SYMBOLCOMMON_NAMEaka. SYNONYMS
win.isfb (Back to overview)

ISFB

aka: Gozi ISFB, IAP, Pandemyia

Actor(s): GOLD CABIN

URLhaus                      

2006 Gozi v1.0, Gozi CRM, CRM, Papras
2010 Gozi v2.0, Gozi ISFB, ISFB, Pandemyia(*)

In September 2010, the source code of a particular Gozi CRM dll version was leaked. This led to two main branches: one became known as Gozi Prinimalka, which was merge with Pony and became Vawtrak/Neverquest.

The other branch became known as Gozi ISFB, or ISFB in short. Webinject functionality was added to this version.

There is one panel which often was used in combination with ISFB: IAP. The panel's login page comes with the title 'Login - IAP'. The body contains 'AUTHORIZATION', 'Name:', 'Password:' and a single button 'Sign in' in a minimal design. Often, the panel is directly accessible by entering the C2 IP address in a browser. But there are ISFB versions which are not directly using IAP. The bot accesses a gate, which is called the 'Dreambot' gate. See win.dreambot for further information.

ISFB often was protected by Rovnix. This led to a further complication in the naming scheme - many companies started to call ISFB Rovnix. Because the signatures started to look for Rovnix, other trojans protected by Rovnix (in particular ReactorBot and Rerdom) sometimes got wrongly labelled.

In April 2016 a combination of Gozi ISFB and Nymaim was detected. This breed became known as GozNym. The merge uses a shellcode-like version of Gozi ISFB, that needs Nymaim to run. The C2 communication is performed by Nymaim.

See win.gozi for additional historical information.

