Disabled by Microsoft – Active IOCs
EugenLoader POWERTRASH BATLOADER DarkGate FlawedGrace NetSupportManager RAT SectopRAT Storm-0506
2023-06-12The DFIR ReportMaxime Thiebaut
A Truly Graceful Wipe Out
FlawedGrace Silence
2022-12-08Cisco TalosTiago Pereira
Breaking the silence - Recent Truebot activity
Clop Cobalt Strike FlawedGrace Raspberry Robin Silence Teleport
2022-11-11CodesecHugo Caron
GraceWire / FlawedGrace malware adventure
FlawedGrace
2021-12-01NCC GroupMichael Sandee, Nikolaos Pantazopoulos
Tracking a P2P network related to TA505
FlawedGrace Necurs
2021-10-21CrowdStrikeAlex Clinton, Tasha Robinson
Stopping GRACEFUL SPIDER: Falcon Complete’s Fast Response to Recent SolarWinds Serv-U Exploit Campaign
Cobalt Strike FlawedGrace TinyMet
2021-10-19ProofpointAxel F, Brandon Murphy, Crista Giering, Georgi Mladenov, Matthew Mesa, Zydeca Cass
Whatta TA: TA505 Ramps Up Activity, Delivers New FlawedGrace Variant
FlawedGrace MirrorBlast
2021-03-02Möbius Strip Reverse EngineeringRolf Rolles
An Exhaustively-Analyzed IDB for FlawedGrace
FlawedGrace
2020-08-20CERT-FRCERT-FR
Development of the Activity of the TA505 Cybercriminal Group
AndroMut Bart Clop Dridex FlawedAmmyy FlawedGrace Get2 Locky Marap QuantLoader SDBbot ServHelper tRat TrickBot
2020-06-22CERT-FRCERT-FR
Évolution De Lactivité du Groupe Cybercriminel TA505
Amadey AndroMut Bart Clop Dridex FlawedGrace Gandcrab Get2 GlobeImposter Jaff Locky Marap Philadephia Ransom QuantLoader Scarab Ransomware SDBbot ServHelper Silence tRat TrickBot
2020-06-17Twitter (@MsftSecIntel)Microsoft Security Intelligence
A tweet thread on TA505 using CAPTCHA to avoid detection and infecting victims with FlawedGrace
FlawedGrace
2020-05-21Intel 471Intel 471
A brief history of TA505
AndroMut Bart Dridex FlawedAmmyy FlawedGrace Gandcrab Get2 GlobeImposter Jaff Kegotip Locky Necurs Philadephia Ransom Pony QuantLoader Rockloader SDBbot ServHelper Shifu Snatch TrickBot
2020-03-26TelekomThomas Barabosch
TA505's Box of Chocolate - On Hidden Gems packed with the TA505 Packer
Amadey Azorult Clop FlawedGrace Get2 SDBbot Silence TinyMet TA505
2020-03-03PWC UKPWC UK
Cyber Threats 2019:A Year in Retrospect
KevDroid MESSAGETAP magecart AndroMut Cobalt Strike CobInt Crimson RAT DNSpionage Dridex Dtrack Emotet FlawedAmmyy FlawedGrace FriedEx Gandcrab Get2 GlobeImposter Grateful POS ISFB Kazuar LockerGoga Nokki QakBot Ramnit REvil Rifdoor RokRAT Ryuk shadowhammer ShadowPad Shifu Skipper StoneDrill Stuxnet TrickBot Winnti ZeroCleare APT41 MUSTANG PANDA Sea Turtle
2020-02-13QianxinQi Anxin Threat Intelligence Center
APT Report 2019
Chrysaor Exodus Dacls VPNFilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020-01-01SecureworksSecureWorks
GOLD TAHOE
Clop FlawedAmmyy FlawedGrace Get2 SDBbot ServHelper TA505
2019-01-14Möbius Strip Reverse EngineeringRolf Rolles
A Quick Solution to an Ugly Reverse Engineering Problem
FlawedGrace
2019-01-09ProofpointDennis Schwarz, Proofpoint Staff
ServHelper and FlawedGrace - New malware introduced by TA505
FlawedGrace ServHelper
Yara Rules
[TLP:WHITE] win_flawedgrace_auto (20241030 | Detects win.flawedgrace.)
rule win_flawedgrace_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2024-10-31"
        version = "1"
        description = "Detects win.flawedgrace."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.flawedgrace"
        malpedia_rule_date = "20241030"
        malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4"
        malpedia_version = "20241030"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { c685a4cdffff2c c685a5cdffff00 c685a6cdffff00 c685a7cdffff48 c685a8cdffffff c685a9cdffffce c685aacdffff0f }
            // n = 7, score = 200
            //   c685a4cdffff2c       | mov                 byte ptr [ebp - 0x325c], 0x2c
            //   c685a5cdffff00       | mov                 byte ptr [ebp - 0x325b], 0
            //   c685a6cdffff00       | mov                 byte ptr [ebp - 0x325a], 0
            //   c685a7cdffff48       | mov                 byte ptr [ebp - 0x3259], 0x48
            //   c685a8cdffffff       | mov                 byte ptr [ebp - 0x3258], 0xff
            //   c685a9cdffffce       | mov                 byte ptr [ebp - 0x3257], 0xce
            //   c685aacdffff0f       | mov                 byte ptr [ebp - 0x3256], 0xf

        $sequence_1 = { 83e03f 6bd030 895de4 8b049db8d34600 8945d4 8955e8 8a5c1029 }
            // n = 7, score = 200
            //   83e03f               | and                 eax, 0x3f
            //   6bd030               | imul                edx, eax, 0x30
            //   895de4               | mov                 dword ptr [ebp - 0x1c], ebx
            //   8b049db8d34600       | mov                 eax, dword ptr [ebx*4 + 0x46d3b8]
            //   8945d4               | mov                 dword ptr [ebp - 0x2c], eax
            //   8955e8               | mov                 dword ptr [ebp - 0x18], edx
            //   8a5c1029             | mov                 bl, byte ptr [eax + edx + 0x29]

