SYMBOLCOMMON_NAMEaka. SYNONYMS
win.goldenspy (Back to overview)

GoldenSpy


There is no description at this point.

References
2020-08-23FBIFBI
@techreport{fbi:20200823:ac000129tt:39b2ab4, author = {FBI}, title = {{AC-000129-TT: Chinese Government-Mandated Tax Software Contains Malware, Enabling Backdoor Access}}, date = {2020-08-23}, institution = {FBI}, url = {https://www.ic3.gov/media/news/2020/200728.pdf}, language = {English}, urldate = {2020-08-27} } AC-000129-TT: Chinese Government-Mandated Tax Software Contains Malware, Enabling Backdoor Access
GoldenSpy
2020-08-21BundeskriminalamtBundeskriminalamt
@techreport{bundeskriminalamt:20200821:mgliche:fbbf1b2, author = {Bundeskriminalamt}, title = {{Mögliche Cyberspionage mittels der Schadsoftware GOLDENSPY}}, date = {2020-08-21}, institution = {Bundeskriminalamt}, url = {https://www.bka.de/SharedDocs/Downloads/DE/IhreSicherheit/Warnhinweise/WarnhinweisGOLDENSPY.pdf}, language = {German}, urldate = {2020-08-27} } Mögliche Cyberspionage mittels der Schadsoftware GOLDENSPY
GoldenSpy
2020-07-29Atlantic CouncilTrey Herr, June Lee, William Loomis, Stewart Scott
@techreport{herr:20200729:breaking:d37db04, author = {Trey Herr and June Lee and William Loomis and Stewart Scott}, title = {{BREAKING TRUST: Shades of Crisis Across an Insecure Software Supply Chain}}, date = {2020-07-29}, institution = {Atlantic Council}, url = {https://www.atlanticcouncil.org/wp-content/uploads/2020/07/Breaking-trust-Shades-of-crisis-across-an-insecure-software-supply-chain.pdf}, language = {English}, urldate = {2020-08-05} } BREAKING TRUST: Shades of Crisis Across an Insecure Software Supply Chain
EternalPetya GoldenSpy Kwampirs Stuxnet
2020-07-14TrustwaveBrian Hussey
@online{hussey:20200714:goldenspy:a870540, author = {Brian Hussey}, title = {{GoldenSpy Chapter 4: GoldenHelper Malware Embedded in Official Golden Tax Software}}, date = {2020-07-14}, organization = {Trustwave}, url = {https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/goldenspy-chapter-4-goldenhelper-malware-embedded-in-official-golden-tax-software/}, language = {English}, urldate = {2020-07-15} } GoldenSpy Chapter 4: GoldenHelper Malware Embedded in Official Golden Tax Software
GoldenHelper GoldenSpy
2020-07-02TrustwaveBrian Hussey
@online{hussey:20200702:goldenspy:31c222a, author = {Brian Hussey}, title = {{GoldenSpy Chapter 3: New and Improved Uninstaller}}, date = {2020-07-02}, organization = {Trustwave}, url = {https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/goldenspy-chapter-3-new-and-improved-uninstaller/}, language = {English}, urldate = {2020-07-15} } GoldenSpy Chapter 3: New and Improved Uninstaller
GoldenSpy
2020-06-30TrustwaveBrian Hussey
@online{hussey:20200630:goldenspy:1ecdff8, author = {Brian Hussey}, title = {{GoldenSpy: Chapter Two - The Uninstaller}}, date = {2020-06-30}, organization = {Trustwave}, url = {https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/goldenspy-chapter-two-the-uninstaller/}, language = {English}, urldate = {2020-07-02} } GoldenSpy: Chapter Two - The Uninstaller
GoldenSpy
2020-06-25TrustwaveBrian Hussey
@online{hussey:20200625:golden:51322e2, author = {Brian Hussey}, title = {{The Golden Tax Department and the Emergence of GoldenSpy Malware}}, date = {2020-06-25}, organization = {Trustwave}, url = {https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/the-golden-tax-department-and-the-emergence-of-goldenspy-malware/}, language = {English}, urldate = {2020-06-26} } The Golden Tax Department and the Emergence of GoldenSpy Malware
GoldenSpy
2020-06-25TrustwaveTrustwave SpiderLabs
@techreport{spiderlabs:20200625:golden:8fa4199, author = {Trustwave SpiderLabs}, title = {{The Golden Tax Department and Emergence of GoldenSpy Malware}}, date = {2020-06-25}, institution = {Trustwave}, url = {https://trustwave.azureedge.net/media/16908/the-golden-tax-department-and-emergence-of-goldenspy-malware.pdf}, language = {English}, urldate = {2020-06-30} } The Golden Tax Department and Emergence of GoldenSpy Malware
GoldenSpy
Yara Rules
[TLP:WHITE] win_goldenspy_auto (20200817 | autogenerated rule brought to you by yara-signator)
rule win_goldenspy_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-08-17"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.goldenspy"
        malpedia_rule_date = "20200817"
        malpedia_hash = "8c895fd01eccb47a6225bcb1a3ba53cbb98644c5"
        malpedia_version = "20200817"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 83ceff eb4c ff75d4 ff15???????? 8bcf 8d5101 6690 }
            // n = 7, score = 100
            //   83ceff               | or                  esi, 0xffffffff
            //   eb4c                 | jmp                 0x4e
            //   ff75d4               | push                dword ptr [ebp - 0x2c]
            //   ff15????????         |                     
            //   8bcf                 | mov                 ecx, edi
            //   8d5101               | lea                 edx, [ecx + 1]
            //   6690                 | nop                 