References
2023-07-31ProofpointKelsey Merriman, Pim Trouerbach
@online{merriman:20230731:out:7b1b646, author = {Kelsey Merriman and Pim Trouerbach}, title = {{Out of the Sandbox: WikiLoader Digs Sophisticated Evasion}}, date = {2023-07-31}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/blog/threat-insight/out-sandbox-wikiloader-digs-sophisticated-evasion}, language = {English}, urldate = {2023-08-08} } Out of the Sandbox: WikiLoader Digs Sophisticated Evasion
ISFB WikiLoader
2023-07-18Kostas TSKostas
@online{kostas:20230718:ursnif:294f10f, author = {Kostas}, title = {{Ursnif VS Italy: Il PDF del Destino}}, date = {2023-07-18}, organization = {Kostas TS}, url = {https://kostas-ts.medium.com/ursnif-vs-italy-il-pdf-del-destino-5c83d6281072}, language = {English}, urldate = {2023-07-20} } Ursnif VS Italy: Il PDF del Destino
Gozi ISFB Snifula
2023-07-11SpamhausSpamhaus Malware Labs
@techreport{labs:20230711:spamhaus:4e2885e, author = {Spamhaus Malware Labs}, title = {{Spamhaus Botnet Threat Update Q2 2023}}, date = {2023-07-11}, institution = {Spamhaus}, url = {https://info.spamhaus.com/hubfs/Botnet%20Reports/2023%20Q2%20Botnet%20Threat%20Update.pdf}, language = {English}, urldate = {2023-07-22} } Spamhaus Botnet Threat Update Q2 2023
Hydra AsyncRAT Aurora Stealer Ave Maria BumbleBee Cobalt Strike DCRat Havoc IcedID ISFB NjRAT QakBot Quasar RAT RecordBreaker RedLine Stealer Remcos Rhadamanthys Sliver Tofsee
2023-05-10BridewellBridewell
@online{bridewell:20230510:hunting:461fdf0, author = {Bridewell}, title = {{Hunting for Ursnif}}, date = {2023-05-10}, organization = {Bridewell}, url = {https://www.bridewell.com/insights/news/detail/hunting-for-ursnif}, language = {English}, urldate = {2023-05-15} } Hunting for Ursnif
ISFB Royal Ransom
2023-04-12SpamhausSpamhaus Malware Labs
@techreport{labs:20230412:spamhaus:aa309d1, author = {Spamhaus Malware Labs}, title = {{Spamhaus Botnet Threat Update Q1 2023}}, date = {2023-04-12}, institution = {Spamhaus}, url = {https://info.spamhaus.com/hubfs/Botnet%20Reports/2023%20Q1%20Botnet%20Threat%20Update.pdf}, language = {English}, urldate = {2023-04-18} } Spamhaus Botnet Threat Update Q1 2023
FluBot Amadey AsyncRAT Aurora Ave Maria BumbleBee Cobalt Strike DCRat Emotet IcedID ISFB NjRAT QakBot RecordBreaker RedLine Stealer Remcos Rhadamanthys Sliver Tofsee Vidar
2023-03-30eSentireeSentire Threat Response Unit (TRU)
@online{tru:20230330:esentire:e789d22, author = {eSentire Threat Response Unit (TRU)}, title = {{eSentire Threat Intelligence Malware Analysis: BatLoader}}, date = {2023-03-30}, organization = {eSentire}, url = {https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-batloader}, language = {English}, urldate = {2023-07-31} } eSentire Threat Intelligence Malware Analysis: BatLoader
BATLOADER Cobalt Strike ISFB SystemBC Vidar
2023-03-190xToxin Labs@0xToxin
@online{0xtoxin:20230319:gozi:bb7bade, author = {@0xToxin}, title = {{Gozi - Italian ShellCode Dance}}, date = {2023-03-19}, organization = {0xToxin Labs}, url = {https://0xtoxin.github.io/threat%20breakdown/Gozi-Italy-Campaign/}, language = {English}, urldate = {2023-05-17} } Gozi - Italian ShellCode Dance
Gozi ISFB
2023-03-09eSentireeSentire Threat Response Unit (TRU)
@online{tru:20230309:batloader:db50046, author = {eSentire Threat Response Unit (TRU)}, title = {{BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif}}, date = {2023-03-09}, organization = {eSentire}, url = {https://www.esentire.com/blog/batloader-continues-to-abuse-google-search-ads-to-deliver-vidar-stealer-and-ursnif}, language = {English}, urldate = {2023-04-25} } BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif
BATLOADER ISFB Vidar
2023-02-27PRODAFT Threat IntelligencePRODAFT
@techreport{prodaft:20230227:rig:72076aa, author = {PRODAFT}, title = {{RIG Exploit Kit: In-Depth Analysis}}, date = {2023-02-27}, institution = {PRODAFT Threat Intelligence}, url = {https://www.prodaft.com/m/reports/RIG___TLP_CLEAR-1.pdf}, language = {English}, urldate = {2023-05-08} } RIG Exploit Kit: In-Depth Analysis
Dridex IcedID ISFB PureCrypter Raccoon RecordBreaker RedLine Stealer Royal Ransom Silence SmokeLoader Zloader
2023-02-08NTT SecurityRyu Hiyoshi
@online{hiyoshi:20230208:steelclover:0f3b85a, author = {Ryu Hiyoshi}, title = {{SteelClover Attacks Distributing Malware Via Google Ads Increased}}, date = {2023-02-08}, organization = {NTT Security}, url = {https://insight-jp.nttsecurity.com/post/102i7af/steelclovergoogle}, language = {English}, urldate = {2023-02-13} } SteelClover Attacks Distributing Malware Via Google Ads Increased
BATLOADER ISFB RedLine Stealer
2023-01-09The DFIR ReportThe DFIR Report
@online{report:20230109:unwrapping:d36b45f, author = {The DFIR Report}, title = {{Unwrapping Ursnifs Gifts}}, date = {2023-01-09}, organization = {The DFIR Report}, url = {https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/}, language = {English}, urldate = {2023-01-13} } Unwrapping Ursnifs Gifts
ISFB
2022-10-24Medium CSIS TechblogBenoît Ancel
@online{ancel:20221024:chapter:c870465, author = {Benoît Ancel}, title = {{Chapter 1 — From Gozi to ISFB: The history of a mythical malware family.}}, date = {2022-10-24}, organization = {Medium CSIS Techblog}, url = {https://medium.com/csis-techblog/chapter-1-from-gozi-to-isfb-the-history-of-a-mythical-malware-family-82e592577fef}, language = {English}, urldate = {2023-05-02} } Chapter 1 — From Gozi to ISFB: The history of a mythical malware family.
Gozi ISFB Snifula
2022-08-08Medium CSIS TechblogBenoît Ancel
@online{ancel:20220808:inside:67ef9a0, author = {Benoît Ancel}, title = {{An inside view of domain anonymization as-a-service — the BraZZZerSFF infrastructure}}, date = {2022-08-08}, organization = {Medium CSIS Techblog}, url = {https://medium.com/csis-techblog/inside-view-of-brazzzersff-infrastructure-89b9188fd145}, language = {English}, urldate = {2022-08-28} } An inside view of domain anonymization as-a-service — the BraZZZerSFF infrastructure
Riltok magecart Anubis Azorult BetaBot Buer CoalaBot CryptBot DiamondFox DreamBot GCleaner ISFB Loki Password Stealer (PWS) MedusaLocker MeguminTrojan Nemty PsiX RedLine Stealer SmokeLoader STOP TinyNuke Vidar Zloader
2022-06-24Group-IBAlbert Priego
@online{priego:20220624:we:0ed77e2, author = {Albert Priego}, title = {{We see you, Gozi Hunting the latest TTPs used for delivering the Trojan}}, date = {2022-06-24}, organization = {Group-IB}, url = {https://blog.group-ib.com/gozi-latest-ttps}, language = {English}, urldate = {2022-08-17} } We see you, Gozi Hunting the latest TTPs used for delivering the Trojan
ISFB
2022-06-07McAfeeJyothi Naveen, Kiran Raj
@online{naveen:20220607:phishing:704f5f7, author = {Jyothi Naveen and Kiran Raj}, title = {{Phishing Campaigns featuring Ursnif Trojan on the Rise}}, date = {2022-06-07}, organization = {McAfee}, url = {https://www.mcafee.com/blogs/other-blogs/mcafee-labs/phishing-campaigns-featuring-ursnif-trojan/}, language = {English}, urldate = {2022-06-15} } Phishing Campaigns featuring Ursnif Trojan on the Rise
ISFB
2022-05-19IBMCharlotte Hammond, Ole Villadsen, Golo Mühr
@online{hammond:20220519:itg23:eab10e2, author = {Charlotte Hammond and Ole Villadsen and Golo Mühr}, title = {{ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups}}, date = {2022-05-19}, organization = {IBM}, url = {https://securityintelligence.com/posts/itg23-crypters-cooperation-between-cybercriminal-groups/}, language = {English}, urldate = {2022-05-25} } ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups
IcedID ISFB Mount Locker
2022-05-09MicrosoftMicrosoft 365 Defender Threat Intelligence Team, Microsoft Threat Intelligence Center (MSTIC)
@online{team:20220509:ransomwareasaservice:13ec472, author = {Microsoft 365 Defender Threat Intelligence Team and Microsoft Threat Intelligence Center (MSTIC)}, title = {{Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself}}, date = {2022-05-09}, organization = {Microsoft}, url = {https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself}, language = {English}, urldate = {2022-05-17} } Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself
AnchorDNS BlackCat BlackMatter Conti DarkSide HelloKitty Hive LockBit REvil FAKEUPDATES Griffon ATOMSILO BazarBackdoor BlackCat BlackMatter Blister Cobalt Strike Conti DarkSide Emotet FiveHands Gozi HelloKitty Hive IcedID ISFB JSSLoader LockBit LockFile Maze NightSky Pandora Phobos Phoenix Locker PhotoLoader QakBot REvil Rook Ryuk SystemBC TrickBot WastedLocker BRONZE STARLIGHT
2022-05-08QualysAmit Gadhave
@online{gadhave:20220508:ursnif:4e8605b, author = {Amit Gadhave}, title = {{Ursnif Malware Banks on News Events for Phishing Attacks}}, date = {2022-05-08}, organization = {Qualys}, url = {https://blog.qualys.com/vulnerabilities-threat-research/2022/05/08/ursnif-malware-banks-on-news-events-for-phishing-attacks}, language = {English}, urldate = {2022-05-17} } Ursnif Malware Banks on News Events for Phishing Attacks
ISFB
2022-04-14Avast DecodedVladimir Martyanov
@online{martyanov:20220414:zloader:23c520a, author = {Vladimir Martyanov}, title = {{Zloader 2: The Silent Night}}, date = {2022-04-14}, organization = {Avast Decoded}, url = {https://decoded.avast.io/vladimirmartyanov/zloader-the-silent-night/}, language = {English}, urldate = {2022-04-15} } Zloader 2: The Silent Night
ISFB Raccoon Zloader
2022-01-11Medium walmartglobaltechJason Reaves, Joshua Platt
@online{reaves:20220111:signed:0f32583, author = {Jason Reaves and Joshua Platt}, title = {{Signed DLL campaigns as a service}}, date = {2022-01-11}, organization = {Medium walmartglobaltech}, url = {https://medium.com/walmartglobaltech/signed-dll-campaigns-as-a-service-7760ac676489}, language = {English}, urldate = {2023-01-31} } Signed DLL campaigns as a service
BATLOADER Cobalt Strike ISFB Zloader
2021-10-25CleafyCleafy
@online{cleafy:20211025:digital:48fbdf8, author = {Cleafy}, title = {{Digital banking fraud: how the Gozi malware works}}, date = {2021-10-25}, organization = {Cleafy}, url = {https://www.cleafy.com/cleafy-labs/digital-banking-fraud-how-the-gozi-malware-work}, language = {English}, urldate = {2021-11-02} } Digital banking fraud: how the Gozi malware works
ISFB
2021-09-29ProofpointSelena Larson, Proofpoint Staff
@online{larson:20210929:ta544:ab2f0d3, author = {Selena Larson and Proofpoint Staff}, title = {{TA544 Targets Italian Organizations with Ursnif Malware}}, date = {2021-09-29}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/blog/security-briefs/ta544-targets-italian-organizations-ursnif-malware}, language = {English}, urldate = {2021-10-11} } TA544 Targets Italian Organizations with Ursnif Malware
ISFB
2021-09-03Trend MicroMohamad Mokbel
@techreport{mokbel:20210903:state:df86499, author = {Mohamad Mokbel}, title = {{The State of SSL/TLS Certificate Usage in Malware C&C Communications}}, date = {2021-09-03}, institution = {Trend Micro}, url = {https://www.trendmicro.com/content/dam/trendmicro/global/en/research/21/i/ssl-tls-technical-brief/ssl-tls-technical-brief.pdf}, language = {English}, urldate = {2021-09-19} } The State of SSL/TLS Certificate Usage in Malware C&C Communications
