SYMBOLCOMMON_NAMEaka. SYNONYMS
win.hermes (Back to overview)

Hermes

Actor(s): Lazarus Group

URLhaus    

There is no description at this point.

References
2020-03-05MicrosoftMicrosoft Threat Protection Intelligence Team
@online{team:20200305:humanoperated:d90a28e, author = {Microsoft Threat Protection Intelligence Team}, title = {{Human-operated ransomware attacks: A preventable disaster}}, date = {2020-03-05}, organization = {Microsoft}, url = {https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/}, language = {English}, urldate = {2020-03-06} } Human-operated ransomware attacks: A preventable disaster
Dharma DoppelPaymer Dridex EternalPetya Gandcrab Hermes LockerGoga MegaCortex MimiKatz REvil RobinHood Ryuk SamSam TrickBot WannaCryptor
2020-02-19LexfoLexfo
@techreport{lexfo:20200219:lazarus:f293c37, author = {Lexfo}, title = {{The Lazarus Constellation A study on North Korean malware}}, date = {2020-02-19}, institution = {Lexfo}, url = {https://blog.lexfo.fr/ressources/Lexfo-WhitePaper-The_Lazarus_Constellation.pdf}, language = {English}, urldate = {2020-03-11} } The Lazarus Constellation A study on North Korean malware
FastCash AppleJeus BADCALL Bankshot Brambul Dtrack Duuzer DYEPACK ELECTRICFISH HARDRAIN Hermes HOPLIGHT Joanap KEYMARBLE Kimsuky MimiKatz MyDoom NACHOCHEESE NavRAT PowerRatankba RokRAT Sierra(Alfa,Bravo, ...) Volgmer WannaCryptor
2018-07-30ProofpointProofpoint Staff
@online{staff:20180730:new:07c5e76, author = {Proofpoint Staff}, title = {{New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign}}, date = {2018-07-30}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/new-version-azorult-stealer-improves-loading-features-spreads-alongside}, language = {English}, urldate = {2019-12-20} } New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign
Azorult Hermes Hermes Ransomware
2017-10-16Sergei Shevchenko, Hirman Muhammad bin Abu Bakar, James Wong
@online{shevchenko:20171016:taiwan:081b125, author = {Sergei Shevchenko and Hirman Muhammad bin Abu Bakar and James Wong}, title = {{Taiwan Heist: Lazarus Tools and Ransomware}}, date = {2017-10-16}, url = {http://baesystemsai.blogspot.de/2017/10/taiwan-heist-lazarus-tools.html}, language = {English}, urldate = {2020-01-07} } Taiwan Heist: Lazarus Tools and Ransomware
Bitsran Hermes
Yara Rules
[TLP:WHITE] win_hermes_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_hermes_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.hermes"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { d3e8 a801 0f8498000000 8d4641 }
            // n = 4, score = 100
            //   d3e8                 | shr                 eax, cl
            //   a801                 | test                al, 1
            //   0f8498000000         | je                  0x9e
            //   8d4641               | lea                 eax, [esi + 0x41]

        $sequence_1 = { 668985c4f5ffff 8d85c0f5ffff 7507 68???????? eb05 68???????? }
            // n = 6, score = 100
            //   668985c4f5ffff       | mov                 word ptr [ebp - 0xa3c], ax
            //   8d85c0f5ffff         | lea                 eax, [ebp - 0xa40]
            //   7507                 | jne                 9
            //   68????????           |                     
            //   eb05                 | jmp                 7
            //   68????????           |                     

        $sequence_2 = { 0f1185f8fcffff 0f2805???????? 0f118508fdffff 0f2805???????? }
            // n = 4, score = 100
            //   0f1185f8fcffff       | movups              xmmword ptr [ebp - 0x308], xmm0
            //   0f2805????????       |                     
            //   0f118508fdffff       | movups              xmmword ptr [ebp - 0x2f8], xmm0
            //   0f2805????????       |                     

        $sequence_3 = { 57 6820030000 6a00 be???????? 56 e8???????? }
            // n = 6, score = 100
            //   57                   | push                edi
            //   6820030000           | push                0x320
            //   6a00                 | push                0
            //   be????????           |                     
            //   56                   | push                esi
            //   e8????????           |                     

