There is no description at this point.
rule win_h1n1_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-07-11" version = "1" description = "Detects win.h1n1." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.h1n1" malpedia_rule_date = "20230705" malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41" malpedia_version = "20230715" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { ff7508 56 ff35???????? 58 ffd0 0bc0 750a } // n = 7, score = 400 // ff7508 | push dword ptr [ebp + 8] // 56 | push esi // ff35???????? | // 58 | pop eax // ffd0 | call eax // 0bc0 | or eax, eax // 750a | jne 0xc $sequence_1 = { ff75fc ff75f8 ff35???????? 58 } // n = 4, score = 400 // ff75fc | push dword ptr [ebp - 4] // ff75f8 | push dword ptr [ebp - 8] // ff35???????? | // 58 | pop eax $sequence_2 = { 2d8eff8aff ab 351c001400 ab 0505009fff } // n = 5, score = 400 // 2d8eff8aff | sub eax, 0xff8aff8e // ab | stosd dword ptr es:[edi], eax // 351c001400 | xor eax, 0x14001c // ab | stosd dword ptr es:[edi], eax // 0505009fff | add eax, 0xff9f0005 $sequence_3 = { 51 6a15 ff7508 ff35???????? } // n = 4, score = 400 // 51 | push ecx // 6a15 | push 0x15 // ff7508 | push dword ptr [ebp + 8] // ff35???????? | $sequence_4 = { 51 52 b950c30000 0f31 } // n = 4, score = 400 // 51 | push ecx // 52 | push edx // b950c30000 | mov ecx, 0xc350 // 0f31 | rdtsc $sequence_5 = { ab ff75fc ff35???????? 58 ffd0 85c0 } // n = 6, score = 400 // ab | stosd dword ptr es:[edi], eax // ff75fc | push dword ptr [ebp - 4] // ff35???????? | // 58 | pop eax // ffd0 | call eax // 85c0 | test eax, eax $sequence_6 = { 0bc0 7423 8d45f8 50 ff75fc 6802000080 ff35???????? } // n = 7, score = 400 // 0bc0 | or eax, eax // 7423 | je 0x25 // 8d45f8 | lea eax, [ebp - 8] // 50 | push eax // ff75fc | push dword ptr [ebp - 4] // 6802000080 | push 0x80000002 // ff35???????? | $sequence_7 = { 6a00 6a15 ff75fc 6a00 } // n = 4, score = 400 // 6a00 | push 0 // 6a15 | push 0x15 // ff75fc | push dword ptr [ebp - 4] // 6a00 | push 0 $sequence_8 = { c3 56 8b742408 6804010000 68f8820010 8d86f8020000 50 } // n = 7, score = 100 // c3 | ret // 56 | push esi // 8b742408 | mov esi, dword ptr [esp + 8] // 6804010000 | push 0x104 // 68f8820010 | push 0x100082f8 // 8d86f8020000 | lea eax, [esi + 0x2f8] // 50 | push eax $sequence_9 = { d1e9 330c8500850010 330c95f48b0010 42 890c95bc850010 81fae3000000 } // n = 6, score = 100 // d1e9 | shr ecx, 1 // 330c8500850010 | xor ecx, dword ptr [eax*4 + 0x10008500] // 330c95f48b0010 | xor ecx, dword ptr [edx*4 + 0x10008bf4] // 42 | inc edx // 890c95bc850010 | mov dword ptr [edx*4 + 0x100085bc], ecx // 81fae3000000 | cmp edx, 0xe3 $sequence_10 = { 8b048500850010 338774fcffff 33c1 8907 83c704 81ff7c8f0010 7cd4 } // n = 7, score = 100 // 8b048500850010 | mov eax, dword ptr [eax*4 + 0x10008500] // 338774fcffff | xor eax, dword ptr [edi - 0x38c] // 33c1 | xor eax, ecx // 8907 | mov dword ptr [edi], eax // 83c704 | add edi, 4 // 81ff7c8f0010 | cmp edi, 0x10008f7c // 7cd4 | jl 0xffffffd6 $sequence_11 = { f644242c01 55 50 6808850010 ff74242c b9686e0010 } // n = 6, score = 100 // f644242c01 | test byte ptr [esp + 0x2c], 1 // 55 | push ebp // 50 | push eax // 6808850010 | push 0x10008508 // ff74242c | push dword ptr [esp + 0x2c] // b9686e0010 | mov ecx, 0x10006e68 $sequence_12 = { 6a13 b86c6e0010 59 ff742428 } // n = 4, score = 100 // 6a13 | push 0x13 // b86c6e0010 | mov eax, 0x10006e6c // 59 | pop ecx // ff742428 | push dword ptr [esp + 0x28] $sequence_13 = { 50 8d8578fdffff 50 68fc600010 6804010000 } // n = 5, score = 100 // 50 | push eax // 8d8578fdffff | lea eax, [ebp - 0x288] // 50 | push eax // 68fc600010 | push 0x100060fc // 6804010000 | push 0x104 $sequence_14 = { 5b 8bc1 83e001 d1e9 330c8500850010 330d???????? 890d???????? } // n = 7, score = 100 // 5b | pop ebx // 8bc1 | mov eax, ecx // 83e001 | and eax, 1 // d1e9 | shr ecx, 1 // 330c8500850010 | xor ecx, dword ptr [eax*4 + 0x10008500] // 330d???????? | // 890d???????? | $sequence_15 = { 50 ffb610850010 57 ff15???????? 83c608 83fe18 72e2 } // n = 7, score = 100 // 50 | push eax // ffb610850010 | push dword ptr [esi + 0x10008510] // 57 | push edi // ff15???????? | // 83c608 | add esi, 8 // 83fe18 | cmp esi, 0x18 // 72e2 | jb 0xffffffe4 condition: 7 of them and filesize < 172032 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY