SYMBOLCOMMON_NAMEaka. SYNONYMS
win.htran (Back to overview)

HTran

aka: HUC Packet Transmit Tool

Actor(s): GALLIUM, UPS


There is no description at this point.

References
2020-05-21ESET ResearchMathieu Tartare, Martin Smolár
@online{tartare:20200521:no:016fc6c, author = {Mathieu Tartare and Martin Smolár}, title = {{No “Game over” for the Winnti Group}}, date = {2020-05-21}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2020/05/21/no-game-over-winnti-group/}, language = {English}, urldate = {2020-05-23} } No “Game over” for the Winnti Group
ACEHASH HTran MimiKatz
2020-05-14Lab52Dex
@online{dex:20200514:energy:43e92b4, author = {Dex}, title = {{The energy reserves in the Eastern Mediterranean Sea and a malicious campaign of APT10 against Turkey}}, date = {2020-05-14}, organization = {Lab52}, url = {https://lab52.io/blog/the-energy-reserves-in-the-eastern-mediterranean-sea-and-a-malicious-campaign-of-apt10-against-turkey/}, language = {English}, urldate = {2020-06-10} } The energy reserves in the Eastern Mediterranean Sea and a malicious campaign of APT10 against Turkey
Cobalt Strike HTran MimiKatz PlugX Quasar RAT
2020-02-21ADEO DFIRADEO DFIR
@techreport{dfir:20200221:apt10:e9c3328, author = {ADEO DFIR}, title = {{APT10 Threat Analysis Report}}, date = {2020-02-21}, institution = {ADEO DFIR}, url = {https://adeo.com.tr/wp-content/uploads/2020/02/APT10_Report.pdf}, language = {English}, urldate = {2020-03-03} } APT10 Threat Analysis Report
CHINACHOPPER HTran MimiKatz PlugX Quasar RAT
2020SecureworksSecureWorks
@online{secureworks:2020:bronze:b55f797, author = {SecureWorks}, title = {{BRONZE MAYFAIR}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/bronze-mayfair}, language = {English}, urldate = {2020-05-23} } BRONZE MAYFAIR
HTran pirpi UPS
2020SecureworksSecureWorks
@online{secureworks:2020:bronze:4118462, author = {SecureWorks}, title = {{BRONZE ATLAS}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/bronze-atlas}, language = {English}, urldate = {2020-05-23} } BRONZE ATLAS
Speculoos Winnti ACEHASH CCleaner Backdoor CHINACHOPPER Empire Downloader HTran MimiKatz PlugX Winnti Axiom
2019-12-12MicrosoftMicrosoft Threat Intelligence Center
@online{center:20191212:gallium:79f6460, author = {Microsoft Threat Intelligence Center}, title = {{GALLIUM: Targeting global telecom}}, date = {2019-12-12}, organization = {Microsoft}, url = {https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/}, language = {English}, urldate = {2020-01-07} } GALLIUM: Targeting global telecom
Ghost RAT HTran GALLIUM
2013-03-04Trend MicroKyle Wilhoit
@online{wilhoit:20130304:indepth:ebccc8b, author = {Kyle Wilhoit}, title = {{In-Depth Look: APT Attack Tools of the Trade}}, date = {2013-03-04}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/in-depth-look-apt-attack-tools-of-the-trade/}, language = {English}, urldate = {2019-07-11} } In-Depth Look: APT Attack Tools of the Trade
HTran
2011-08-03SecureworksJoe Stewart
@online{stewart:20110803:htran:7a67164, author = {Joe Stewart}, title = {{HTran and the Advanced Persistent Threat}}, date = {2011-08-03}, organization = {Secureworks}, url = {https://www.secureworks.com/research/htran}, language = {English}, urldate = {2020-01-08} } HTran and the Advanced Persistent Threat
HTran
Yara Rules
[TLP:WHITE] win_htran_auto (20200529 | autogenerated rule brought to you by yara-signator)
rule win_htran_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-05-30"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.htran"
        malpedia_rule_date = "20200529"
        malpedia_hash = "92c362319514e5a6da26204961446caa3a8b32a8"
        malpedia_version = "20200529"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b942430510000 55 52 68???????? e8???????? }
            // n = 5, score = 200
            //   8b942430510000       | mov                 edx, dword ptr [esp + 0x5130]
            //   55                   | push                ebp
            //   52                   | push                edx
            //   68????????           |                     
            //   e8????????           |                     

