SYMBOLCOMMON_NAMEaka. SYNONYMS
win.hermes (Back to overview)

Hermes

Actor(s): Lazarus Group

URLhaus    

There is no description at this point.

References
2020-12-09CrowdStrikeJosh Burgess, Jason Rivera
@techreport{burgess:20201209:from:1811e9c, author = {Josh Burgess and Jason Rivera}, title = {{From Zero to SixtyThe Story of North Korea’s Rapid Ascent to Becoming a Global Cyber Superpower}}, date = {2020-12-09}, institution = {CrowdStrike}, url = {https://i.blackhat.com/eu-20/Wednesday/eu-20-Rivera-From-Zero-To-Sixty-The-Story-Of-North-Koreas-Rapid-Ascent-To-Becoming-A-Global-Cyber-Superpower.pdf}, language = {English}, urldate = {2020-12-11} } From Zero to SixtyThe Story of North Korea’s Rapid Ascent to Becoming a Global Cyber Superpower
FastCash Hermes WannaCryptor
2020-11-14Medium 0xastrovaxastrovax
@online{astrovax:20201114:deep:b50ae08, author = {astrovax}, title = {{Deep Dive Into Ryuk Ransomware}}, date = {2020-11-14}, organization = {Medium 0xastrovax}, url = {https://medium.com/ax1al/reversing-ryuk-eef8ffd55f12}, language = {English}, urldate = {2021-01-25} } Deep Dive Into Ryuk Ransomware
Hermes Ryuk
2020-03-05MicrosoftMicrosoft Threat Protection Intelligence Team
@online{team:20200305:humanoperated:d90a28e, author = {Microsoft Threat Protection Intelligence Team}, title = {{Human-operated ransomware attacks: A preventable disaster}}, date = {2020-03-05}, organization = {Microsoft}, url = {https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/}, language = {English}, urldate = {2020-03-06} } Human-operated ransomware attacks: A preventable disaster
Dharma DoppelPaymer Dridex EternalPetya Gandcrab Hermes LockerGoga MegaCortex MimiKatz REvil RobinHood Ryuk SamSam TrickBot WannaCryptor
2020-02-19LexfoLexfo
@techreport{lexfo:20200219:lazarus:f293c37, author = {Lexfo}, title = {{The Lazarus Constellation A study on North Korean malware}}, date = {2020-02-19}, institution = {Lexfo}, url = {https://blog.lexfo.fr/ressources/Lexfo-WhitePaper-The_Lazarus_Constellation.pdf}, language = {English}, urldate = {2020-03-11} } The Lazarus Constellation A study on North Korean malware
FastCash AppleJeus BADCALL Bankshot Brambul Dtrack Duuzer DYEPACK ELECTRICFISH HARDRAIN Hermes HOPLIGHT Joanap KEYMARBLE Kimsuky MimiKatz MyDoom NACHOCHEESE NavRAT PowerRatankba RokRAT Sierra(Alfa,Bravo, ...) Volgmer WannaCryptor
2018-07-30ProofpointProofpoint Staff
@online{staff:20180730:new:07c5e76, author = {Proofpoint Staff}, title = {{New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign}}, date = {2018-07-30}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/new-version-azorult-stealer-improves-loading-features-spreads-alongside}, language = {English}, urldate = {2019-12-20} } New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign
Azorult Hermes Hermes Ransomware
2017-10-16Sergei Shevchenko, Hirman Muhammad bin Abu Bakar, James Wong
@online{shevchenko:20171016:taiwan:081b125, author = {Sergei Shevchenko and Hirman Muhammad bin Abu Bakar and James Wong}, title = {{Taiwan Heist: Lazarus Tools and Ransomware}}, date = {2017-10-16}, url = {http://baesystemsai.blogspot.de/2017/10/taiwan-heist-lazarus-tools.html}, language = {English}, urldate = {2020-01-07} } Taiwan Heist: Lazarus Tools and Ransomware
Bitsran Hermes
Yara Rules
[TLP:WHITE] win_hermes_auto (20201023 | autogenerated rule brought to you by yara-signator)
rule win_hermes_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-12-22"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.hermes"
        malpedia_rule_date = "20201222"
        malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130"
        malpedia_version = "20201023"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 3bc7 7e5a 0fb7847db4f5ffff 83f83b 740b 66890475f8dd4f00 }
            // n = 6, score = 100
            //   3bc7                 | cmp                 eax, edi
            //   7e5a                 | jle                 0x5c
            //   0fb7847db4f5ffff     | movzx               eax, word ptr [ebp + edi*2 - 0xa4c]
            //   83f83b               | cmp                 eax, 0x3b
            //   740b                 | je                  0xd
            //   66890475f8dd4f00     | mov                 word ptr [esi*2 + 0x4fddf8], ax