        $sequence_1 = { 0f8217010000 8b5618 03f9 8b4e14 f6c204 7424 85c9 }
            // n = 7, score = 100
            //   0f8217010000         | jb                  0x11d
            //   8b5618               | mov                 edx, dword ptr [esi + 0x18]
            //   03f9                 | add                 edi, ecx
            //   8b4e14               | mov                 ecx, dword ptr [esi + 0x14]
            //   f6c204               | test                dl, 4
            //   7424                 | je                  0x26
            //   85c9                 | test                ecx, ecx

        $sequence_2 = { 0f435590 8b01 52 8b400c ffd0 8945e0 }
            // n = 6, score = 100
            //   0f435590             | cmovae              edx, dword ptr [ebp - 0x70]
            //   8b01                 | mov                 eax, dword ptr [ecx]
            //   52                   | push                edx
            //   8b400c               | mov                 eax, dword ptr [eax + 0xc]
            //   ffd0                 | call                eax
            //   8945e0               | mov                 dword ptr [ebp - 0x20], eax

        $sequence_3 = { 8d55e0 8d4de4 e8???????? 83c404 8d45e4 803800 7409 }
            // n = 7, score = 100
            //   8d55e0               | lea                 edx, [ebp - 0x20]
            //   8d4de4               | lea                 ecx, [ebp - 0x1c]
            //   e8????????           |                     
            //   83c404               | add                 esp, 4
            //   8d45e4               | lea                 eax, [ebp - 0x1c]
            //   803800               | cmp                 byte ptr [eax], 0
            //   7409                 | je                  0xb

        $sequence_4 = { 8d4d0c e9???????? 8d8d6cffffff e9???????? 8b542408 8d420c 8b8a58ffffff }
            // n = 7, score = 100
            //   8d4d0c               | lea                 ecx, [ebp + 0xc]
            //   e9????????           |                     
            //   8d8d6cffffff         | lea                 ecx, [ebp - 0x94]
            //   e9????????           |                     
            //   8b542408             | mov                 edx, dword ptr [esp + 8]
            //   8d420c               | lea                 eax, [edx + 0xc]
            //   8b8a58ffffff         | mov                 ecx, dword ptr [edx - 0xa8]

        $sequence_5 = { 8d4e78 e8???????? 8b5584 8b420c 897211 8b4870 8b406c }
            // n = 7, score = 100
            //   8d4e78               | lea                 ecx, [esi + 0x78]
            //   e8????????           |                     
            //   8b5584               | mov                 edx, dword ptr [ebp - 0x7c]
            //   8b420c               | mov                 eax, dword ptr [edx + 0xc]
            //   897211               | mov                 dword ptr [edx + 0x11], esi
            //   8b4870               | mov                 ecx, dword ptr [eax + 0x70]
            //   8b406c               | mov                 eax, dword ptr [eax + 0x6c]

        $sequence_6 = { e8???????? 51 ff7514 8bcb 8945cc ff7510 8945d8 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   51                   | push                ecx
            //   ff7514               | push                dword ptr [ebp + 0x14]
            //   8bcb                 | mov                 ecx, ebx
            //   8945cc               | mov                 dword ptr [ebp - 0x34], eax
            //   ff7510               | push                dword ptr [ebp + 0x10]
            //   8945d8               | mov                 dword ptr [ebp - 0x28], eax

        $sequence_7 = { 8b08 2bd1 52 eb2b 8b8538ffffff a804 }
            // n = 6, score = 100
            //   8b08                 | mov                 ecx, dword ptr [eax]
            //   2bd1                 | sub                 edx, ecx
            //   52                   | push                edx
            //   eb2b                 | jmp                 0x2d
            //   8b8538ffffff         | mov                 eax, dword ptr [ebp - 0xc8]
            //   a804                 | test                al, 4

        $sequence_8 = { 0f57c0 660fd64604 c706???????? c7460c00000000 3bf7 740f 8b07 }
            // n = 7, score = 100
            //   0f57c0               | xorps               xmm0, xmm0
            //   660fd64604           | movq                qword ptr [esi + 4], xmm0
            //   c706????????         |                     
            //   c7460c00000000       | mov                 dword ptr [esi + 0xc], 0
            //   3bf7                 | cmp                 esi, edi
            //   740f                 | je                  0x11
            //   8b07                 | mov                 eax, dword ptr [edi]

        $sequence_9 = { 51 ff15???????? 83f8ff 741d 5e 8be5 }
            // n = 6, score = 100
            //   51                   | push                ecx
            //   ff15????????         |                     
            //   83f8ff               | cmp                 eax, -1
            //   741d                 | je                  0x1f
            //   5e                   | pop                 esi
            //   8be5                 | mov                 esp, ebp

    condition:
        7 of them and filesize < 1081344
}
Download all Yara Rules