SYMBOLCOMMON_NAMEaka. SYNONYMS
win.friedex (Back to overview)

FriedEx

aka: BitPaymer, DoppelPaymer, IEncrypt

Actor(s): INDRIK SPIDER


There is no description at this point.

References
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-03-04} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze Necurs Nokki Outlook Backdoor Phobos Ransomware Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot vidar Winnti ANTHROPOID SPIDER Anunak APT39 BlackTech BuhTrap Charming Kitten CLOCKWORD SPIDER DOPPEL SPIDER Gamaredon Group Judgment Panda Leviathan MONTY SPIDER Mustang Panda NARWHAL SPIDER NOCTURNAL SPIDER Pinchy Spider Pirate Panda Salty Spider SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER
2020-03-03PWC UKPWC UK
@techreport{uk:20200303:cyber:1f1eef0, author = {PWC UK}, title = {{Cyber Threats 2019:A Year in Retrospect}}, date = {2020-03-03}, institution = {PWC UK}, url = {https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf}, language = {English}, urldate = {2020-03-03} } Cyber Threats 2019:A Year in Retrospect
KevDroid MESSAGETAP magecart AndroMut Cobalt Strike CobInt Crimson RAT DNSpionage Dridex Dtrack Emotet FlawedAmmyy FlawedGrace FriedEx Gandcrab Get2 GlobeImposter Grateful POS ISFB Kazuar LockerGoga Nokki QakBot Ramnit REvil Rifdoor RokRAT Ryuk shadowhammer ShadowPad Shifu Skipper StoneDrill Stuxnet TrickBot Winnti ZeroCleare
2020-02-25RSA ConferenceJoel DeCapua
@online{decapua:20200225:feds:423f929, author = {Joel DeCapua}, title = {{Feds Fighting Ransomware: How the FBI Investigates and How You Can Help}}, date = {2020-02-25}, organization = {RSA Conference}, url = {https://www.youtube.com/watch?v=LUxOcpIRxmg}, language = {English}, urldate = {2020-03-04} } Feds Fighting Ransomware: How the FBI Investigates and How You Can Help
FastCash Cerber Defray Dharma FriedEx Gandcrab GlobeImposter Mamba Phobos Ransomware Rapid Ransom REvil Ryuk SamSam Zeus
2020-02-25Bleeping ComputerLawrence Abrams
@online{abrams:20200225:doppelpaymer:9ca20ab, author = {Lawrence Abrams}, title = {{DoppelPaymer Ransomware Launches Site to Post Victim's Data}}, date = {2020-02-25}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/}, language = {English}, urldate = {2020-02-26} } DoppelPaymer Ransomware Launches Site to Post Victim's Data
DoppelPaymer FriedEx
2020-01-29ANSSIANSSI
@techreport{anssi:20200129:tat:3d59e6e, author = {ANSSI}, title = {{État de la menace rançongiciel}}, date = {2020-01-29}, institution = {ANSSI}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-001.pdf}, language = {English}, urldate = {2020-02-03} } État de la menace rançongiciel
Clop Dharma FriedEx Gandcrab LockerGoga Maze MegaCortex REvil RobinHood Ryuk SamSam
2020-01-17SecureworksTamada Kiyotaka, Keita Yamazaki, You Nakatsuru
@techreport{kiyotaka:20200117:is:969ff38, author = {Tamada Kiyotaka and Keita Yamazaki and You Nakatsuru}, title = {{Is It Wrong to Try to Find APT Techniques in Ransomware Attack?}}, date = {2020-01-17}, institution = {Secureworks}, url = {https://jsac.jpcert.or.jp/archive/2020/pdf/JSAC2020_1_tamada-yamazaki-nakatsuru_en.pdf}, language = {English}, urldate = {2020-04-06} } Is It Wrong to Try to Find APT Techniques in Ransomware Attack?
Defray Dharma FriedEx Gandcrab GlobeImposter Matrix Ransom MedusaLocker Phobos Ransomware REvil Ryuk SamSam Scarab Ransomware
2020SecureworksSecureWorks
@online{secureworks:2020:gold:0d8c853, author = {SecureWorks}, title = {{GOLD DRAKE}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/gold-drake}, language = {English}, urldate = {2020-05-23} } GOLD DRAKE
Dridex Empire Downloader FriedEx Koadic MimiKatz