        $sequence_4 = { 50 8d852cffffff 50 ff15???????? 8d852cffffff 50 56 }
            // n = 7, score = 100
            //   50                   | push                eax
            //   8d852cffffff         | lea                 eax, [ebp - 0xd4]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8d852cffffff         | lea                 eax, [ebp - 0xd4]
            //   50                   | push                eax
            //   56                   | push                esi

        $sequence_5 = { 668b85fefeffff 668985f0f9ffff 8d85e8f9ffff 7507 68???????? eb05 }
            // n = 6, score = 100
            //   668b85fefeffff       | mov                 ax, word ptr [ebp - 0x102]
            //   668985f0f9ffff       | mov                 word ptr [ebp - 0x610], ax
            //   8d85e8f9ffff         | lea                 eax, [ebp - 0x618]
            //   7507                 | jne                 9
            //   68????????           |                     
            //   eb05                 | jmp                 7

        $sequence_6 = { 8be5 5d c3 55 8bec 81ecb80f0000 56 }
            // n = 7, score = 100
            //   8be5                 | mov                 esp, ebp
            //   5d                   | pop                 ebp
            //   c3                   | ret                 
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   81ecb80f0000         | sub                 esp, 0xfb8
            //   56                   | push                esi

        $sequence_7 = { 0f1185b8feffff 6a50 0f2805???????? 0f1185c8feffff 57 0f2805???????? 0f1185d8feffff }
            // n = 7, score = 100
            //   0f1185b8feffff       | movups              xmmword ptr [ebp - 0x148], xmm0
            //   6a50                 | push                0x50
            //   0f2805????????       |                     
            //   0f1185c8feffff       | movups              xmmword ptr [ebp - 0x138], xmm0
            //   57                   | push                edi
            //   0f2805????????       |                     
            //   0f1185d8feffff       | movups              xmmword ptr [ebp - 0x128], xmm0

        $sequence_8 = { 0f8474feffff 8d45dc 50 57 57 }
            // n = 5, score = 100
            //   0f8474feffff         | je                  0xfffffe7a
            //   8d45dc               | lea                 eax, [ebp - 0x24]
            //   50                   | push                eax
            //   57                   | push                edi
            //   57                   | push                edi

        $sequence_9 = { 8dbd2cffffff 895dfc 5e 8bce d3e8 }
            // n = 5, score = 100
            //   8dbd2cffffff         | lea                 edi, [ebp - 0xd4]
            //   895dfc               | mov                 dword ptr [ebp - 4], ebx
            //   5e                   | pop                 esi
            //   8bce                 | mov                 ecx, esi
            //   d3e8                 | shr                 eax, cl

    condition:
        7 of them and filesize < 2113536
}
[TLP:WHITE] win_hermes_w0   (20180301 | No description)
rule win_hermes_w0 {
    meta:
        author = "BAE"
        reference = "https://baesystemsai.blogspot.de/2017/10/taiwan-heist-lazarus-tools.html"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.hermes"
        malpedia_version = "20180301"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        //in both version 2.1 and sample in Feb
        $s1 = "SYSTEM\\CurrentControlSet\\Control\\Nls\\Language\\"
        $s2 = "0419"
        $s3 = "0422"
        $s4 = "0423"
        //in version 2.1 only
        $S1 = "HERMES"
        $S2 = "vssadminn"
        $S3 = "finish work"
        $S4 = "testlib.dll"
        $S5 = "shadowstorageiet"
        //maybe unique in the file
        $u1 = "ALKnvfoi4tbmiom3t40iomfr0i3t4jmvri3tb4mvi3btv3rgt4t777"
        $u2 = "HERMES 2.1 TEST BUILD, press ok"
        $u3 = "hnKwtMcOadHwnXutKHqPvpgfysFXfAFTcaDHNdCnktA" //RSA Key part
    condition:
        all of ($s*) and 3 of ($S*) and 1 of ($u*)
}
Download all Yara Rules