SYMBOLCOMMON_NAMEaka. SYNONYMS
win.get2 (Back to overview)

Get2

aka: FRIENDSPEAK, GetandGo

Actor(s): TA505


There is no description at this point.

References
2021-01-19Medium elis531989Eli Salem
@online{salem:20210119:funtastic:42f9250, author = {Eli Salem}, title = {{Funtastic Packers And Where To Find Them}}, date = {2021-01-19}, organization = {Medium elis531989}, url = {https://elis531989.medium.com/funtastic-packers-and-where-to-find-them-41429a7ef9a7}, language = {English}, urldate = {2021-01-21} } Funtastic Packers And Where To Find Them
Get2 IcedID QakBot
2020-12-18Intel 471Intel 471
@online{471:20201218:ta505s:8fb97af, author = {Intel 471}, title = {{TA505’s modified loader means new attack campaign could be coming}}, date = {2020-12-18}, organization = {Intel 471}, url = {https://intel471.com/blog/ta505-get2-loader-malware-december-2020/}, language = {English}, urldate = {2020-12-19} } TA505’s modified loader means new attack campaign could be coming
Get2
2020-11-16Fox-ITAntonis Terefos, Anne Postma, Tera0017
@online{terefos:20201116:ta505:8449383, author = {Antonis Terefos and Anne Postma and Tera0017}, title = {{TA505: A Brief History Of Their Time}}, date = {2020-11-16}, organization = {Fox-IT}, url = {https://blog.fox-it.com/2020/11/16/ta505-a-brief-history-of-their-time/}, language = {English}, urldate = {2020-11-23} } TA505: A Brief History Of Their Time
Clop Get2 SDBbot TA505
2020-10-06TelekomThomas Barabosch
@online{barabosch:20201006:eager:54da318, author = {Thomas Barabosch}, title = {{Eager Beaver: A Short Overview of the Restless Threat Actor TA505}}, date = {2020-10-06}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/eager-beaver-a-short-overview-of-the-restless-threat-actor-ta505-609546}, language = {English}, urldate = {2020-10-08} } Eager Beaver: A Short Overview of the Restless Threat Actor TA505
Clop Get2 SDBbot TA505
2020-08-20CERT-FRCERT-FR
@techreport{certfr:20200820:development:d518522, author = {CERT-FR}, title = {{Development of the Activity of the TA505 Cybercriminal Group}}, date = {2020-08-20}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-009.pdf}, language = {English}, urldate = {2020-08-28} } Development of the Activity of the TA505 Cybercriminal Group
AndroMut Bart Clop Dridex FlawedAmmyy FlawedGrace Get2 Locky Marap QuantLoader SDBbot ServHelper tRat TrickBot
2020-07-15Intel 471Intel 471
@online{471:20200715:flowspec:683a5a1, author = {Intel 471}, title = {{Flowspec – TA505’s bulletproof hoster of choice}}, date = {2020-07-15}, organization = {Intel 471}, url = {https://blog.intel471.com/2020/07/15/flowspec-ta505s-bulletproof-hoster-of-choice/}, language = {English}, urldate = {2020-07-16} } Flowspec – TA505’s bulletproof hoster of choice
Get2
2020-07-07HornetsecurityHornetsecurity Security Lab
@online{lab:20200707:clop:12bb60d, author = {Hornetsecurity Security Lab}, title = {{Clop, Clop! It’s a TA505 HTML malspam analysis}}, date = {2020-07-07}, organization = {Hornetsecurity}, url = {https://www.hornetsecurity.com/en/security-information/clop-clop-ta505-html-malspam-analysis/}, language = {English}, urldate = {2020-07-30} } Clop, Clop! It’s a TA505 HTML malspam analysis
Clop Get2
2020-06-22CERT-FRCERT-FR
@techreport{certfr:20200622:volution:fba1cfa, author = {CERT-FR}, title = {{Évolution De Lactivité du Groupe Cybercriminel TA505}}, date = {2020-06-22}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-006.pdf}, language = {French}, urldate = {2020-06-24} } Évolution De Lactivité du Groupe Cybercriminel TA505
Amadey AndroMut Bart Clop Dridex FlawedGrace Gandcrab Get2 GlobeImposter Jaff Locky Marap Philadephia Ransom QuantLoader Scarab Ransomware SDBbot ServHelper Silence tRat TrickBot
2020-06-16TelekomThomas Barabosch
@online{barabosch:20200616:ta505:619f2c6, author = {Thomas Barabosch}, title = {{TA505 returns with a new bag of tricks}}, date = {2020-06-16}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/cybersecurity-ta505-returns-with-a-new-bag-of-tricks-602104}, language = {English}, urldate = {2020-06-18} } TA505 returns with a new bag of tricks
Clop Get2 SDBbot TA505
2020-05-21Intel 471Intel 471
@online{471:20200521:brief:048d164, author = {Intel 471}, title = {{A brief history of TA505}}, date = {2020-05-21}, organization = {Intel 471}, url = {https://intel471.com/blog/a-brief-history-of-ta505}, language = {English}, urldate = {2022-02-14} } A brief history of TA505
AndroMut Bart Dridex FlawedAmmyy FlawedGrace Gandcrab Get2 GlobeImposter Jaff Kegotip Locky Necurs Philadephia Ransom Pony QuantLoader Rockloader SDBbot ServHelper Shifu Snatch TrickBot
2020-03-26TelekomThomas Barabosch
@online{barabosch:20200326:ta505s:24d9805, author = {Thomas Barabosch}, title = {{TA505's Box of Chocolate - On Hidden Gems packed with the TA505 Packer}}, date = {2020-03-26}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/cybersecurity-ta505-s-box-of-chocolate-597672}, language = {English}, urldate = {2020-03-27} } TA505's Box of Chocolate - On Hidden Gems packed with the TA505 Packer
Amadey Azorult Clop FlawedGrace Get2 SDBbot Silence TinyMet TA505
2020-03-18ProofpointAxel F, Sam Scholten