2019-11-06BluelivJose Miguel Esparza, Blueliv Team
@online{esparza:20191106:spanish:eaf5520, author = {Jose Miguel Esparza and Blueliv Team}, title = {{Spanish consultancy Everis suffers BitPaymer ransomware attack: a brief analysis}}, date = {2019-11-06}, organization = {Blueliv}, url = {https://www.blueliv.com/cyber-security-and-cyber-threat-intelligence-blog-blueliv/research/everis-bitpaymer-ransomware-attack-analysis-dridex/}, language = {English}, urldate = {2020-01-08} } Spanish consultancy Everis suffers BitPaymer ransomware attack: a brief analysis
FriedEx
2019-07-12CrowdStrikeBrett Stone-Gross, Sergei Frankoff, Bex Hartley
@online{stonegross:20190712:bitpaymer:113a037, author = {Brett Stone-Gross and Sergei Frankoff and Bex Hartley}, title = {{BitPaymer Source Code Fork: Meet DoppelPaymer Ransomware and Dridex 2.0}}, date = {2019-07-12}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/}, language = {English}, urldate = {2020-04-25} } BitPaymer Source Code Fork: Meet DoppelPaymer Ransomware and Dridex 2.0
DoppelPaymer Dridex FriedEx
2019-04-15Trend MicroGilbert Sison, Ryan Maglaque
@online{sison:20190415:account:6783792, author = {Gilbert Sison and Ryan Maglaque}, title = {{Account With Admin Privileges Abused to Install BitPaymer Ransomware via PsExec}}, date = {2019-04-15}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/account-with-admin-privileges-abused-to-install-bitpaymer-ransomware-via-psexec}, language = {English}, urldate = {2020-01-08} } Account With Admin Privileges Abused to Install BitPaymer Ransomware via PsExec
FriedEx
2018-12-18Trend MicroTrendmicro
@online{trendmicro:20181218:ursnif:cc5ce31, author = {Trendmicro}, title = {{URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader}}, date = {2018-12-18}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/ursnif-emotet-dridex-and-bitpaymer-gangs-linked-by-a-similar-loader/}, language = {English}, urldate = {2020-01-07} } URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader
Dridex Emotet FriedEx ISFB
2018-11-14CrowdStrikeSergei Frankoff, Bex Hartley
@online{frankoff:20181114:big:723025d, author = {Sergei Frankoff and Bex Hartley}, title = {{Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware}}, date = {2018-11-14}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware/}, language = {English}, urldate = {2019-12-20} } Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware
FriedEx INDRIK SPIDER
2018-01-26ESET ResearchMichal Poslušný
@online{poslun:20180126:friedex:3c3f46b, author = {Michal Poslušný}, title = {{FriedEx: BitPaymer ransomware the work of Dridex authors}}, date = {2018-01-26}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2018/01/26/friedex-bitpaymer-ransomware-work-dridex-authors/}, language = {English}, urldate = {2019-11-14} } FriedEx: BitPaymer ransomware the work of Dridex authors
Dridex FriedEx
Yara Rules
[TLP:WHITE] win_friedex_auto (20200529 | autogenerated rule brought to you by yara-signator)
rule win_friedex_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-05-30"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.friedex"
        malpedia_rule_date = "20200529"
        malpedia_hash = "92c362319514e5a6da26204961446caa3a8b32a8"
        malpedia_version = "20200529"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8bce 8bc3 03f5 eb04 }
            // n = 4, score = 800
            //   8bce                 | mov                 ecx, esi
            //   8bc3                 | mov                 eax, ebx
            //   03f5                 | add                 esi, ebp
            //   eb04                 | jmp                 6

