win.golroted (Back to overview)

Golroted

URLhaus    

There is no description at this point.

References
http://www.vkremez.com/2017/11/lets-learn-dissecting-golroted-trojans.html
Yara Rules
[TLP:WHITE] win_golroted_auto (20190620 | autogenerated rule brought to you by yara-signator)
rule win_golroted_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2019-07-05"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator 0.2a"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.golroted"
        malpedia_version = "20190620"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */

    strings:
        $sequence_0 = { 8a4e0f 01df 01cb 83f810 }
            // n = 4, score = 600
            //   8a4e0f               | mov                 cl, byte ptr [esi + 0xf]
            //   01df                 | add                 edi, ebx
            //   01cb                 | add                 ebx, ecx
            //   83f810               | cmp                 eax, 0x10

        $sequence_1 = { 8d45f8 8945d8 c645dc05 c745e040000000 c645e400 }
            // n = 5, score = 600
            //   8d45f8               | lea                 eax, [ebp - 8]
            //   8945d8               | mov                 dword ptr [ebp - 0x28], eax
            //   c645dc05             | mov                 byte ptr [ebp - 0x24], 5
            //   c745e040000000       | mov                 dword ptr [ebp - 0x20], 0x40
            //   c645e400             | mov                 byte ptr [ebp - 0x1c], 0

        $sequence_2 = { e8???????? 83c404 8b55f4 8b45f8 e8???????? 8bd8 }
            // n = 6, score = 600
            //   e8????????           |                     
            //   83c404               | add                 esp, 4
            //   8b55f4               | mov                 edx, dword ptr [ebp - 0xc]
            //   8b45f8               | mov                 eax, dword ptr [ebp - 8]
            //   e8????????           |                     
            //   8bd8                 | mov                 ebx, eax

        $sequence_3 = { eb?? 8b45f4 e8???????? 84c0 74?? 8bc3 8b55f4 }
            // n = 7, score = 600
            //   eb??                 |                     
            //   8b45f4               | mov                 eax, dword ptr [ebp - 0xc]
            //   e8????????           |                     
            //   84c0                 | test                al, al
            //   74??                 |                     
            //   8bc3                 | mov                 eax, ebx
            //   8b55f4               | mov                 edx, dword ptr [ebp - 0xc]

        $sequence_4 = { 53 56 57 33d2 8995c8feffff 8955f4 8945fc }
            // n = 7, score = 600
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi
            //   33d2                 | xor                 edx, edx
            //   8995c8feffff         | mov                 dword ptr [ebp - 0x138], edx
            //   8955f4               | mov                 dword ptr [ebp - 0xc], edx
            //   8945fc               | mov                 dword ptr [ebp - 4], eax

        $sequence_5 = { 648920 c605?????????? c605?????????? c605?????????? c605?????????? c605?????????? 33db }
            // n = 7, score = 600
            //   648920               | mov                 dword ptr fs:[eax], esp
            //   c605??????????       |                     
            //   c605??????????       |                     
            //   c605??????????       |                     
            //   c605??????????       |                     
            //   c605??????????       |                     
            //   33db                 | xor                 ebx, ebx

        $sequence_6 = { 64ff30 648920 8bd3 8b45fc e8???????? 833b00 74?? }
            // n = 7, score = 600
            //   64ff30               | push                dword ptr fs:[eax]
            //   648920               | mov                 dword ptr fs:[eax], esp
            //   8bd3                 | mov                 edx, ebx
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   e8????????           |                     
            //   833b00               | cmp                 dword ptr [ebx], 0
            //   74??                 |                     

        $sequence_7 = { ba03000000 e8???????? 8b45c4 e8???????? 84c0 74?? }
            // n = 6, score = 600
            //   ba03000000           | mov                 edx, 3
            //   e8????????           |                     
            //   8b45c4               | mov                 eax, dword ptr [ebp - 0x3c]
            //   e8????????           |                     
            //   84c0                 | test                al, al
            //   74??                 |                     

        $sequence_8 = { 8b10 33c0 e8???????? 8bf8 3b3c24 75?? }
            // n = 6, score = 600
            //   8b10                 | mov                 edx, dword ptr [eax]
            //   33c0                 | xor                 eax, eax
            //   e8????????           |                     
            //   8bf8                 | mov                 edi, eax
            //   3b3c24               | cmp                 edi, dword ptr [esp]
            //   75??                 |                     

        $sequence_9 = { 89c7 c1ef10 0fb7d8 55 89d6 85f6 89cd }
            // n = 7, score = 600
            //   89c7                 | mov                 edi, eax
            //   c1ef10               | shr                 edi, 0x10
            //   0fb7d8               | movzx               ebx, ax
            //   55                   | push                ebp
            //   89d6                 | mov                 esi, edx
            //   85f6                 | test                esi, esi
            //   89cd                 | mov                 ebp, ecx

    condition:
        7 of them
}
[TLP:WHITE] win_golroted_w0   (20171214 | Golroted Trojan rule - file golroted.exe)
rule win_golroted_w0 {
    meta:
        description = "Golroted Trojan rule - file golroted.exe"
        author = "@VK_Intel"
        reference = "Detects Golroted Trojan"
        date = "2017-11-11"
        hash = "e73b20f639cd9ecc4c8196e885de57043a4baddb70bb4b66e1df13abc7da487e"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.golroted"
        malpedia_version = "20171214"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    strings:
        $s0 = "C:\\Windows\\System32\\Mycomput.dll" fullword ascii
        $s1 = ".lnk\" \"C:\\Users\\" fullword ascii
        $s2 = "vbc.exe" fullword ascii 
        $s3 = "System32\\WerFault.exe" fullword ascii
        $s4 = "system32\\notepad.exe" fullword ascii
        $s5 = "Mozilla Firefox\\firefox.exe" fullword ascii
        $s6 = "FC:\\Windows\\System32\\" fullword ascii
        $s7 = "C:\\Windows\\SysWOW64\\ntdll.dll" fullword ascii
        $s9 = "Microsoft.NET\\Framework\\v2.0.50727\\regasm.exe" fullword ascii
        $s10 = "Microsoft.NET\\Framework\\v4.0.30319\\regasm.exe" fullword ascii
        $s11 = "/c reg add hkcu\\Environment /v windir /d \"cmd /c start " fullword ascii
        $s12 = "bindedfiledropandexecute" fullword ascii
        $s13 = "/c schtasks /Run /TN \\Microsoft\\Windows\\DiskCleanup\\SilentCleanup /I && exit" fullword ascii
        $s14 = "Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe" fullword ascii
        $s15 = "Microsoft.NET\\Framework\\v4.0.30319\\vbc.exe" fullword ascii
        $s16 = "C:\\Program Files (x86)\\Kaspersky Lab\\Kaspersky Internet Security " fullword ascii
        $s17 = "\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\" fullword ascii
    condition:
        all of them
}
Download all Yara Rules