@online{f:20200318:coronavirus:8fe12a3, author = {Axel F and Sam Scholten}, title = {{Coronavirus Threat Landscape Update}}, date = {2020-03-18}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/coronavirus-threat-landscape-update}, language = {English}, urldate = {2020-03-26} } Coronavirus Threat Landscape Update
Agent Tesla Get2 ISFB Remcos
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-07-24} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelDridex DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze MECHANICAL Necurs Nokki Outlook Backdoor Phobos Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot Vidar Winnti ANTHROPOID SPIDER APT23 APT31 APT39 APT40 BlackTech BuhTrap Charming Kitten CLOCKWORK SPIDER DOPPEL SPIDER FIN7 Gamaredon Group GOBLIN PANDA MONTY SPIDER MUSTANG PANDA NARWHAL SPIDER NOCTURNAL SPIDER PINCHY SPIDER SALTY SPIDER SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER VICEROY TIGER
2020-03-03PWC UKPWC UK
@techreport{uk:20200303:cyber:1f1eef0, author = {PWC UK}, title = {{Cyber Threats 2019:A Year in Retrospect}}, date = {2020-03-03}, institution = {PWC UK}, url = {https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf}, language = {English}, urldate = {2020-03-03} } Cyber Threats 2019:A Year in Retrospect
KevDroid MESSAGETAP magecart AndroMut Cobalt Strike CobInt Crimson RAT DNSpionage Dridex Dtrack Emotet FlawedAmmyy FlawedGrace FriedEx Gandcrab Get2 GlobeImposter Grateful POS ISFB Kazuar LockerGoga Nokki QakBot Ramnit REvil Rifdoor RokRAT Ryuk shadowhammer ShadowPad Shifu Skipper StoneDrill Stuxnet TrickBot Winnti ZeroCleare APT41 MUSTANG PANDA
2020-02-13QianxinQi Anxin Threat Intelligence Center
@techreport{center:20200213:report:146d333, author = {Qi Anxin Threat Intelligence Center}, title = {{APT Report 2019}}, date = {2020-02-13}, institution = {Qianxin}, url = {https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf}, language = {English}, urldate = {2020-02-27} } APT Report 2019
Chrysaor Exodus Dacls VPNFilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020-01-14TelekomThomas Barabosch
@online{barabosch:20200114:inside:2187ad3, author = {Thomas Barabosch}, title = {{Inside of CL0P’s ransomware operation}}, date = {2020-01-14}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/inside-of-cl0p-s-ransomware-operation-615824}, language = {English}, urldate = {2021-01-14} } Inside of CL0P’s ransomware operation
Clop Get2 SDBbot
2020-01-13Github (Tera0017)Tera0017
@online{tera0017:20200113:tafof:d939bc6, author = {Tera0017}, title = {{TAFOF Unpacker}}, date = {2020-01-13}, organization = {Github (Tera0017)}, url = {https://github.com/Tera0017/TAFOF-Unpacker}, language = {English}, urldate = {2020-03-30} } TAFOF Unpacker
Clop Get2 Silence
2020SecureworksSecureWorks
@online{secureworks:2020:gold:f38f910, author = {SecureWorks}, title = {{GOLD TAHOE}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/gold-tahoe}, language = {English}, urldate = {2020-05-23} } GOLD TAHOE
Clop FlawedAmmyy FlawedGrace Get2 SDBbot ServHelper TA505
2019-11-24Jacob Pimental
@online{pimental:20191124:ta505:fb32d29, author = {Jacob Pimental}, title = {{TA505 Get2 Analysis}}, date = {2019-11-24}, url = {https://www.goggleheadedhacker.com/blog/post/13}, language = {English}, urldate = {2019-12-17} } TA505 Get2 Analysis
Get2
2019-10-16ProofpointDennis Schwarz, Kafeine, Matthew Mesa, Axel F, Proofpoint Threat Insight Team
@online{schwarz:20191016:ta505:9d7155a, author = {Dennis Schwarz and Kafeine and Matthew Mesa and Axel F and Proofpoint Threat Insight Team}, title = {{TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader}}, date = {2019-10-16}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/ta505-distributes-new-sdbbot-remote-access-trojan-get2-downloader}, language = {English}, urldate = {2020-01-10} } TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader
Get2 SDBbot TA505
2019-10-10Github (StrangerealIntel)StrangerealIntel
@online{strangerealintel:20191010:analysis:45d6c09, author = {StrangerealIntel}, title = {{Analysis of the new TA505 campaign}}, date = {2019-10-10}, organization = {Github (StrangerealIntel)}, url = {https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/cybercriminal%20groups/TA505/04-10-2019/Malware%20Analysis%2004-10-2019.md}, language = {English}, urldate = {2020-01-13} } Analysis of the new TA505 campaign
Get2
Yara Rules
[TLP:WHITE] win_get2_auto (20221125 | Detects win.get2.)
rule win_get2_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-11-21"
        version = "1"
        description = "Detects win.get2."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.get2"
        malpedia_rule_date = "20221118"
        malpedia_hash = "e0702e2e6d1d00da65c8a29a4ebacd0a4c59e1af"
        malpedia_version = "20221125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 0f88ca000000 6a20 8bcf e8???????? 8945fc 85c0 }
            // n = 6, score = 1000
            //   0f88ca000000         | js                  0xd0
            //   6a20                 | push                0x20
            //   8bcf                 | mov                 ecx, edi
            //   e8????????           |                     
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   85c0                 | test                eax, eax