        $sequence_2 = { 56 57 8bf9 c745f800000000 8bf2 8975fc 85ff }
            // n = 7, score = 200
            //   56                   | push                esi
            //   57                   | push                edi
            //   8bf9                 | mov                 edi, ecx
            //   c745f800000000       | mov                 dword ptr [ebp - 8], 0
            //   8bf2                 | mov                 esi, edx
            //   8975fc               | mov                 dword ptr [ebp - 4], esi
            //   85ff                 | test                edi, edi

        $sequence_3 = { c685dbc3ffff00 c685dcc3ffff00 c685ddc3ffff00 c685dec3ffff00 c685dfc3ffff00 c685e0c3ffff00 c685e1c3ffff00 }
            // n = 7, score = 200
            //   c685dbc3ffff00       | mov                 byte ptr [ebp - 0x3c25], 0
            //   c685dcc3ffff00       | mov                 byte ptr [ebp - 0x3c24], 0
            //   c685ddc3ffff00       | mov                 byte ptr [ebp - 0x3c23], 0
            //   c685dec3ffff00       | mov                 byte ptr [ebp - 0x3c22], 0
            //   c685dfc3ffff00       | mov                 byte ptr [ebp - 0x3c21], 0
            //   c685e0c3ffff00       | mov                 byte ptr [ebp - 0x3c20], 0
            //   c685e1c3ffff00       | mov                 byte ptr [ebp - 0x3c1f], 0

        $sequence_4 = { c6858ad9ffff00 c6858bd9ffff00 c6858cd9ffff00 c6858dd9ffff00 c6858ed9ffff00 c6858fd9ffff00 c68590d9ffff00 }
            // n = 7, score = 200
            //   c6858ad9ffff00       | mov                 byte ptr [ebp - 0x2676], 0
            //   c6858bd9ffff00       | mov                 byte ptr [ebp - 0x2675], 0
            //   c6858cd9ffff00       | mov                 byte ptr [ebp - 0x2674], 0
            //   c6858dd9ffff00       | mov                 byte ptr [ebp - 0x2673], 0
            //   c6858ed9ffff00       | mov                 byte ptr [ebp - 0x2672], 0
            //   c6858fd9ffff00       | mov                 byte ptr [ebp - 0x2671], 0
            //   c68590d9ffff00       | mov                 byte ptr [ebp - 0x2670], 0

        $sequence_5 = { c7410800000000 c74110ffffffff c74114ffffffff c7411c0c000000 c701???????? c741380f000000 c7413400000000 }
            // n = 7, score = 200
            //   c7410800000000       | mov                 dword ptr [ecx + 8], 0
            //   c74110ffffffff       | mov                 dword ptr [ecx + 0x10], 0xffffffff
            //   c74114ffffffff       | mov                 dword ptr [ecx + 0x14], 0xffffffff
            //   c7411c0c000000       | mov                 dword ptr [ecx + 0x1c], 0xc
            //   c701????????         |                     
            //   c741380f000000       | mov                 dword ptr [ecx + 0x38], 0xf
            //   c7413400000000       | mov                 dword ptr [ecx + 0x34], 0

        $sequence_6 = { 75f9 2bf1 b001 5f 8933 5e 5b }
            // n = 7, score = 200
            //   75f9                 | jne                 0xfffffffb
            //   2bf1                 | sub                 esi, ecx
            //   b001                 | mov                 al, 1
            //   5f                   | pop                 edi
            //   8933                 | mov                 dword ptr [ebx], esi
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx

        $sequence_7 = { c68580d2ffff10 c68581d2ffff48 c68582d2ffff83 c68583d2ffffec c68584d2ffff20 c68585d2ffff4c }
            // n = 6, score = 200
            //   c68580d2ffff10       | mov                 byte ptr [ebp - 0x2d80], 0x10
            //   c68581d2ffff48       | mov                 byte ptr [ebp - 0x2d7f], 0x48
            //   c68582d2ffff83       | mov                 byte ptr [ebp - 0x2d7e], 0x83
            //   c68583d2ffffec       | mov                 byte ptr [ebp - 0x2d7d], 0xec
            //   c68584d2ffff20       | mov                 byte ptr [ebp - 0x2d7c], 0x20
            //   c68585d2ffff4c       | mov                 byte ptr [ebp - 0x2d7b], 0x4c

        $sequence_8 = { c744241800000000 50 ff7508 0f57c0 c744243400000000 8bf1 0f11442424 }
            // n = 7, score = 200
            //   c744241800000000     | mov                 dword ptr [esp + 0x18], 0
            //   50                   | push                eax
            //   ff7508               | push                dword ptr [ebp + 8]
            //   0f57c0               | xorps               xmm0, xmm0
            //   c744243400000000     | mov                 dword ptr [esp + 0x34], 0
            //   8bf1                 | mov                 esi, ecx
            //   0f11442424           | movups              xmmword ptr [esp + 0x24], xmm0

        $sequence_9 = { 0f84f8000000 8d442450 50 68???????? 8d842460010000 6804010000 50 }
            // n = 7, score = 200
            //   0f84f8000000         | je                  0xfe
            //   8d442450             | lea                 eax, [esp + 0x50]
            //   50                   | push                eax
            //   68????????           |                     
            //   8d842460010000       | lea                 eax, [esp + 0x160]
            //   6804010000           | push                0x104
            //   50                   | push                eax

    condition:
        7 of them and filesize < 966656
}
Download all Yara Rules