        $sequence_1 = { e8???????? 85c0 7403 53 ffd0 6880000000 33db }
            // n = 7, score = 800
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7403                 | je                  5
            //   53                   | push                ebx
            //   ffd0                 | call                eax
            //   6880000000           | push                0x80
            //   33db                 | xor                 ebx, ebx

        $sequence_2 = { 53 55 56 57 6a2a 5f 6a3f }
            // n = 7, score = 800
            //   53                   | push                ebx
            //   55                   | push                ebp
            //   56                   | push                esi
            //   57                   | push                edi
            //   6a2a                 | push                0x2a
            //   5f                   | pop                 edi
            //   6a3f                 | push                0x3f

        $sequence_3 = { 5b 6a02 897c2414 5d eb16 0fb730 663bf7 }
            // n = 7, score = 800
            //   5b                   | pop                 ebx
            //   6a02                 | push                2
            //   897c2414             | mov                 dword ptr [esp + 0x14], edi
            //   5d                   | pop                 ebp
            //   eb16                 | jmp                 0x18
            //   0fb730               | movzx               esi, word ptr [eax]
            //   663bf7               | cmp                 si, di

        $sequence_4 = { 03c5 663938 74f9 33c9 663908 }
            // n = 5, score = 800
            //   03c5                 | add                 eax, ebp
            //   663938               | cmp                 word ptr [eax], di
            //   74f9                 | je                  0xfffffffb
            //   33c9                 | xor                 ecx, ecx
            //   663908               | cmp                 word ptr [eax], cx

        $sequence_5 = { c3 56 8bf1 33c0 50 8906 }
            // n = 6, score = 800
            // 
            //   56                   | push                esi
            //   8bf1                 | mov                 esi, ecx
            //   33c0                 | xor                 eax, eax
            //   50                   | push                eax
            //   8906                 | mov                 dword ptr [esi], eax

        $sequence_6 = { 6a00 ff742410 8bf1 e8???????? 83c40c }
            // n = 5, score = 800
            //   6a00                 | push                0
            //   ff742410             | push                dword ptr [esp + 0x10]
            //   8bf1                 | mov                 esi, ecx
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc

        $sequence_7 = { ff760c ffd0 5e c20400 56 6a08 6a00 }
            // n = 7, score = 800
            //   ff760c               | push                dword ptr [esi + 0xc]
            //   ffd0                 | call                eax
            //   5e                   | pop                 esi
            //   c20400               | ret                 4
            //   56                   | push                esi
            //   6a08                 | push                8
            //   6a00                 | push                0

        $sequence_8 = { 8b45a4 8a4daf 31d2 8a2c057530a500 83c001 38e9 }
            // n = 6, score = 100
            //   8b45a4               | mov                 eax, dword ptr [ebp - 0x5c]
            //   8a4daf               | mov                 cl, byte ptr [ebp - 0x51]
            //   31d2                 | xor                 edx, edx
            //   8a2c057530a500       | mov                 ch, byte ptr [eax + 0xa53075]
            //   83c001               | add                 eax, 1
            //   38e9                 | cmp                 cl, ch

        $sequence_9 = { 8b4858 8b5054 891424 894c2404 8945f8 e8???????? 8d0d4430a500 }
            // n = 7, score = 100
            //   8b4858               | mov                 ecx, dword ptr [eax + 0x58]
            //   8b5054               | mov                 edx, dword ptr [eax + 0x54]
            //   891424               | mov                 dword ptr [esp], edx
            //   894c2404             | mov                 dword ptr [esp + 4], ecx
            //   8945f8               | mov                 dword ptr [ebp - 8], eax
            //   e8????????           |                     
            //   8d0d4430a500         | lea                 ecx, [0xa53044]