AdWind ostap AsyncRAT BazarBackdoor BitRAT Buer Chthonic CloudEyE Cobalt Strike DCRat Dridex FindPOS GootKit Gozi IcedID ISFB Nanocore RAT Orcus RAT PandaBanker Qadars QakBot Quasar RAT Rockloader ServHelper Shifu SManager TorrentLocker TrickBot Vawtrak Zeus Zloader
2021-07-30HPPatrick Schläpfer
@online{schlpfer:20210730:detecting:2291323, author = {Patrick Schläpfer}, title = {{Detecting TA551 domains}}, date = {2021-07-30}, organization = {HP}, url = {https://threatresearch.ext.hp.com/detecting-ta551-domains/}, language = {English}, urldate = {2021-08-02} } Detecting TA551 domains
Valak Dridex IcedID ISFB QakBot
2021-06-30The RecordCatalin Cimpanu
@online{cimpanu:20210630:gozi:8760ba7, author = {Catalin Cimpanu}, title = {{Gozi malware gang member arrested in Colombia}}, date = {2021-06-30}, organization = {The Record}, url = {https://therecord.media/gozi-malware-gang-member-arrested-in-colombia/}, language = {English}, urldate = {2021-07-02} } Gozi malware gang member arrested in Colombia
Gozi ISFB
2021-06-23IBMItzik Chimino
@online{chimino:20210623:ursnif:700b0a7, author = {Itzik Chimino}, title = {{Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy}}, date = {2021-06-23}, organization = {IBM}, url = {https://securityintelligence.com/posts/ursnif-cerberus-android-malware-bank-transfers-italy/}, language = {English}, urldate = {2021-06-24} } Ursnif Leverages Cerberus to Automate Fraudulent Bank Transfers in Italy
ISFB
2021-05-26DeepInstinctRon Ben Yizhak
@online{yizhak:20210526:deep:c123a19, author = {Ron Ben Yizhak}, title = {{A Deep Dive into Packing Software CryptOne}}, date = {2021-05-26}, organization = {DeepInstinct}, url = {https://www.deepinstinct.com/2021/05/26/deep-dive-packing-software-cryptone/}, language = {English}, urldate = {2021-06-22} } A Deep Dive into Packing Software CryptOne
Cobalt Strike Dridex Emotet Gozi ISFB Mailto QakBot SmokeLoader WastedLocker Zloader
2021-05-10Mal-Eatsmal_eats
@online{maleats:20210510:overview:50ff3b3, author = {mal_eats}, title = {{Overview of Campo, a new attack campaign targeting Japan}}, date = {2021-05-10}, organization = {Mal-Eats}, url = {https://mal-eats.net/2021/05/10/campo_new_attack_campaign_targeting_japan/}, language = {English}, urldate = {2021-05-13} } Overview of Campo, a new attack campaign targeting Japan
AnchorDNS BazarBackdoor Cobalt Strike ISFB Phobos TrickBot Zloader
2021-05-04NCC Groupfumik0, NCC RIFT
@online{fumik0:20210504:rm3:cd994e6, author = {fumik0 and NCC RIFT}, title = {{RM3 – Curiosities of the wildest banking malware}}, date = {2021-05-04}, organization = {NCC Group}, url = {https://research.nccgroup.com/2021/05/04/rm3-curiosities-of-the-wildest-banking-malware/}, language = {English}, urldate = {2021-05-19} } RM3 – Curiosities of the wildest banking malware
ISFB RM3
2021-05-04Fox-ITfumik0, the RIFT Team, Fox IT
@online{fumik0:20210504:rm3:41d6969, author = {fumik0 and the RIFT Team and Fox IT}, title = {{RM3 – Curiosities of the wildest banking malware}}, date = {2021-05-04}, organization = {Fox-IT}, url = {https://blog.fox-it.com/2021/05/04/rm3-curiosities-of-the-wildest-banking-malware/}, language = {English}, urldate = {2021-05-04} } RM3 – Curiosities of the wildest banking malware
ISFB
2021-04-12PTSecurityPTSecurity
@online{ptsecurity:20210412:paas:1d06836, author = {PTSecurity}, title = {{PaaS, or how hackers evade antivirus software}}, date = {2021-04-12}, organization = {PTSecurity}, url = {https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/paas-or-how-hackers-evade-antivirus-software/}, language = {English}, urldate = {2021-04-12} } PaaS, or how hackers evade antivirus software
Amadey Bunitu Cerber Dridex ISFB KPOT Stealer Mailto Nemty Phobos Pony Predator The Thief QakBot Raccoon RTM SmokeLoader Zloader
2021-04-06Intel 471Intel 471
@online{471:20210406:ettersilent:b591f59, author = {Intel 471}, title = {{EtterSilent: the underground’s new favorite maldoc builder}}, date = {2021-04-06}, organization = {Intel 471}, url = {https://intel471.com/blog/ettersilent-maldoc-builder-macro-trickbot-qbot/}, language = {English}, urldate = {2021-04-06} } EtterSilent: the underground’s new favorite maldoc builder
BazarBackdoor ISFB QakBot TrickBot
2021-02-03ZDNetCharlie Osborne
@online{osborne:20210203:ursnif:936317a, author = {Charlie Osborne}, title = {{Ursnif Trojan has targeted over 100 Italian banks}}, date = {2021-02-03}, organization = {ZDNet}, url = {https://www.zdnet.com/article/ursnif-trojan-has-targeted-over-100-italian-banks/}, language = {English}, urldate = {2021-06-29} } Ursnif Trojan has targeted over 100 Italian banks
ISFB Snifula
2021-01-12FortinetXiaopeng Zhang
@online{zhang:20210112:new:bdf3ebb, author = {Xiaopeng Zhang}, title = {{New Variant of Ursnif Continuously Targeting Italy}}, date = {2021-01-12}, organization = {Fortinet}, url = {https://www.fortinet.com/blog/threat-research/new-variant-of-ursnif-continuously-targeting-italy}, language = {English}, urldate = {2021-01-18} } New Variant of Ursnif Continuously Targeting Italy
ISFB
2021-01-09Marco Ramilli's BlogMarco Ramilli
@online{ramilli:20210109:command:d720b27, author = {Marco Ramilli}, title = {{Command and Control Traffic Patterns}}, date = {2021-01-09}, organization = {Marco Ramilli's Blog}, url = {https://marcoramilli.com/2021/01/09/c2-traffic-patterns-personal-notes/}, language = {English}, urldate = {2021-05-17} } Command and Control Traffic Patterns
ostap LaZagne Agent Tesla Azorult Buer Cobalt Strike DanaBot DarkComet Dridex Emotet Formbook IcedID ISFB NetWire RC PlugX Quasar RAT SmokeLoader TrickBot
2021-01-080xC0DECAFEThomas Barabosch
@online{barabosch:20210108:malware:27c7ee2, author = {Thomas Barabosch}, title = {{The malware analyst’s guide to aPLib decompression}}, date = {2021-01-08}, organization = {0xC0DECAFE}, url = {https://0xc0decafe.com/malware-analysts-guide-to-aplib-decompression/}, language = {English}, urldate = {2021-01-11} } The malware analyst’s guide to aPLib decompression
ISFB Rovnix
2020-11-27malware.loveRobert Giczewski
@online{giczewski:20201127:having:7cd6ae8, author = {Robert Giczewski}, title = {{Having fun with a Ursnif VBS dropper}}, date = {2020-11-27}, organization = {malware.love}, url = {https://malware.love/malware_analysis/reverse_engineering/2020/11/27/analyzing-a-vbs-dropper.html}, language = {English}, urldate = {2020-12-01} } Having fun with a Ursnif VBS dropper
ISFB Snifula
2020-11-26CybereasonLior Rochberger, Cybereason Nocturnus
@online{rochberger:20201126:cybereason:8301aeb, author = {Lior Rochberger and Cybereason Nocturnus}, title = {{Cybereason vs. Egregor Ransomware}}, date = {2020-11-26}, organization = {Cybereason}, url = {https://www.cybereason.com/blog/cybereason-vs-egregor-ransomware}, language = {English}, urldate = {2020-12-08} } Cybereason vs. Egregor Ransomware
Cobalt Strike Egregor IcedID ISFB QakBot
2020-10-29CERT-FRCERT-FR
@techreport{certfr:20201029:le:d296223, author = {CERT-FR}, title = {{LE MALWARE-AS-A-SERVICE EMOTET}}, date = {2020-10-29}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-010.pdf}, language = {English}, urldate = {2020-11-04} } LE MALWARE-AS-A-SERVICE EMOTET
Dridex Emotet ISFB QakBot
2020-10-15Department of JusticeDepartment of Justice
@online{justice:20201015:officials:b340951, author = {Department of Justice}, title = {{Officials Announce International Operation Targeting Transnational Criminal Organization QQAAZZ that Provided Money Laundering Services to High-Level Cybercriminals}}, date = {2020-10-15}, organization = {Department of Justice}, url = {https://www.justice.gov/opa/pr/officials-announce-international-operation-targeting-transnational-criminal-organization}, language = {English}, urldate = {2020-10-23} } Officials Announce International Operation Targeting Transnational Criminal Organization QQAAZZ that Provided Money Laundering Services to High-Level Cybercriminals
Dridex ISFB TrickBot
2020-09-02Cisco TalosHolger Unterbrink, Edmund Brumaghin
@online{unterbrink:20200902:salfram:74ae3c9, author = {Holger Unterbrink and Edmund Brumaghin}, title = {{Salfram: Robbing the place without removing your name tag}}, date = {2020-09-02}, organization = {Cisco Talos}, url = {https://blog.talosintelligence.com/2020/09/salfram-robbing-place-without-removing.html}, language = {English}, urldate = {2020-09-03} } Salfram: Robbing the place without removing your name tag
Ave Maria ISFB SmokeLoader Zloader
2020-08-28CheckpointCheck Point Research
@online{research:20200828:gozi:944c005, author = {Check Point Research}, title = {{Gozi: The Malware with a Thousand Faces}}, date = {2020-08-28}, organization = {Checkpoint}, url = {https://research.checkpoint.com/2020/gozi-the-malware-with-a-thousand-faces/}, language = {English}, urldate = {2020-09-01} } Gozi: The Malware with a Thousand Faces
DreamBot ISFB LOLSnif SaiGon
2020-08TG SoftTG Soft
@online{soft:202008:tg:88b671c, author = {TG Soft}, title = {{TG Soft Cyber - Threat Report}}, date = {2020-08}, organization = {TG Soft}, url = {https://www.tgsoft.it/files/report/download.asp?id=7481257469}, language = {Italian}, urldate = {2020-09-15} } TG Soft Cyber - Threat Report
DarkComet Darktrack RAT Emotet ISFB
2020-07-30SpamhausSpamhaus Malware Labs
@techreport{labs:20200730:spamhaus:038546d, author = {Spamhaus Malware Labs}, title = {{Spamhaus Botnet Threat Update Q2 2020}}, date = {2020-07-30}, institution = {Spamhaus}, url = {https://www.spamhaus.org/news/images/botnet-report-2020-q2/2020-q2-spamhaus-botnet-threat-report.pdf}, language = {English}, urldate = {2020-07-30} } Spamhaus Botnet Threat Update Q2 2020
AdWind Agent Tesla Arkei Stealer AsyncRAT Ave Maria Azorult DanaBot Emotet IcedID ISFB KPOT Stealer Loki Password Stealer (PWS) Nanocore RAT NetWire RC NjRAT Pony Raccoon RedLine Stealer Remcos Zloader
2020-07-29ESET Researchwelivesecurity
@techreport{welivesecurity:20200729:threat:496355c, author = {welivesecurity}, title = {{THREAT REPORT Q2 2020}}, date = {2020-07-29}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2020/07/ESET_Threat_Report_Q22020.pdf}, language = {English}, urldate = {2020-07-30} } THREAT REPORT Q2 2020
DEFENSOR ID HiddenAd Bundlore Pirrit Agent.BTZ Cerber ClipBanker CROSSWALK Cryptowall CTB Locker DanaBot Dharma Formbook Gandcrab Grandoreiro Houdini ISFB LockBit Locky Mailto Maze Microcin Nemty NjRAT Phobos PlugX Pony REvil Socelars STOP Tinba TrickBot WannaCryptor
2020-07-23DarktraceMax Heinemeyer
@online{heinemeyer:20200723:resurgence:75f36ef, author = {Max Heinemeyer}, title = {{The resurgence of the Ursnif banking trojan}}, date = {2020-07-23}, organization = {Darktrace}, url = {https://www.darktrace.com/en/blog/the-resurgence-of-the-ursnif-banking-trojan/}, language = {English}, urldate = {2021-06-29} } The resurgence of the Ursnif banking trojan
ISFB Snifula
2020-07-22SentinelOneJason Reaves, Joshua Platt
@online{reaves:20200722:enter:71d9038, author = {Jason Reaves and Joshua Platt}, title = {{Enter the Maze: Demystifying an Affiliate Involved in Maze (SNOW)}}, date = {2020-07-22}, organization = {SentinelOne}, url = {https://labs.sentinelone.com/enter-the-maze-demystifying-an-affiliate-involved-in-maze-snow/}, language = {English}, urldate = {2020-07-23} } Enter the Maze: Demystifying an Affiliate Involved in Maze (SNOW)
