SYMBOLCOMMON_NAMEaka. SYNONYMS
win.hyperssl (Back to overview)

HyperSSL

aka: FOCUSFJORD, Soldier, Sysupdate

Actor(s): Emissary Panda


Sideloader used by EmissaryPanda

References
2021-04-29ESET ResearchRobert Lipovsky, Matthieu Faou, Tony Anscombe, Andy Garth, Daniel Chromek
@techreport{lipovsky:20210429:eset:ff67b6c, author = {Robert Lipovsky and Matthieu Faou and Tony Anscombe and Andy Garth and Daniel Chromek}, title = {{ESET Industry Report on Government: Targeted but not alone}}, date = {2021-04-29}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2021/04/ESET_Industry_Report_Government.pdf}, language = {English}, urldate = {2021-05-03} } ESET Industry Report on Government: Targeted but not alone
Exaramel Crutch Exaramel HyperBro HyperSSL InvisiMole XDSpy
2021-04-09Trend MicroDaniel Lunghi, Kenney Lu
@online{lunghi:20210409:iron:402e62f, author = {Daniel Lunghi and Kenney Lu}, title = {{Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware}}, date = {2021-04-09}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/21/d/iron-tiger-apt-updates-toolkit-with-evolved-sysupdate-malware-va.html}, language = {English}, urldate = {2021-04-09} } Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware
HyperBro HyperSSL
2020-09-30Team CymruJames Shank, Jacomo Piccolini
@techreport{shank:20200930:pandamic:f210107, author = {James Shank and Jacomo Piccolini}, title = {{Pandamic: Emissary Pandas in the Middle East}}, date = {2020-09-30}, institution = {Team Cymru}, url = {https://vblocalhost.com/uploads/VB2020-Shank-Piccolini.pdf}, language = {English}, urldate = {2021-04-16} } Pandamic: Emissary Pandas in the Middle East
HyperBro HyperSSL
2020-01FireEyeTom Hall, Mitchell Clarke, Mandiant
@techreport{hall:202001:mandiant:25e38ef, author = {Tom Hall and Mitchell Clarke and Mandiant}, title = {{Mandiant IR Grab Bag of Attacker Activity}}, date = {2020-01}, institution = {FireEye}, url = {https://web.archive.org/web/20200307113010/https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1574947864.pdf}, language = {English}, urldate = {2021-04-16} } Mandiant IR Grab Bag of Attacker Activity
TwoFace CHINACHOPPER HyperBro HyperSSL
2019-07-21One Night in NorfolkKevin Perlow
@online{perlow:20190721:emissary:dbd4bd3, author = {Kevin Perlow}, title = {{Emissary Panda DLL Backdoor}}, date = {2019-07-21}, organization = {One Night in Norfolk}, url = {https://norfolkinfosec.com/emissary-panda-dll-backdoor/}, language = {English}, urldate = {2021-04-16} } Emissary Panda DLL Backdoor
HyperSSL
2019-06-13ae CERTae CERT
@online{cert:20190613:advanced:5d2e200, author = {ae CERT}, title = {{Advanced Notification of Cyber Threats against Family of Malware Giving Remote Access to Computers}}, date = {2019-06-13}, organization = {ae CERT}, url = {https://www.tra.gov.ae/assets/mTP39Tp6.pdf.aspx}, language = {English}, urldate = {2021-04-16} } Advanced Notification of Cyber Threats against Family of Malware Giving Remote Access to Computers
HyperBro HyperSSL
2019-05-28Palo Alto Networks Unit 42Robert Falcone, Tom Lancaster
@online{falcone:20190528:emissary:dc0f942, author = {Robert Falcone and Tom Lancaster}, title = {{Emissary Panda Attacks Middle East Government Sharepoint Servers}}, date = {2019-05-28}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/}, language = {English}, urldate = {2021-04-16} } Emissary Panda Attacks Middle East Government Sharepoint Servers
CHINACHOPPER HyperSSL
Yara Rules
[TLP:WHITE] win_hyperssl_auto (20201023 | autogenerated rule brought to you by yara-signator)
rule win_hyperssl_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-12-22"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.hyperssl"
        malpedia_rule_date = "20201222"
        malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130"
        malpedia_version = "20201023"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 40 4f 75f2 5f 5e e9???????? }
            // n = 6, score = 200
            //   40                   | inc                 eax
            //   4f                   | dec                 edi
            //   75f2                 | jne                 0xfffffff4
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   e9????????           |                     