        $sequence_10 = { 8945e4 0f85dafeffff 8b45e4 83c474 5f 5b }
            // n = 6, score = 100
            //   8945e4               | mov                 dword ptr [ebp - 0x1c], eax
            //   0f85dafeffff         | jne                 0xfffffee0
            //   8b45e4               | mov                 eax, dword ptr [ebp - 0x1c]
            //   83c474               | add                 esp, 0x74
            //   5f                   | pop                 edi
            //   5b                   | pop                 ebx

        $sequence_11 = { 807c0805e9 89d0 8955c8 8945d0 74e4 31c0 8d0d5a23a500 }
            // n = 7, score = 100
            //   807c0805e9           | cmp                 byte ptr [eax + ecx + 5], 0xe9
            //   89d0                 | mov                 eax, edx
            //   8955c8               | mov                 dword ptr [ebp - 0x38], edx
            //   8945d0               | mov                 dword ptr [ebp - 0x30], eax
            //   74e4                 | je                  0xffffffe6
            //   31c0                 | xor                 eax, eax
            //   8d0d5a23a500         | lea                 ecx, [0xa5235a]

        $sequence_12 = { 31c0 8d0d5a23a500 8b55c8 39ca 8945cc }
            // n = 5, score = 100
            //   31c0                 | xor                 eax, eax
            //   8d0d5a23a500         | lea                 ecx, [0xa5235a]
            //   8b55c8               | mov                 edx, dword ptr [ebp - 0x38]
            //   39ca                 | cmp                 edx, ecx
            //   8945cc               | mov                 dword ptr [ebp - 0x34], eax

        $sequence_13 = { c3 8b45f0 8b0c850440a500 8b55f8 }
            // n = 4, score = 100
            //   c3                   | ret                 
            //   8b45f0               | mov                 eax, dword ptr [ebp - 0x10]
            //   8b0c850440a500       | mov                 ecx, dword ptr [eax*4 + 0xa54004]
            //   8b55f8               | mov                 edx, dword ptr [ebp - 8]

        $sequence_14 = { 8d055a23a500 31c9 8d55d8 803d????????e9 8955d4 }
            // n = 5, score = 100
            //   8d055a23a500         | lea                 eax, [0xa5235a]
            //   31c9                 | xor                 ecx, ecx
            //   8d55d8               | lea                 edx, [ebp - 0x28]
            //   803d????????e9       |                     
            //   8955d4               | mov                 dword ptr [ebp - 0x2c], edx

        $sequence_15 = { 89460c 890c24 c744240400000000 8955e8 e8???????? 8d0dbc30a500 890424 }
            // n = 7, score = 100
            //   89460c               | mov                 dword ptr [esi + 0xc], eax
            //   890c24               | mov                 dword ptr [esp], ecx
            //   c744240400000000     | mov                 dword ptr [esp + 4], 0
            //   8955e8               | mov                 dword ptr [ebp - 0x18], edx
            //   e8????????           |                     
            //   8d0dbc30a500         | lea                 ecx, [0xa530bc]
            //   890424               | mov                 dword ptr [esp], eax

    condition:
        7 of them and filesize < 204800
}
[TLP:WHITE] win_friedex_w0   (20200304 | BitPaymer Payload)
/*
# Copyright (C) 2019 Kevin O'Reilly (kevoreilly@gmail.com)
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
*/

rule win_friedex_w0 {
    meta:
        author = "kevoreilly"
        description = "BitPaymer Payload"
        source = "https://github.com/ctxis/CAPE/blob/a67579f409828928005fc55cfdaae1b5199ea1db/data/yara/CAPE/BitPaymer.yar"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.friedex"
        malpedia_version = "20200304"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $decrypt32 = {6A 40 58 3B C8 0F 4D C1 39 46 04 7D 50 53 57 8B F8 81 E7 3F 00 00 80 79 05 4F 83 CF C0 47 F7 DF 99 1B FF 83 E2 3F 03 C2 F7 DF C1 F8 06 03 F8 C1 E7 06 57}
        $antidefender = "TouchMeNot" wide
    condition:
        uint16(0) == 0x5A4D and all of them
}
Download all Yara Rules