        $sequence_1 = { 0f2805???????? 0f1185e8feffff 0f2805???????? 0f1185f8feffff 0f2805???????? 0f118508ffffff 0f2805???????? }
            // n = 7, score = 100
            //   0f2805????????       |                     
            //   0f1185e8feffff       | movups              xmmword ptr [ebp - 0x118], xmm0
            //   0f2805????????       |                     
            //   0f1185f8feffff       | movups              xmmword ptr [ebp - 0x108], xmm0
            //   0f2805????????       |                     
            //   0f118508ffffff       | movups              xmmword ptr [ebp - 0xf8], xmm0
            //   0f2805????????       |                     

        $sequence_2 = { 3bf8 0f861dffffff 33db 8d45e0 53 50 }
            // n = 6, score = 100
            //   3bf8                 | cmp                 edi, eax
            //   0f861dffffff         | jbe                 0xffffff23
            //   33db                 | xor                 ebx, ebx
            //   8d45e0               | lea                 eax, [ebp - 0x20]
            //   53                   | push                ebx
            //   50                   | push                eax

        $sequence_3 = { be???????? 8dbdc4f8ffff f3a5 6870050000 }
            // n = 4, score = 100
            //   be????????           |                     
            //   8dbdc4f8ffff         | lea                 edi, [ebp - 0x73c]
            //   f3a5                 | rep movsd           dword ptr es:[edi], dword ptr [esi]
            //   6870050000           | push                0x570

        $sequence_4 = { 6a00 ff75e8 ff15???????? 57 6a00 53 ff15???????? }
            // n = 7, score = 100
            //   6a00                 | push                0
            //   ff75e8               | push                dword ptr [ebp - 0x18]
            //   ff15????????         |                     
            //   57                   | push                edi
            //   6a00                 | push                0
            //   53                   | push                ebx
            //   ff15????????         |                     

        $sequence_5 = { 0f1185d8fcffff 0f2805???????? 0f1185e8fcffff 0f2805???????? 0f1185f8fcffff 0f2805???????? 0f118508fdffff }
            // n = 7, score = 100
            //   0f1185d8fcffff       | movups              xmmword ptr [ebp - 0x328], xmm0
            //   0f2805????????       |                     
            //   0f1185e8fcffff       | movups              xmmword ptr [ebp - 0x318], xmm0
            //   0f2805????????       |                     
            //   0f1185f8fcffff       | movups              xmmword ptr [ebp - 0x308], xmm0
            //   0f2805????????       |                     
            //   0f118508fdffff       | movups              xmmword ptr [ebp - 0x2f8], xmm0

        $sequence_6 = { 50 e8???????? 8d8574fbffff 68???????? 50 e8???????? }
            // n = 6, score = 100
            //   50                   | push                eax
            //   e8????????           |                     
            //   8d8574fbffff         | lea                 eax, [ebp - 0x48c]
            //   68????????           |                     
            //   50                   | push                eax
            //   e8????????           |                     

        $sequence_7 = { 56 ff15???????? 6888130000 53 68???????? }
            // n = 5, score = 100
            //   56                   | push                esi
            //   ff15????????         |                     
            //   6888130000           | push                0x1388
            //   53                   | push                ebx
            //   68????????           |                     

        $sequence_8 = { 8b4508 5d c3 55 8bec 8b4d10 }
            // n = 6, score = 100
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   5d                   | pop                 ebp
            //   c3                   | ret                 
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   8b4d10               | mov                 ecx, dword ptr [ebp + 0x10]

        $sequence_9 = { 85f6 0f8f4dffffff ff15???????? 68e8030000 }
            // n = 4, score = 100
            //   85f6                 | test                esi, esi
            //   0f8f4dffffff         | jg                  0xffffff53
            //   ff15????????         |                     
            //   68e8030000           | push                0x3e8

    condition:
        7 of them and filesize < 2113536
}
[TLP:WHITE] win_hermes_w0   (20180301 | No description)
rule win_hermes_w0 {
    meta:
        author = "BAE"
        reference = "https://baesystemsai.blogspot.de/2017/10/taiwan-heist-lazarus-tools.html"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.hermes"
        malpedia_version = "20180301"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        //in both version 2.1 and sample in Feb
        $s1 = "SYSTEM\\CurrentControlSet\\Control\\Nls\\Language\\"
        $s2 = "0419"
        $s3 = "0422"
        $s4 = "0423"
        //in version 2.1 only
        $S1 = "HERMES"
        $S2 = "vssadminn"
        $S3 = "finish work"
        $S4 = "testlib.dll"
        $S5 = "shadowstorageiet"
        //maybe unique in the file
        $u1 = "ALKnvfoi4tbmiom3t40iomfr0i3t4jmvri3tb4mvi3btv3rgt4t777"
        $u2 = "HERMES 2.1 TEST BUILD, press ok"
        $u3 = "hnKwtMcOadHwnXutKHqPvpgfysFXfAFTcaDHNdCnktA" //RSA Key part
    condition:
        all of ($s*) and 3 of ($S*) and 1 of ($u*)
}
Download all Yara Rules