        $sequence_1 = { 5d c20c00 6a00 ff15???????? c3 }
            // n = 5, score = 200
            //   5d                   | pop                 ebp
            //   c20c00               | ret                 0xc
            //   6a00                 | push                0
            //   ff15????????         |                     
            //   c3                   | ret                 

        $sequence_2 = { 8b413c 03c1 742a 8b4028 03c1 }
            // n = 5, score = 200
            //   8b413c               | mov                 eax, dword ptr [ecx + 0x3c]
            //   03c1                 | add                 eax, ecx
            //   742a                 | je                  0x2c
            //   8b4028               | mov                 eax, dword ptr [eax + 0x28]
            //   03c1                 | add                 eax, ecx

        $sequence_3 = { 301401 8a10 301406 40 4f 75f2 }
            // n = 6, score = 200
            //   301401               | xor                 byte ptr [ecx + eax], dl
            //   8a10                 | mov                 dl, byte ptr [eax]
            //   301406               | xor                 byte ptr [esi + eax], dl
            //   40                   | inc                 eax
            //   4f                   | dec                 edi
            //   75f2                 | jne                 0xfffffff4

        $sequence_4 = { 03c1 7423 56 57 b9???????? be???????? }
            // n = 6, score = 200
            //   03c1                 | add                 eax, ecx
            //   7423                 | je                  0x25
            //   56                   | push                esi
            //   57                   | push                edi
            //   b9????????           |                     
            //   be????????           |                     

        $sequence_5 = { 8bc8 85c9 7436 8b413c 03c1 742a 8b4028 }
            // n = 7, score = 200
            //   8bc8                 | mov                 ecx, eax
            //   85c9                 | test                ecx, ecx
            //   7436                 | je                  0x38
            //   8b413c               | mov                 eax, dword ptr [ecx + 0x3c]
            //   03c1                 | add                 eax, ecx
            //   742a                 | je                  0x2c
            //   8b4028               | mov                 eax, dword ptr [eax + 0x28]

        $sequence_6 = { 8b413c 03c1 742a 8b4028 03c1 7423 }
            // n = 6, score = 200
            //   8b413c               | mov                 eax, dword ptr [ecx + 0x3c]
            //   03c1                 | add                 eax, ecx
            //   742a                 | je                  0x2c
            //   8b4028               | mov                 eax, dword ptr [eax + 0x28]
            //   03c1                 | add                 eax, ecx
            //   7423                 | je                  0x25

        $sequence_7 = { 301406 40 4f 75f2 5f 5e e9???????? }
            // n = 7, score = 200
            //   301406               | xor                 byte ptr [esi + eax], dl
            //   40                   | inc                 eax
            //   4f                   | dec                 edi
            //   75f2                 | jne                 0xfffffff4
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   e9????????           |                     

        $sequence_8 = { 75f2 5f 5e e9???????? }
            // n = 4, score = 200
            //   75f2                 | jne                 0xfffffff4
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   e9????????           |                     

        $sequence_9 = { e8???????? 59 5d c20c00 6a00 ff15???????? }
            // n = 6, score = 200
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   5d                   | pop                 ebp
            //   c20c00               | ret                 0xc
            //   6a00                 | push                0
            //   ff15????????         |                     

    condition:
        7 of them and filesize < 167936
}
Download all Yara Rules