ISFB Maze TrickBot Zloader
2020-07-18HornetsecurityHornetsecurity Security Lab
@online{lab:20200718:firefox:4293555, author = {Hornetsecurity Security Lab}, title = {{Firefox Send sends Ursnif malware}}, date = {2020-07-18}, organization = {Hornetsecurity}, url = {https://www.hornetsecurity.com/en/security-information/firefox-send-sends-ursnif-malware/}, language = {English}, urldate = {2020-08-21} } Firefox Send sends Ursnif malware
ISFB
2020-07-17CERT-FRCERT-FR
@techreport{certfr:20200717:malware:5c58cdf, author = {CERT-FR}, title = {{The Malware Dridex: Origins and Uses}}, date = {2020-07-17}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-008.pdf}, language = {English}, urldate = {2020-07-20} } The Malware Dridex: Origins and Uses
Andromeda CryptoLocker Cutwail DoppelPaymer Dridex Emotet FriedEx Gameover P2P Gandcrab ISFB Murofet Necurs Predator The Thief Zeus
2020-07-01Cisco TalosNick Biasini, Edmund Brumaghin, Mariano Graziano
@online{biasini:20200701:threat:a726b7e, author = {Nick Biasini and Edmund Brumaghin and Mariano Graziano}, title = {{Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks}}, date = {2020-07-01}, organization = {Cisco Talos}, url = {https://blog.talosintelligence.com/2020/07/valak-emerges.html}, language = {English}, urldate = {2020-08-18} } Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks
Valak IcedID ISFB MyKings Spreader
2020-07-01TG SoftTG Soft
@online{soft:20200701:cyberthreat:45d22d9, author = {TG Soft}, title = {{Cyber-Threat Report on the cyber attacks of June 2020 in Italy}}, date = {2020-07-01}, organization = {TG Soft}, url = {https://www.tgsoft.it/files/report/download.asp?id=568531345}, language = {Italian}, urldate = {2020-07-30} } Cyber-Threat Report on the cyber attacks of June 2020 in Italy
Avaddon ISFB
2020-06-24MorphisecArnold Osipov
@online{osipov:20200624:obfuscated:74bfeed, author = {Arnold Osipov}, title = {{Obfuscated VBScript Drops Zloader, Ursnif, Qakbot, Dridex}}, date = {2020-06-24}, organization = {Morphisec}, url = {https://blog.morphisec.com/obfuscated-vbscript-drops-zloader-ursnif-qakbot-dridex}, language = {English}, urldate = {2020-06-25} } Obfuscated VBScript Drops Zloader, Ursnif, Qakbot, Dridex
Dridex ISFB QakBot Zloader
2020-06-23NCC GroupNikolaos Pantazopoulos, Stefano Antenucci, Michael Sandee
@online{pantazopoulos:20200623:wastedlocker:112d6b3, author = {Nikolaos Pantazopoulos and Stefano Antenucci and Michael Sandee}, title = {{WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group}}, date = {2020-06-23}, organization = {NCC Group}, url = {https://research.nccgroup.com/2020/06/23/wastedlocker-a-new-ransomware-variant-developed-by-the-evil-corp-group/}, language = {English}, urldate = {2020-06-23} } WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group
Cobalt Strike ISFB WastedLocker
2020-06-17Youtube (Red Canary)Erika Noerenberg, Matt Graeber, Adam Pennington, David Kaplan
@online{noerenberg:20200617:attck:934d73c, author = {Erika Noerenberg and Matt Graeber and Adam Pennington and David Kaplan}, title = {{ATT&CK® Deep Dive: Process Injection}}, date = {2020-06-17}, organization = {Youtube (Red Canary)}, url = {https://redcanary.com/resources/webinars/deep-dive-process-injection/}, language = {English}, urldate = {2020-06-19} } ATT&CK® Deep Dive: Process Injection
ISFB Ramnit TrickBot
2020-06-02Lastline LabsJames Haughom, Stefano Ortolani
@online{haughom:20200602:evolution:3286d87, author = {James Haughom and Stefano Ortolani}, title = {{Evolution of Excel 4.0 Macro Weaponization}}, date = {2020-06-02}, organization = {Lastline Labs}, url = {https://www.lastline.com/labsblog/evolution-of-excel-4-0-macro-weaponization/}, language = {English}, urldate = {2020-06-03} } Evolution of Excel 4.0 Macro Weaponization
Agent Tesla DanaBot ISFB TrickBot Zloader
2020-06-02MorphisecArnold Osipov
@online{osipov:20200602:ursnifgozi:2e20c85, author = {Arnold Osipov}, title = {{Ursnif/Gozi Delivery - Excel Macro 4.0 Utilization Uptick & OCR Bypass}}, date = {2020-06-02}, organization = {Morphisec}, url = {https://blog.morphisec.com/ursnif/gozi-delivery-excel-macro-4.0-utilization-uptick-ocr-bypass}, language = {English}, urldate = {2020-06-25} } Ursnif/Gozi Delivery - Excel Macro 4.0 Utilization Uptick & OCR Bypass
ISFB
2020-05-07Github (mlodic)Matteo Lodi
@online{lodi:20200507:ursnif:5654de4, author = {Matteo Lodi}, title = {{Ursnif beacon decryptor}}, date = {2020-05-07}, organization = {Github (mlodic)}, url = {https://github.com/mlodic/ursnif_beacon_decryptor}, language = {English}, urldate = {2020-05-07} } Ursnif beacon decryptor
Gozi ISFB
2020-03-30IntezerMichael Kajiloti
@online{kajiloti:20200330:fantastic:c01db60, author = {Michael Kajiloti}, title = {{Fantastic payloads and where we find them}}, date = {2020-03-30}, organization = {Intezer}, url = {https://intezer.com/blog/intezer-analyze/fantastic-payloads-and-where-we-find-them}, language = {English}, urldate = {2020-04-07} } Fantastic payloads and where we find them
Dridex Emotet ISFB TrickBot
2020-03-18ProofpointAxel F, Sam Scholten
@online{f:20200318:coronavirus:8fe12a3, author = {Axel F and Sam Scholten}, title = {{Coronavirus Threat Landscape Update}}, date = {2020-03-18}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/coronavirus-threat-landscape-update}, language = {English}, urldate = {2020-03-26} } Coronavirus Threat Landscape Update
Agent Tesla Get2 ISFB Remcos
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-07-24} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelDridex DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze MECHANICAL Necurs Nokki Outlook Backdoor Phobos Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot Vidar Winnti ANTHROPOID SPIDER APT23 APT31 APT39 APT40 BlackTech BuhTrap Charming Kitten CLOCKWORK SPIDER DOPPEL SPIDER FIN7 Gamaredon Group GOBLIN PANDA MONTY SPIDER MUSTANG PANDA NARWHAL SPIDER NOCTURNAL SPIDER PINCHY SPIDER SALTY SPIDER SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER VICEROY TIGER
2020-03-03PWC UKPWC UK
@techreport{uk:20200303:cyber:1f1eef0, author = {PWC UK}, title = {{Cyber Threats 2019:A Year in Retrospect}}, date = {2020-03-03}, institution = {PWC UK}, url = {https://www.pwc.co.uk/cyber-security/assets/cyber-threats-2019-retrospect.pdf}, language = {English}, urldate = {2020-03-03} } Cyber Threats 2019:A Year in Retrospect
KevDroid MESSAGETAP magecart AndroMut Cobalt Strike CobInt Crimson RAT DNSpionage Dridex Dtrack Emotet FlawedAmmyy FlawedGrace FriedEx Gandcrab Get2 GlobeImposter Grateful POS ISFB Kazuar LockerGoga Nokki QakBot Ramnit REvil Rifdoor RokRAT Ryuk shadowhammer ShadowPad Shifu Skipper StoneDrill Stuxnet TrickBot Winnti ZeroCleare APT41 MUSTANG PANDA Sea Turtle
2020-01-23SANS ISC InfoSec ForumsBrad Duncan
@online{duncan:20200123:german:2c867b2, author = {Brad Duncan}, title = {{German language malspam pushes Ursnif}}, date = {2020-01-23}, organization = {SANS ISC InfoSec Forums}, url = {https://isc.sans.edu/forums/diary/German+language+malspam+pushes+Ursnif/25732/}, language = {English}, urldate = {2020-01-26} } German language malspam pushes Ursnif
ISFB
2020-01-22Thomas Barabosch
@online{barabosch:20200122:malware:f805475, author = {Thomas Barabosch}, title = {{The malware analyst’s guide to PE timestamps}}, date = {2020-01-22}, url = {https://0xc0decafe.com/malware-analyst-guide-to-pe-timestamps/}, language = {English}, urldate = {2021-01-25} } The malware analyst’s guide to PE timestamps
Azorult Gozi IcedID ISFB LOLSnif SUNBURST TEARDROP
2020-01-17Ken Sajo, Yasuhiro Takeda, Yusuke Niwa
@techreport{sajo:20200117:battle:2b146f5, author = {Ken Sajo and Yasuhiro Takeda and Yusuke Niwa}, title = {{Battle Against Ursnif Malspam Campaign targeting Japan}}, date = {2020-01-17}, institution = {}, url = {https://jsac.jpcert.or.jp/archive/2020/pdf/JSAC2020_5_sajo-takeda-niwa_en.pdf}, language = {English}, urldate = {2020-01-17} } Battle Against Ursnif Malspam Campaign targeting Japan
Cutwail ISFB TrickBot UrlZone
2019-12-24SophosSophosLabs Threat Research
@online{research:20191224:gozi:6cca2ca, author = {SophosLabs Threat Research}, title = {{Gozi V3: tracked by their own stealth}}, date = {2019-12-24}, organization = {Sophos}, url = {https://news.sophos.com/en-us/2019/12/24/gozi-v3-tracked-by-their-own-stealth/}, language = {English}, urldate = {2020-01-13} } Gozi V3: tracked by their own stealth
ISFB
2019-12-23Palo Alto Networks Unit 42Brad Duncan
@online{duncan:20191223:wireshark:11f95ab, author = {Brad Duncan}, title = {{Wireshark Tutorial: Examining Ursnif Infections}}, date = {2019-12-23}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/wireshark-tutorial-examining-ursnif-infections/}, language = {English}, urldate = {2020-01-13} } Wireshark Tutorial: Examining Ursnif Infections
ISFB
2019-12-07SecureworksKevin O’Reilly, Keith Jarvis
@techreport{oreilly:20191207:endtoend:84340da, author = {Kevin O’Reilly and Keith Jarvis}, title = {{End-to-end Botnet Monitoring... Botconf 2019}}, date = {2019-12-07}, institution = {Secureworks}, url = {https://www.botconf.eu/wp-content/uploads/2019/12/B2019-OReilly-Jarvis-End-to-end-Botnet-Monitoring.pdf}, language = {English}, urldate = {2021-11-08} } End-to-end Botnet Monitoring... Botconf 2019
Emotet ISFB QakBot
2019-08-07FortinetXiaopeng Zhang
@online{zhang:20190807:new:2e838ee, author = {Xiaopeng Zhang}, title = {{New Ursnif Variant Spreading by Word Document}}, date = {2019-08-07}, organization = {Fortinet}, url = {https://www.fortinet.com/blog/threat-research/ursnif-variant-spreading-word-document.html}, language = {English}, urldate = {2020-01-26} } New Ursnif Variant Spreading by Word Document
ISFB
2019-07-11ProofpointProofpoint Threat Insight Team
@online{team:20190711:threat:00e0a1a, author = {Proofpoint Threat Insight Team}, title = {{Threat Actor Profile: TA544 targets geographies from Italy to Japan with a range of malware}}, date = {2019-07-11}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/threat-actor-profile-ta544-targets-geographies-italy-japan-range-malware}, language = {English}, urldate = {2021-05-31} } Threat Actor Profile: TA544 targets geographies from Italy to Japan with a range of malware
ISFB PandaBanker UrlZone NARWHAL SPIDER
2019-06-25VMRayTamas Boczan
@online{boczan:20190625:analyzing:fe5a161, author = {Tamas Boczan}, title = {{Analyzing Ursnif’s Behavior Using a Malware Sandbox}}, date = {2019-06-25}, organization = {VMRay}, url = {https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/}, language = {English}, urldate = {2019-12-17} } Analyzing Ursnif’s Behavior Using a Malware Sandbox
ISFB
2019-06-19ProofpointProofpoint Threat Insight Team
@online{team:20190619:urlzone:9163ce0, author = {Proofpoint Threat Insight Team}, title = {{URLZone top malware in Japan, while Emotet and LINE Phishing round out the landscape}}, date = {2019-06-19}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/urlzone-top-malware-japan-while-emotet-and-line-phishing-round-out-landscape-0}, language = {English}, urldate = {2021-05-31} } URLZone top malware in Japan, while Emotet and LINE Phishing round out the landscape