        $sequence_1 = { 8b4c2462 51 ff15???????? 25ffff0000 89442420 8b4c2414 }
            // n = 6, score = 200
            //   8b4c2462             | mov                 ecx, dword ptr [esp + 0x62]
            //   51                   | push                ecx
            //   ff15????????         |                     
            //   25ffff0000           | and                 eax, 0xffff
            //   89442420             | mov                 dword ptr [esp + 0x20], eax
            //   8b4c2414             | mov                 ecx, dword ptr [esp + 0x14]

        $sequence_2 = { 8b4604 83c604 85c0 75cc 85db 7456 }
            // n = 6, score = 200
            //   8b4604               | mov                 eax, dword ptr [esi + 4]
            //   83c604               | add                 esi, 4
            //   85c0                 | test                eax, eax
            //   75cc                 | jne                 0xffffffce
            //   85db                 | test                ebx, ebx
            //   7456                 | je                  0x58

        $sequence_3 = { 0f8e6cfeffff 8bcd 8db434eca20000 8bc1 }
            // n = 4, score = 200
            //   0f8e6cfeffff         | jle                 0xfffffe72
            //   8bcd                 | mov                 ecx, ebp
            //   8db434eca20000       | lea                 esi, [esp + esi + 0xa2ec]
            //   8bc1                 | mov                 eax, ecx

        $sequence_4 = { 50 55 e8???????? 83c40c eb0a 50 }
            // n = 6, score = 200
            //   50                   | push                eax
            //   55                   | push                ebp
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   eb0a                 | jmp                 0xc
            //   50                   | push                eax

        $sequence_5 = { 72f4 3bc2 7512 899c24f0010000 c78424e801000002000000 8d442458 8d8c24e4000000 }
            // n = 7, score = 200
            //   72f4                 | jb                  0xfffffff6
            //   3bc2                 | cmp                 eax, edx
            //   7512                 | jne                 0x14
            //   899c24f0010000       | mov                 dword ptr [esp + 0x1f0], ebx
            //   c78424e801000002000000     | mov    dword ptr [esp + 0x1e8], 2
            //   8d442458             | lea                 eax, [esp + 0x58]
            //   8d8c24e4000000       | lea                 ecx, [esp + 0xe4]

        $sequence_6 = { 68???????? e8???????? 83c404 8d442420 8d4c2418 895c2418 50 }
            // n = 7, score = 200
            //   68????????           |                     
            //   e8????????           |                     
            //   83c404               | add                 esp, 4
            //   8d442420             | lea                 eax, [esp + 0x20]
            //   8d4c2418             | lea                 ecx, [esp + 0x18]
            //   895c2418             | mov                 dword ptr [esp + 0x18], ebx
            //   50                   | push                eax

        $sequence_7 = { 8d542438 51 52 50 68???????? 03f0 2be8 }
            // n = 7, score = 200
            //   8d542438             | lea                 edx, [esp + 0x38]
            //   51                   | push                ecx
            //   52                   | push                edx
            //   50                   | push                eax
            //   68????????           |                     
            //   03f0                 | add                 esi, eax
            //   2be8                 | sub                 ebp, eax

        $sequence_8 = { e8???????? a1???????? 50 e8???????? 83c40c 68???????? e8???????? }
            // n = 7, score = 200
            //   e8????????           |                     
            //   a1????????           |                     
            //   50                   | push                eax
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   68????????           |                     
            //   e8????????           |                     

        $sequence_9 = { e8???????? 8be8 8b4710 6a28 }
            // n = 4, score = 200
            //   e8????????           |                     
            //   8be8                 | mov                 ebp, eax
            //   8b4710               | mov                 eax, dword ptr [edi + 0x10]
            //   6a28                 | push                0x28

    condition:
        7 of them and filesize < 114688
}
Download all Yara Rules