SYMBOLCOMMON_NAMEaka. SYNONYMS
win.hermes_ransom (Back to overview)

Hermes Ransomware

URLhaus    

There is no description at this point.

References
2019-03-18DCSODCSO
@online{dcso:20190318:enterprise:ff92a62, author = {DCSO}, title = {{Enterprise Malware-as-a-Service: Lazarus Group and the Evolution of Ransomware}}, date = {2019-03-18}, organization = {DCSO}, url = {https://dcso.de/2019/03/18/enterprise-malware-as-a-service}, language = {English}, urldate = {2021-02-06} } Enterprise Malware-as-a-Service: Lazarus Group and the Evolution of Ransomware
Hermes Ransomware
2018-11-17Youtube (Demonslay335)Michael Gillespie
@online{gillespie:20181117:analyzing:ecd5641, author = {Michael Gillespie}, title = {{Analyzing Ransomware - Beginner Static Analysis}}, date = {2018-11-17}, organization = {Youtube (Demonslay335)}, url = {https://www.youtube.com/watch?v=9nuo-AGg4p4}, language = {English}, urldate = {2020-02-27} } Analyzing Ransomware - Beginner Static Analysis
Hermes Ransomware
2018-07-30ProofpointProofpoint Staff
@online{staff:20180730:new:07c5e76, author = {Proofpoint Staff}, title = {{New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign}}, date = {2018-07-30}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/new-version-azorult-stealer-improves-loading-features-spreads-alongside}, language = {English}, urldate = {2019-12-20} } New version of AZORult stealer improves loading features, spreads alongside ransomware in new campaign
Azorult Hermes Hermes Ransomware
Yara Rules
[TLP:WHITE] win_hermes_ransom_auto (20201023 | autogenerated rule brought to you by yara-signator)
rule win_hermes_ransom_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-12-22"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.hermes_ransom"
        malpedia_rule_date = "20201222"
        malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130"
        malpedia_version = "20201023"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 50 ff75dc ff75f4 ff75fc }
            // n = 4, score = 100
            //   50                   | push                eax
            //   ff75dc               | push                dword ptr [ebp - 0x24]
            //   ff75f4               | push                dword ptr [ebp - 0xc]
            //   ff75fc               | push                dword ptr [ebp - 4]

        $sequence_1 = { a3???????? 6a32 58 c1e005 05???????? 50 }
            // n = 6, score = 100
            //   a3????????           |                     
            //   6a32                 | push                0x32
            //   58                   | pop                 eax
            //   c1e005               | shl                 eax, 5
            //   05????????           |                     
            //   50                   | push                eax

        $sequence_2 = { e8???????? 59 59 c7458c02000000 83659000 83659400 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   59                   | pop                 ecx
            //   c7458c02000000       | mov                 dword ptr [ebp - 0x74], 2
            //   83659000             | and                 dword ptr [ebp - 0x70], 0
            //   83659400             | and                 dword ptr [ebp - 0x6c], 0

        $sequence_3 = { c645b727 c645b85a c645b906 c645ba56 }
            // n = 4, score = 100
            //   c645b727             | mov                 byte ptr [ebp - 0x49], 0x27
            //   c645b85a             | mov                 byte ptr [ebp - 0x48], 0x5a
            //   c645b906             | mov                 byte ptr [ebp - 0x47], 6
            //   c645ba56             | mov                 byte ptr [ebp - 0x46], 0x56

        $sequence_4 = { c680d8aa400000 8be5 5d c3 55 8bec }
            // n = 6, score = 100
            //   c680d8aa400000       | mov                 byte ptr [eax + 0x40aad8], 0
            //   8be5                 | mov                 esp, ebp
            //   5d                   | pop                 ebp
            //   c3                   | ret                 
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp

        $sequence_5 = { a3???????? 6a32 58 6bc03a 05???????? 50 }
            // n = 6, score = 100
            //   a3????????           |                     
            //   6a32                 | push                0x32
            //   58                   | pop                 eax
            //   6bc03a               | imul                eax, eax, 0x3a
            //   05????????           |                     
            //   50                   | push                eax

        $sequence_6 = { 7551 8b45e4 0fbe84050effffff 83f852 7541 8b45e4 0fbe84050fffffff }
            // n = 7, score = 100
            //   7551                 | jne                 0x53
            //   8b45e4               | mov                 eax, dword ptr [ebp - 0x1c]
            //   0fbe84050effffff     | movsx               eax, byte ptr [ebp + eax - 0xf2]
            //   83f852               | cmp                 eax, 0x52
            //   7541                 | jne                 0x43
            //   8b45e4               | mov                 eax, dword ptr [ebp - 0x1c]
            //   0fbe84050fffffff     | movsx               eax, byte ptr [ebp + eax - 0xf1]

        $sequence_7 = { ff75f8 ff15???????? 89854cffffff 83bd4cffffff00 752a }
            // n = 5, score = 100
            //   ff75f8               | push                dword ptr [ebp - 8]
            //   ff15????????         |                     
            //   89854cffffff         | mov                 dword ptr [ebp - 0xb4], eax
            //   83bd4cffffff00       | cmp                 dword ptr [ebp - 0xb4], 0
            //   752a                 | jne                 0x2c

        $sequence_8 = { 7408 6a01 ff15???????? 8be5 5d c3 }
            // n = 6, score = 100
            //   7408                 | je                  0xa
            //   6a01                 | push                1
            //   ff15????????         |                     
            //   8be5                 | mov                 esp, ebp
            //   5d                   | pop                 ebp
            //   c3                   | ret                 

        $sequence_9 = { ff75d0 6a00 ff15???????? 8945cc 8b45cc }
            // n = 5, score = 100
            //   ff75d0               | push                dword ptr [ebp - 0x30]
            //   6a00                 | push                0
            //   ff15????????         |                     
            //   8945cc               | mov                 dword ptr [ebp - 0x34], eax
            //   8b45cc               | mov                 eax, dword ptr [ebp - 0x34]

    condition:
        7 of them and filesize < 7192576
}
Download all Yara Rules