ISFB UrlZone NARWHAL SPIDER
2019-05-250ffset Blog0verfl0w_
@online{0verfl0w:20190525:analyzing:84874ea, author = {0verfl0w_}, title = {{Analyzing ISFB – The Second Loader}}, date = {2019-05-25}, organization = {0ffset Blog}, url = {https://0ffset.net/reverse-engineering/malware-analysis/analyzing-isfb-second-loader/}, language = {English}, urldate = {2020-01-13} } Analyzing ISFB – The Second Loader
ISFB
2019-04-06Youtube (hasherezade)hasherezade
@online{hasherezade:20190406:unpacking:dc6a1be, author = {hasherezade}, title = {{Unpacking ISFB (including the custom 'PX' format)}}, date = {2019-04-06}, organization = {Youtube (hasherezade)}, url = {https://www.youtube.com/watch?v=KvOpNznu_3w}, language = {English}, urldate = {2019-11-29} } Unpacking ISFB (including the custom 'PX' format)
ISFB
2019-04-05YoroiDavide Testa, Antonio Pirozzi
@online{testa:20190405:ursnif:4670538, author = {Davide Testa and Antonio Pirozzi}, title = {{Ursnif: The Latest Evolution of the Most Popular Banking Malware}}, date = {2019-04-05}, organization = {Yoroi}, url = {https://blog.yoroi.company/research/ursnif-the-latest-evolution-of-the-most-popular-banking-malware/}, language = {English}, urldate = {2019-10-23} } Ursnif: The Latest Evolution of the Most Popular Banking Malware
ISFB
2019-03-26YoroiLuigi Martire, Davide Testa, Luca Mella
@online{martire:20190326:ursnif:1d301b8, author = {Luigi Martire and Davide Testa and Luca Mella}, title = {{The Ursnif Gangs keep Threatening Italy}}, date = {2019-03-26}, organization = {Yoroi}, url = {https://blog.yoroi.company/research/the-ursnif-gangs-keep-threatening-italy/}, language = {English}, urldate = {2022-02-02} } The Ursnif Gangs keep Threatening Italy
ISFB
2019-03-130ffset Blog0verfl0w_
@online{0verfl0w:20190313:analysing:1f83706, author = {0verfl0w_}, title = {{Analysing ISFB – The First Loader}}, date = {2019-03-13}, organization = {0ffset Blog}, url = {https://0ffset.net/reverse-engineering/malware-analysis/analysing-isfb-loader/}, language = {English}, urldate = {2020-01-10} } Analysing ISFB – The First Loader
ISFB
2019-03-12CybereasonAssaf Dahan, Cybereason Nocturnus
@online{dahan:20190312:new:a435b52, author = {Assaf Dahan and Cybereason Nocturnus}, title = {{New Ursnif Variant targets Japan packed with new Features}}, date = {2019-03-12}, organization = {Cybereason}, url = {https://www.cybereason.com/blog/new-ursnif-variant-targets-japan-packed-with-new-features}, language = {English}, urldate = {2019-11-28} } New Ursnif Variant targets Japan packed with new Features
ISFB UrlZone
2019-03-11MinervaMinerva Labs
@online{labs:20190311:attackers:013804a, author = {Minerva Labs}, title = {{Attackers Insert Themselves into the Email Conversation to Spread Malware}}, date = {2019-03-11}, organization = {Minerva}, url = {https://blog.minerva-labs.com/attackers-insert-themselves-into-the-email-conversation-to-spread-malware}, language = {English}, urldate = {2020-01-08} } Attackers Insert Themselves into the Email Conversation to Spread Malware
ISFB
2019-02-07YoroiAntonio Farina, Davide Testa, Antonio Pirozzi
@online{farina:20190207:ursnif:f25be00, author = {Antonio Farina and Davide Testa and Antonio Pirozzi}, title = {{Ursnif: Long Live the Steganography!}}, date = {2019-02-07}, organization = {Yoroi}, url = {https://blog.yoroi.company/research/ursnif-long-live-the-steganography/}, language = {English}, urldate = {2022-02-02} } Ursnif: Long Live the Steganography!
ISFB
2019-01-30CyberbitHod Gavriel
@online{gavriel:20190130:new:6e4ec87, author = {Hod Gavriel}, title = {{New Ursnif Malware Variant – a Stunning Matryoshka (Матрёшка)}}, date = {2019-01-30}, organization = {Cyberbit}, url = {https://www.cyberbit.com/new-ursnif-malware-variant/}, language = {English}, urldate = {2020-08-21} } New Ursnif Malware Variant – a Stunning Matryoshka (Матрёшка)
ISFB
2019-01-24Cisco TalosJohn Arneson
@online{arneson:20190124:cisco:58d9a8f, author = {John Arneson}, title = {{Cisco AMP tracks new campaign that delivers Ursnif}}, date = {2019-01-24}, organization = {Cisco Talos}, url = {https://blog.talosintelligence.com/2019/01/amp-tracks-ursnif.html}, language = {English}, urldate = {2019-10-12} } Cisco AMP tracks new campaign that delivers Ursnif
ISFB
2019-01-150ffset Blog0verfl0w_
@online{0verfl0w:20190115:analyzing:bf3b215, author = {0verfl0w_}, title = {{Analyzing COMmunication in Malware}}, date = {2019-01-15}, organization = {0ffset Blog}, url = {https://0ffset.net/reverse-engineering/analyzing-com-mechanisms-in-malware/}, language = {English}, urldate = {2020-01-06} } Analyzing COMmunication in Malware
ISFB
2019CSISBenoît Ancel, Peter Kruse
@techreport{ancel:2019:dreambot:e29023e, author = {Benoît Ancel and Peter Kruse}, title = {{Dreambot Business overview 2019}}, date = {2019}, institution = {CSIS}, url = {http://benkow.cc/DreambotSAS19.pdf}, language = {English}, urldate = {2019-12-10} } Dreambot Business overview 2019
ISFB
2018-12-18Trend MicroTrendmicro
@online{trendmicro:20181218:ursnif:cc5ce31, author = {Trendmicro}, title = {{URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader}}, date = {2018-12-18}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/ursnif-emotet-dridex-and-bitpaymer-gangs-linked-by-a-similar-loader/}, language = {English}, urldate = {2020-01-07} } URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader
Dridex Emotet FriedEx ISFB
2018-05-17FidelisThreat Research Team
@online{team:20180517:gozi:f554055, author = {Threat Research Team}, title = {{Gozi V3 Technical Update}}, date = {2018-05-17}, organization = {Fidelis}, url = {https://www.fidelissecurity.com/threatgeek/threat-intelligence/gozi-v3-technical-update/}, language = {English}, urldate = {2020-01-08} } Gozi V3 Technical Update
ISFB
2018-03-19hasherezade
@online{hasherezade:20180319:unpacking:150cdac, author = {hasherezade}, title = {{Unpacking Ursnif}}, date = {2018-03-19}, url = {https://www.youtube.com/watch?v=jlc7Ahp8Iqg}, language = {English}, urldate = {2019-12-24} } Unpacking Ursnif
ISFB
2018-03-06Cisco TalosEdmund Brumaghin, Holger Unterbrink, Adam Weller
@online{brumaghin:20180306:gozi:6146f77, author = {Edmund Brumaghin and Holger Unterbrink and Adam Weller}, title = {{Gozi ISFB Remains Active in 2018, Leverages "Dark Cloud" Botnet For Distribution}}, date = {2018-03-06}, organization = {Cisco Talos}, url = {http://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html}, language = {English}, urldate = {2019-12-17} } Gozi ISFB Remains Active in 2018, Leverages "Dark Cloud" Botnet For Distribution
ISFB
2018-02-07CylanceThreat Research Team
@online{team:20180207:threat:c0550bd, author = {Threat Research Team}, title = {{Threat Spotlight: URSNIF Infostealer Malware}}, date = {2018-02-07}, organization = {Cylance}, url = {https://www.cylance.com/en_us/blog/threat-spotlight-ursnif-infostealer-malware.html}, language = {English}, urldate = {2019-11-24} } Threat Spotlight: URSNIF Infostealer Malware
ISFB
2018-01-17SANS ISCbrad
@online{brad:20180117:reviewing:49ad844, author = {brad}, title = {{Reviewing the spam filters: Malspam pushing Gozi-ISFB}}, date = {2018-01-17}, organization = {SANS ISC}, url = {https://isc.sans.edu/forums/diary/Reviewing+the+spam+filters+Malspam+pushing+GoziISFB/23245}, language = {English}, urldate = {2019-12-20} } Reviewing the spam filters: Malspam pushing Gozi-ISFB
ISFB
2018-01-12ProofpointProofpoint Staff
@online{staff:20180112:holiday:b4225b8, author = {Proofpoint Staff}, title = {{Holiday lull? Not so much}}, date = {2018-01-12}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/holiday-lull-not-so-much}, language = {English}, urldate = {2021-05-31} } Holiday lull? Not so much
Dridex Emotet GlobeImposter ISFB Necurs PandaBanker UrlZone NARWHAL SPIDER
2017-11-28FireEyeSandor Nemes, Abhay Vaish
@online{nemes:20171128:newly:b2b9018, author = {Sandor Nemes and Abhay Vaish}, title = {{Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection}}, date = {2017-11-28}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2017/11/ursnif-variant-malicious-tls-callback-technique.html}, language = {English}, urldate = {2019-12-20} } Newly Observed Ursnif Variant Employs Malicious TLS Callback Technique to Achieve Process Injection
ISFB
2017-07-02CERT.PLMaciej Kotowicz
@online{kotowicz:20170702:isfb:2fe662b, author = {Maciej Kotowicz}, title = {{ISFB: Still Live and Kicking}}, date = {2017-07-02}, organization = {CERT.PL}, url = {https://journal.cecyf.fr/ojs/index.php/cybin/article/view/15}, language = {English}, urldate = {2020-01-13} } ISFB: Still Live and Kicking
ISFB
2017-05-29Lokalhost.plMaciej Kotowicz
@online{kotowicz:20170529:gozi:96e962d, author = {Maciej Kotowicz}, title = {{Gozi Tree}}, date = {2017-05-29}, organization = {Lokalhost.pl}, url = {https://lokalhost.pl/gozi_tree.txt}, language = {English}, urldate = {2020-01-08} } Gozi Tree
DreamBot Gozi ISFB Powersniff
2017-04-20MalwarebytesJérôme Segura
@online{segura:20170420:binary:eaa706a, author = {Jérôme Segura}, title = {{Binary Options malvertising campaign drops ISFB banking Trojan}}, date = {2017-04-20}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/04/binary-options-malvertising-campaign-drops-isfb-banking-trojan/}, language = {English}, urldate = {2019-12-20} } Binary Options malvertising campaign drops ISFB banking Trojan
ISFB
2016-11-01Ariel Koren's BlogAriel Koren
@online{koren:20161101:ursnif:a5e4fcd, author = {Ariel Koren}, title = {{Ursnif Malware: Deep Technical Dive}}, date = {2016-11-01}, organization = {Ariel Koren's Blog}, url = {https://arielkoren.com/blog/2016/11/01/ursnif-malware-deep-technical-dive/}, language = {English}, urldate = {2020-01-10} } Ursnif Malware: Deep Technical Dive
ISFB
2016-04-14SecurityIntelligenceLimor Kessem, Lior Keshet
@online{kessem:20160414:meet:16351ef, author = {Limor Kessem and Lior Keshet}, title = {{Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim}}, date = {2016-04-14}, organization = {SecurityIntelligence}, url = {https://securityintelligence.com/meet-goznym-the-banking-malware-offspring-of-gozi-isfb-and-nymaim/}, language = {English}, urldate = {2020-01-06} } Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim
ISFB Nymaim GozNym
2016-03-23Github (gbrindisi)gbrindisi
@online{gbrindisi:20160323:gozi:aa28233, author = {gbrindisi}, title = {{Gozi ISFB Sourceccode}}, date = {2016-03-23}, organization = {Github (gbrindisi)}, url = {https://github.com/gbrindisi/malware/tree/master/windows/gozi-isfb}, language = {English}, urldate = {2020-01-13} } Gozi ISFB Sourceccode
ISFB
Yara Rules
[TLP:WHITE] win_isfb_auto (20230715 | Detects win.isfb.)
rule win_isfb_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.isfb."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.isfb"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 33c0 e8???????? 3bc7 740f }
            // n = 4, score = 2500
            //   33c0                 | jne                 0x31
            //   e8????????           |                     
            //   3bc7                 | mov                 eax, dword ptr [ebp + 0xc]
            //   740f                 | mov                 dword ptr [eax], esi

