SYMBOLCOMMON_NAMEaka. SYNONYMS
win.floki_bot (Back to overview)

FlokiBot


There is no description at this point.

References
2017-03-14Arnaud DelmasArnaud Delmas
@online{delmas:20170314:analyzing:1c055df, author = {Arnaud Delmas}, title = {{Analyzing and Deobfuscating FlokiBot Banking Trojan}}, date = {2017-03-14}, organization = {Arnaud Delmas}, url = {http://adelmas.com/blog/flokibot.php}, language = {English}, urldate = {2020-01-08} } Analyzing and Deobfuscating FlokiBot Banking Trojan
FlokiBot
2017-03-01CylanceCylance Threat Research Team
@online{team:20170301:threat:5837922, author = {Cylance Threat Research Team}, title = {{Threat Spotlight: Flokibot PoS Malware}}, date = {2017-03-01}, organization = {Cylance}, url = {https://www.cylance.com/en_us/blog/threat-spotlight-flokibot-pos-malware.html}, language = {English}, urldate = {2020-01-06} } Threat Spotlight: Flokibot PoS Malware
FlokiBot
2016-12-07Cisco TalosBen Baker, Edmund Brumaghin, Mariano Graziano, Jonas Zaddach
@online{baker:20161207:floki:69ffd12, author = {Ben Baker and Edmund Brumaghin and Mariano Graziano and Jonas Zaddach}, title = {{Floki Bot Strikes, Talos and Flashpoint Respond}}, date = {2016-12-07}, organization = {Cisco Talos}, url = {http://blog.talosintel.com/2016/12/flokibot-collab.html#more}, language = {English}, urldate = {2020-01-09} } Floki Bot Strikes, Talos and Flashpoint Respond
FlokiBot
2016-11-10MalwarebytesMalwarebytes Labs
@online{labs:20161110:floki:cb97f8d, author = {Malwarebytes Labs}, title = {{Floki Bot and the stealthy dropper}}, date = {2016-11-10}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2016/11/floki-bot-and-the-stealthy-dropper/}, language = {English}, urldate = {2019-12-20} } Floki Bot and the stealthy dropper
FlokiBot
2016-10-03FlashpointFlashpoint
@online{flashpoint:20161003:multipurpose:436518b, author = {Flashpoint}, title = {{Multi-Purpose “Floki Bot” Emerges as New Malware Kit}}, date = {2016-10-03}, organization = {Flashpoint}, url = {https://www.flashpoint-intel.com/blog/cybercrime/floki-bot-emerges-new-malware-kit/}, language = {English}, urldate = {2020-01-07} } Multi-Purpose “Floki Bot” Emerges as New Malware Kit
FlokiBot
2015-12-07FlashpointFlashpoint, Talos
@online{flashpoint:20151207:flashpoint:3f5aee6, author = {Flashpoint and Talos}, title = {{Flashpoint and Talos Analyze the Curious Case of the flokibot Connector}}, date = {2015-12-07}, organization = {Flashpoint}, url = {https://www.flashpoint-intel.com/flokibot-curious-case-brazilian-connector/}, language = {English}, urldate = {2019-11-20} } Flashpoint and Talos Analyze the Curious Case of the flokibot Connector
FlokiBot
Yara Rules
[TLP:WHITE] win_floki_bot_auto (20230715 | Detects win.floki_bot.)
rule win_floki_bot_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.floki_bot."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.floki_bot"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8945ec 8b460c e8???????? 8945f0 8b4610 }
            // n = 5, score = 1100
            //   8945ec               | mov                 dword ptr [ebp - 0x14], eax
            //   8b460c               | mov                 eax, dword ptr [esi + 0xc]
            //   e8????????           |                     
            //   8945f0               | mov                 dword ptr [ebp - 0x10], eax
            //   8b4610               | mov                 eax, dword ptr [esi + 0x10]