        $sequence_1 = { e8???????? ff7508 8d55d8 8d8d24ffffff e8???????? 59 }
            // n = 6, score = 1000
            //   e8????????           |                     
            //   ff7508               | push                dword ptr [ebp + 8]
            //   8d55d8               | lea                 edx, [ebp - 0x28]
            //   8d8d24ffffff         | lea                 ecx, [ebp - 0xdc]
            //   e8????????           |                     
            //   59                   | pop                 ecx

        $sequence_2 = { 8bcf 56 8906 e8???????? ebd1 83f87d }
            // n = 6, score = 1000
            //   8bcf                 | mov                 ecx, edi
            //   56                   | push                esi
            //   8906                 | mov                 dword ptr [esi], eax
            //   e8????????           |                     
            //   ebd1                 | jmp                 0xffffffd3
            //   83f87d               | cmp                 eax, 0x7d

        $sequence_3 = { e8???????? 6a29 59 895804 8b07 663908 750a }
            // n = 7, score = 1000
            //   e8????????           |                     
            //   6a29                 | push                0x29
            //   59                   | pop                 ecx
            //   895804               | mov                 dword ptr [eax + 4], ebx
            //   8b07                 | mov                 eax, dword ptr [edi]
            //   663908               | cmp                 word ptr [eax], cx
            //   750a                 | jne                 0xc

        $sequence_4 = { 0fb701 663bc2 0f84ad000000 83f85c }
            // n = 4, score = 1000
            //   0fb701               | movzx               eax, word ptr [ecx]
            //   663bc2               | cmp                 ax, dx
            //   0f84ad000000         | je                  0xb3
            //   83f85c               | cmp                 eax, 0x5c

        $sequence_5 = { ff34c3 57 e8???????? eb52 }
            // n = 4, score = 1000
            //   ff34c3               | push                dword ptr [ebx + eax*8]
            //   57                   | push                edi
            //   e8????????           |                     
            //   eb52                 | jmp                 0x54