        $sequence_1 = { 33c0 3bc7 741b 50 33c0 e8???????? }
            // n = 6, score = 2500
            //   33c0                 | jne                 0x12
            //   3bc7                 | cmp                 dword ptr [ebp + 8], 0
            //   741b                 | je                  0x12
            //   50                   | push                dword ptr [ebp + 8]
            //   33c0                 | push                ebx
            //   e8????????           |                     

        $sequence_2 = { 3bc7 7413 50 6a10 58 }
            // n = 5, score = 2400
            //   3bc7                 | dec                 eax
            //   7413                 | add                 esp, 0x38
            //   50                   | ret                 
            //   6a10                 | dec                 eax
            //   58                   | mov                 dword ptr [esp + 8], ebx

        $sequence_3 = { 6a10 58 e8???????? 3bc7 7406 }
            // n = 5, score = 2400
            //   6a10                 | add                 esp, 0x28
            //   58                   | ret                 
            //   e8????????           |                     
            //   3bc7                 | dec                 eax
            //   7406                 | lea                 eax, [edx + 0x4a20]

        $sequence_4 = { ff75f4 6822010000 e9???????? ff7508 }
            // n = 4, score = 2400
            //   ff75f4               | dec                 ecx
            //   6822010000           | mov                 ecx, esp
            //   e9????????           |                     
            //   ff7508               | xor                 ebx, ebx

        $sequence_5 = { 6a64 ff15???????? a1???????? 85c0 7407 83ee64 }
            // n = 6, score = 2200
            //   6a64                 | mov                 eax, dword ptr [ebp + 0x10]
            //   ff15????????         |                     
            //   a1????????           |                     
            //   85c0                 | test                edx, edx
            //   7407                 | dec                 ebp
            //   83ee64               | mov                 esi, ecx