        $sequence_1 = { 7408 33c0 66833b02 eb06 33c0 66833a02 8b4d10 }
            // n = 7, score = 1100
            //   7408                 | je                  0xa
            //   33c0                 | xor                 eax, eax
            //   66833b02             | cmp                 word ptr [ebx], 2
            //   eb06                 | jmp                 8
            //   33c0                 | xor                 eax, eax
            //   66833a02             | cmp                 word ptr [edx], 2
            //   8b4d10               | mov                 ecx, dword ptr [ebp + 0x10]

        $sequence_2 = { 5f 8d4c09ff 23c1 c3 53 8b5c2408 }
            // n = 6, score = 1100
            //   5f                   | pop                 edi
            //   8d4c09ff             | lea                 ecx, [ecx + ecx - 1]
            //   23c1                 | and                 eax, ecx
            //   c3                   | ret                 
            //   53                   | push                ebx
            //   8b5c2408             | mov                 ebx, dword ptr [esp + 8]

        $sequence_3 = { 8d1448 8945fc 8955f4 3bc2 0f83bf000000 0fb708 83f920 }
            // n = 7, score = 1100
            //   8d1448               | lea                 edx, [eax + ecx*2]
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8955f4               | mov                 dword ptr [ebp - 0xc], edx
            //   3bc2                 | cmp                 eax, edx
            //   0f83bf000000         | jae                 0xc5
            //   0fb708               | movzx               ecx, word ptr [eax]
            //   83f920               | cmp                 ecx, 0x20

        $sequence_4 = { 8d5df0 8a0c17 84c9 7403 880b }
            // n = 5, score = 1100
            //   8d5df0               | lea                 ebx, [ebp - 0x10]
            //   8a0c17               | mov                 cl, byte ptr [edi + edx]
            //   84c9                 | test                cl, cl
            //   7403                 | je                  5
            //   880b                 | mov                 byte ptr [ebx], cl

        $sequence_5 = { 8b5508 66833c4a5c 7405 49 }
            // n = 4, score = 1100
            //   8b5508               | mov                 edx, dword ptr [ebp + 8]
            //   66833c4a5c           | cmp                 word ptr [edx + ecx*2], 0x5c
            //   7405                 | je                  7
            //   49                   | dec                 ecx

        $sequence_6 = { ff7708 e8???????? 84c0 745e e8???????? }
            // n = 5, score = 1100
            //   ff7708               | push                dword ptr [edi + 8]
            //   e8????????           |                     
            //   84c0                 | test                al, al
            //   745e                 | je                  0x60
            //   e8????????           |                     

        $sequence_7 = { 8d04b0 833800 7421 8b00 803800 741a ff75f8 }
            // n = 7, score = 1100
            //   8d04b0               | lea                 eax, [eax + esi*4]
            //   833800               | cmp                 dword ptr [eax], 0
            //   7421                 | je                  0x23
            //   8b00                 | mov                 eax, dword ptr [eax]
            //   803800               | cmp                 byte ptr [eax], 0
            //   741a                 | je                  0x1c
            //   ff75f8               | push                dword ptr [ebp - 8]

        $sequence_8 = { 53 56 68???????? 33db ff15???????? 8bf0 3bf3 }
            // n = 7, score = 1100
            //   53                   | push                ebx
            //   56                   | push                esi
            //   68????????           |                     
            //   33db                 | xor                 ebx, ebx
            //   ff15????????         |                     
            //   8bf0                 | mov                 esi, eax
            //   3bf3                 | cmp                 esi, ebx

        $sequence_9 = { 83f8ff 752f 8b7508 e8???????? 8bf0 3bf7 }
            // n = 6, score = 1100
            //   83f8ff               | cmp                 eax, -1
            //   752f                 | jne                 0x31
            //   8b7508               | mov                 esi, dword ptr [ebp + 8]
            //   e8????????           |                     
            //   8bf0                 | mov                 esi, eax
            //   3bf7                 | cmp                 esi, edi

    condition:
        7 of them and filesize < 286720
}
Download all Yara Rules