        $sequence_6 = { f6c104 7430 8d4c2404 e8???????? 8d4c240c ff7004 ff30 }
            // n = 7, score = 1000
            //   f6c104               | test                cl, 4
            //   7430                 | je                  0x32
            //   8d4c2404             | lea                 ecx, [esp + 4]
            //   e8????????           |                     
            //   8d4c240c             | lea                 ecx, [esp + 0xc]
            //   ff7004               | push                dword ptr [eax + 4]
            //   ff30                 | push                dword ptr [eax]

        $sequence_7 = { 894738 8bcf 8d45ec 897730 }
            // n = 4, score = 1000
            //   894738               | mov                 dword ptr [edi + 0x38], eax
            //   8bcf                 | mov                 ecx, edi
            //   8d45ec               | lea                 eax, [ebp - 0x14]
            //   897730               | mov                 dword ptr [edi + 0x30], esi

        $sequence_8 = { 49896f10 eb43 498bd5 498bcf }
            // n = 4, score = 100
            //   49896f10             | arpl                word ptr [esp + 0x78], dx
            //   eb43                 | dec                 eax
            //   498bd5               | lea                 ecx, [ebx + 8]
            //   498bcf               | dec                 eax

        $sequence_9 = { 4889442428 4c8bf8 4885c0 0f84cc0c0000 4c8bcb 4d8bc5 }
            // n = 6, score = 100
            //   4889442428           | dec                 eax
            //   4c8bf8               | mov                 ebp, dword ptr [esp + 0x58]
            //   4885c0               | dec                 eax
            //   0f84cc0c0000         | mov                 esi, dword ptr [esp + 0x60]
            //   4c8bcb               | dec                 eax
            //   4d8bc5               | add                 esp, 0x20

        $sequence_10 = { 4883ec48 488d4c2420 e8???????? 488d1533310300 488d4c2420 e8???????? }
            // n = 6, score = 100
            //   4883ec48             | arpl                word ptr [eax + 4], cx
            //   488d4c2420           | lea                 edx, [ecx - 0x88]
            //   e8????????           |                     
            //   488d1533310300       | mov                 dword ptr [esp + ecx + 0xbc], edx
            //   488d4c2420           | dec                 eax
            //   e8????????           |                     

        $sequence_11 = { 4a87bcf1c04d0400 33c0 488b5c2450 488b6c2458 488b742460 4883c420 }
            // n = 6, score = 100
            //   4a87bcf1c04d0400     | sub                 esp, 0x48
            //   33c0                 | dec                 eax
            //   488b5c2450           | lea                 ecx, [esp + 0x20]
            //   488b6c2458           | dec                 eax
            //   488b742460           | lea                 edx, [0x33133]
            //   4883c420             | dec                 eax

        $sequence_12 = { 7218 49ffc0 488b9424f0030000 488d8c24f0030000 e8???????? 48c784240804000007000000 }
            // n = 6, score = 100
            //   7218                 | mov                 dword ptr [esp + 0x28], eax
            //   49ffc0               | dec                 esp
            //   488b9424f0030000     | mov                 edi, eax
            //   488d8c24f0030000     | dec                 eax
            //   e8????????           |                     
            //   48c784240804000007000000     | test    eax, eax

        $sequence_13 = { 4889840cc0000000 488b8424c0000000 48634804 8d9178ffffff 89940cbc000000 }
            // n = 5, score = 100
            //   4889840cc0000000     | dec                 eax
            //   488b8424c0000000     | mov                 dword ptr [esp + ecx + 0xc0], eax
            //   48634804             | dec                 eax
            //   8d9178ffffff         | mov                 eax, dword ptr [esp + 0xc0]
            //   89940cbc000000       | dec                 eax

        $sequence_14 = { 84c0 742e 0fbed0 488d0d2d760300 e8???????? 4885c0 }
            // n = 6, score = 100
            //   84c0                 | pop                 edi
            //   742e                 | pop                 esi
            //   0fbed0               | pop                 ebp
            //   488d0d2d760300       | ret                 
            //   e8????????           |                     
            //   4885c0               | dec                 eax

        $sequence_15 = { 5f 5e 5d c3 4863542478 488d4b08 }
            // n = 6, score = 100
            //   5f                   | lea                 ecx, [esp + 0x20]
            //   5e                   | dec                 edx
            //   5d                   | xchg                dword ptr [ecx + esi*8 + 0x44dc0], edi
            //   c3                   | xor                 eax, eax
            //   4863542478           | dec                 eax
            //   488d4b08             | mov                 ebx, dword ptr [esp + 0x50]

    condition:
        7 of them and filesize < 720896
}
Download all Yara Rules