        $sequence_6 = { ff35???????? e8???????? 8bf0 3bf3 7443 }
            // n = 5, score = 2200
            //   ff35????????         |                     
            //   e8????????           |                     
            //   8bf0                 | mov                 esi, dword ptr [ebp + 8]
            //   3bf3                 | xor                 esi, esi
            //   7443                 | cmp                 dword ptr [ebp - 4], esi

        $sequence_7 = { 57 50 e8???????? 83c40c e8???????? 3bc7 8945f0 }
            // n = 7, score = 2200
            //   57                   | mov                 ebx, edi
            //   50                   | mov                 esi, edi
            //   e8????????           |                     
            //   83c40c               | dec                 eax
            //   e8????????           |                     
            //   3bc7                 | cmp                 ebx, edi
            //   8945f0               | mov                 ecx, dword ptr [esp + 0x90]

        $sequence_8 = { 8bd3 e8???????? eb02 33c0 3bc7 7413 }
            // n = 6, score = 2100
            //   8bd3                 | add                 dword ptr [ebp + 0x10], 4
            //   e8????????           |                     
            //   eb02                 | add                 eax, 4
            //   33c0                 | je                  0x19
            //   3bc7                 | mov                 edx, dword ptr [eax]
            //   7413                 | sub                 edx, dword ptr [ebp - 4]

        $sequence_9 = { 7406 50 e8???????? 3bdf 7414 a1???????? }
            // n = 6, score = 2100
            //   7406                 | add                 eax, 4
            //   50                   | dec                 ecx
            //   e8????????           |                     
            //   3bdf                 | mov                 dword ptr [edi], edx
            //   7414                 | mov                 edi, dword ptr [ebp + 0x10]
            //   a1????????           |                     

        $sequence_10 = { ff15???????? 85c0 a3???????? 7402 ffe0 c20400 }
            // n = 6, score = 2100
            //   ff15????????         |                     
            //   85c0                 | dec                 esp
            //   a3????????           |                     
            //   7402                 | cmovne              ecx, eax
            //   ffe0                 | dec                 eax
            //   c20400               | mov                 dword ptr [esp + 0x20], ebx

        $sequence_11 = { 8bc5 5d 5b 59 c20400 8325????????00 6a00 }
            // n = 7, score = 2100
            //   8bc5                 | mov                 dword ptr [ebp - 8], eax
            //   5d                   | test                byte ptr [eax + 4], 8
            //   5b                   | jne                 0x34
            //   59                   | push                ebx
            //   c20400               | xor                 esi, esi
            //   8325????????00       |                     
            //   6a00                 | cmp                 dword ptr [ebp - 4], esi

        $sequence_12 = { c20400 55 8bec 83ec0c a1???????? 8365f800 57 }
            // n = 7, score = 1800
            //   c20400               | lea                 ecx, [eax + 1]
            //   55                   | mov                 dx, 0x20
            //   8bec                 | dec                 esp
            //   83ec0c               | mov                 dword ptr [ebp + ebx*8], esp
            //   a1????????           |                     
            //   8365f800             | add                 ebx, 1
            //   57                   | dec                 eax

        $sequence_13 = { 3c05 7506 84e4 7704 3ac0 }
            // n = 5, score = 1800
            //   3c05                 | push                dword ptr [ebp - 0xc]
            //   7506                 | push                0x122
            //   84e4                 | push                dword ptr [ebp + 8]
            //   7704                 | push                0
            //   3ac0                 | push                0

        $sequence_14 = { 8bd8 85db 895df4 0f84c7000000 56 }
            // n = 5, score = 1700
            //   8bd8                 | cmp                 eax, edi
            //   85db                 | cmp                 eax, edi
            //   895df4               | je                  0x1f
            //   0f84c7000000         | push                eax
            //   56                   | xor                 eax, eax

        $sequence_15 = { 0155fc 83451004 83c004 49 8917 75e9 }
            // n = 6, score = 1700
            //   0155fc               | push                eax
            //   83451004             | push                0x10
            //   83c004               | pop                 eax
            //   49                   | cmp                 eax, edi
            //   8917                 | je                  0xb
            //   75e9                 | push                eax

        $sequence_16 = { 7417 8b10 2b55fc 8b7d10 0155fc }
            // n = 5, score = 1700
            //   7417                 | je                  0x16
            //   8b10                 | je                  0x1d
            //   2b55fc               | push                eax
            //   8b7d10               | xor                 eax, eax
            //   0155fc               | cmp                 eax, edi

        $sequence_17 = { 7505 b8???????? 53 bb60ea0000 53 ff750c }
            // n = 6, score = 1700
            //   7505                 | push                ebx
            //   b8????????           |                     
            //   53                   | push                1
            //   bb60ea0000           | push                1
            //   53                   | push                dword ptr [ebp + 0x14]
            //   ff750c               | mov                 esi, dword ptr [ebp + 8]

        $sequence_18 = { 83e103 740d 51 50 ff7510 e8???????? 83c40c }
            // n = 7, score = 1700
            //   83e103               | cmp                 eax, edi
            //   740d                 | je                  0x17
            //   51                   | push                eax
            //   50                   | push                0x10
            //   ff7510               | pop                 eax
            //   e8????????           |                     
            //   83c40c               | cmp                 eax, edi

        $sequence_19 = { 8b1e 6a00 ff37 ff15???????? 2b442414 }
            // n = 5, score = 1600
            //   8b1e                 | mov                 ecx, esp
            //   6a00                 | mov                 ebx, 1
            //   ff37                 | dec                 ecx
            //   ff15????????         |                     
            //   2b442414             | mov                 ecx, esp

        $sequence_20 = { ff15???????? 8b442414 8b4c240c 8907 8b442418 }
            // n = 5, score = 1600
            //   ff15????????         |                     
            //   8b442414             | dec                 esp
            //   8b4c240c             | cmovne              ecx, eax
            //   8907                 | dec                 eax
            //   8b442418             | mov                 dword ptr [esp + 0x20], ebx

        $sequence_21 = { 8907 8b442418 894110 836334f9 }
            // n = 4, score = 1600
            //   8907                 | jne                 0xffffffcf
            //   8b442418             | dec                 eax
            //   894110               | mov                 dword ptr [esi], ebp
            //   836334f9             | xor                 edx, edx

        $sequence_22 = { 83e4f8 83ec14 8364240400 53 8b5d0c 837b240c 56 }
            // n = 7, score = 1600
            //   83e4f8               | mov                 dword ptr [ebp + ebx*8], esp
            //   83ec14               | add                 ebx, 1
            //   8364240400           | dec                 eax
            //   53                   | test                edi, edi
            //   8b5d0c               | inc                 esp
            //   837b240c             | mov                 eax, ebx
            //   56                   | xor                 edx, edx

        $sequence_23 = { 8a4604 2404 f6d8 1bc0 }
            // n = 4, score = 1600
            //   8a4604               | leave               
            //   2404                 | ret                 4
            //   f6d8                 | push                ebp
            //   1bc0                 | mov                 ebp, esp

        $sequence_24 = { 56 57 8b3b 897c241c 760a 8b4b20 }
            // n = 6, score = 1600
            //   56                   | mov                 dword ptr [esp + 0x20], ebx
            //   57                   | test                eax, eax
            //   8b3b                 | mov                 dword ptr [esp + 0x28], 0xea60
            //   897c241c             | dec                 esp
            //   760a                 | cmovne              ecx, eax
            //   8b4b20               | dec                 eax

        $sequence_25 = { e8???????? 8b4320 897324 897328 83c40c 8974240c }
            // n = 6, score = 1600
            //   e8????????           |                     
            //   8b4320               | test                eax, eax
            //   897324               | mov                 dword ptr [esp + 0x28], 0xea60
            //   897328               | dec                 esp
            //   83c40c               | cmovne              ecx, eax
            //   8974240c             | dec                 eax

        $sequence_26 = { ff15???????? 2b442414 50 8b07 03442418 50 56 }
            // n = 7, score = 1600
            //   ff15????????         |                     
            //   2b442414             | mov                 dword ptr [esp + 0x20], ebx
            //   50                   | test                eax, eax
            //   8b07                 | mov                 ebx, eax
            //   03442418             | dec                 esp
            //   50                   | cmovne              ecx, eax
            //   56                   | dec                 eax

        $sequence_27 = { 85c0 7520 ff37 50 ff35???????? ff15???????? 8b442414 }
            // n = 7, score = 1600
            //   85c0                 | dec                 ecx
            //   7520                 | mov                 ecx, esp
            //   ff37                 | xor                 ebx, ebx
            //   50                   | mov                 dx, 0x20
            //   ff35????????         |                     
            //   ff15????????         |                     
            //   8b442414             | dec                 ecx

        $sequence_28 = { e8???????? 85c0 740d 8906 }
            // n = 4, score = 1600
            //   e8????????           |                     
            //   85c0                 | cmp                 dword ptr [ebx + 0x24], 0xc
            //   740d                 | push                esi
            //   8906                 | mov                 ebx, dword ptr [esi]

        $sequence_29 = { 74e7 3bd0 7420 8b4a0c 3bc8 7415 }
            // n = 6, score = 1500
            //   74e7                 | pop                 eax
            //   3bd0                 | cmp                 eax, edi
            //   7420                 | je                  0xa
            //   8b4a0c               | push                eax
            //   3bc8                 | jmp                 4
            //   7415                 | xor                 eax, eax

        $sequence_30 = { 50 8d4508 50 53 8bc6 }
            // n = 5, score = 1500
            //   50                   | push                eax
            //   8d4508               | lea                 eax, [ebp + 8]
            //   50                   | push                eax
            //   53                   | push                ebx
            //   8bc6                 | mov                 eax, esi

        $sequence_31 = { 7404 3bd0 74e7 3bd0 }
            // n = 4, score = 1500
            //   7404                 | je                  0x23
            //   3bd0                 | push                eax
            //   74e7                 | jmp                 4
            //   3bd0                 | xor                 eax, eax

        $sequence_32 = { 750e 837d0800 7408 ff7508 e8???????? 8bc7 5f }
            // n = 7, score = 1500
            //   750e                 | jne                 0x10
            //   837d0800             | cmp                 dword ptr [ebp + 8], 0
            //   7408                 | je                  0xa
            //   ff7508               | push                dword ptr [ebp + 8]
            //   e8????????           |                     
            //   8bc7                 | mov                 eax, edi
            //   5f                   | pop                 edi

        $sequence_33 = { 53 8bc6 e8???????? 85c0 7516 }
            // n = 5, score = 1500
            //   53                   | push                ebx
            //   8bc6                 | mov                 eax, esi
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7516                 | jne                 0x18

        $sequence_34 = { 752f 8b450c 8930 eb33 }
            // n = 4, score = 1500
            //   752f                 | jne                 0x31
            //   8b450c               | mov                 eax, dword ptr [ebp + 0xc]
            //   8930                 | mov                 dword ptr [eax], esi
            //   eb33                 | jmp                 0x35

        $sequence_35 = { 488bcf c744242860ea0000 4c0f45c8 48895c2420 e8???????? }
            // n = 5, score = 1500
            //   488bcf               | and                 esp, 0xfffffff8
            //   c744242860ea0000     | sub                 esp, 0x9c
            //   4c0f45c8             | pop                 edi
            //   48895c2420           | ret                 4
            //   e8????????           |                     

        $sequence_36 = { 7415 8b5210 3bd0 740e 8b742408 890e 8b4c240c }
            // n = 7, score = 1500
            //   7415                 | xor                 eax, eax
            //   8b5210               | xor                 eax, eax
            //   3bd0                 | cmp                 eax, edi
            //   740e                 | je                  0x13
            //   8b742408             | jmp                 4
            //   890e                 | xor                 eax, eax
            //   8b4c240c             | cmp                 eax, edi

        $sequence_37 = { 74a3 33ff eb0b 33ff }
            // n = 4, score = 1500
            //   74a3                 | je                  0xffffffa5
            //   33ff                 | xor                 edi, edi
            //   eb0b                 | jmp                 0xd
            //   33ff                 | xor                 edi, edi

        $sequence_38 = { 837d1800 b8???????? 7505 b8???????? }
            // n = 4, score = 1500
            //   837d1800             | push                esi
            //   b8????????           |                     
            //   7505                 | push                ebx
            //   b8????????           |                     

        $sequence_39 = { eb02 6a02 58 5e c20800 }
            // n = 5, score = 1500
            //   eb02                 | je                  0x19
            //   6a02                 | push                eax
            //   58                   | push                0x10
            //   5e                   | pop                 eax
            //   c20800               | cmp                 eax, edi

        $sequence_40 = { c21000 55 8bec 83ec14 a1???????? 53 56 }
            // n = 7, score = 1400
            //   c21000               | je                  0x16
            //   55                   | cmp                 eax, edi
            //   8bec                 | je                  0x11
            //   83ec14               | xor                 eax, eax
            //   a1????????           |                     
            //   53                   | cmp                 eax, edi
            //   56                   | je                  0x13

        $sequence_41 = { 498bcc eb07 83c301 488d4801 66ba2000 ff15???????? }
            // n = 6, score = 1400
            //   498bcc               | dec                 esp
            //   eb07                 | cmovne              ecx, eax
            //   83c301               | dec                 eax
            //   488d4801             | mov                 dword ptr [esp + 0x20], ebx
            //   66ba2000             | test                eax, eax
            //   ff15????????         |                     

        $sequence_42 = { 51 50 57 6a01 ff75e0 68???????? e8???????? }
            // n = 7, score = 1400
            //   51                   | push                ebx
            //   50                   | mov                 eax, 0x800
            //   57                   | push                eax
            //   6a01                 | push                esi
            //   ff75e0               | mov                 dword ptr [ebp - 8], eax
            //   68????????           |                     
            //   e8????????           |                     

        $sequence_43 = { ff75fc 6a0d 58 e8???????? 85c0 }
            // n = 5, score = 1400
            //   ff75fc               | jmp                 4
            //   6a0d                 | xor                 eax, eax
            //   58                   | cmp                 eax, edi
            //   e8????????           |                     
            //   85c0                 | je                  0x21

        $sequence_44 = { e8???????? be01000000 8bc6 4883c440 415e 415d }
            // n = 6, score = 1400
            //   e8????????           |                     
            //   be01000000           | dec                 esp
            //   8bc6                 | mov                 esp, edi
            //   4883c440             | jne                 0xffffffd4
            //   415e                 | dec                 eax
            //   415d                 | mov                 dword ptr [esi], ebp

        $sequence_45 = { ff15???????? bb01000000 498bcc eb07 }
            // n = 4, score = 1400
            //   ff15????????         |                     
            //   bb01000000           | ret                 4
            //   498bcc               | pop                 ecx
            //   eb07                 | ret                 4

        $sequence_46 = { 33db 66ba2000 498bcc ff15???????? 4885c0 488bf8 7417 }
            // n = 7, score = 1400
            //   33db                 | push                0x10
            //   66ba2000             | jmp                 4
            //   498bcc               | xor                 eax, eax
            //   ff15????????         |                     
            //   4885c0               | cmp                 eax, edi
            //   488bf8               | je                  0x1b
            //   7417                 | push                eax

        $sequence_47 = { 498bcc ff15???????? 33db 66ba2000 }
            // n = 4, score = 1400
            //   498bcc               | push                0x10
            //   ff15????????         |                     
            //   33db                 | push                0x10
            //   66ba2000             | pop                 eax

        $sequence_48 = { 488b0d???????? 448bc3 33d2 41c1e003 ff15???????? 4885c0 488be8 }
            // n = 7, score = 1400
            //   488b0d????????       |                     
            //   448bc3               | push                0x10
            //   33d2                 | pop                 eax
            //   41c1e003             | cmp                 eax, edi
            //   ff15????????         |                     
            //   4885c0               | je                  0xd
            //   488be8               | jmp                 4

        $sequence_49 = { e8???????? 85c0 742d ff75fc 6a0d }
            // n = 5, score = 1400
            //   e8????????           |                     
            //   85c0                 | je                  0xb
            //   742d                 | push                eax
            //   ff75fc               | cmp                 eax, edi
            //   6a0d                 | je                  0x15

        $sequence_50 = { 53 b800080000 50 56 }
            // n = 4, score = 1400
            //   53                   | xor                 eax, eax
            //   b800080000           | cmp                 eax, edi
            //   50                   | je                  0x1f
            //   56                   | push                eax

        $sequence_51 = { 4c8be7 75c4 48892e eb02 33db 488b0d???????? }
            // n = 6, score = 1400
            //   4c8be7               | xor                 eax, eax
            //   75c4                 | cmp                 eax, edi
            //   48892e               | je                  0x1b
            //   eb02                 | push                eax
            //   33db                 | push                dword ptr [ebp - 0xc]
            //   488b0d????????       |                     

        $sequence_52 = { c60000 488bcf ff15???????? 4c8964dd00 83c301 4885ff }
            // n = 6, score = 1400
            //   c60000               | pop                 ecx
            //   488bcf               | ret                 4
            //   ff15????????         |                     
            //   4c8964dd00           | push                0
            //   83c301               | pop                 ecx
            //   4885ff               | ret                 4

        $sequence_53 = { 5d 5b c3 8b4754 a804 }
            // n = 5, score = 1400
            //   5d                   | jmp                 4
            //   5b                   | xor                 eax, eax
            //   c3                   | cmp                 eax, edi
            //   8b4754               | je                  0x23
            //   a804                 | push                eax

        $sequence_54 = { 33d2 ff15???????? 488bdf 8bf7 483bdf }
            // n = 5, score = 1300
            //   33d2                 | xor                 eax, eax
            //   ff15????????         |                     
            //   488bdf               | xor                 eax, eax
            //   8bf7                 | cmp                 eax, edi
            //   483bdf               | je                  0x21

        $sequence_55 = { b90e010000 41b800000100 4889442420 e8???????? e9???????? }
            // n = 5, score = 1300
            //   b90e010000           | jmp                 4
            //   41b800000100         | xor                 eax, eax
            //   4889442420           | cmp                 eax, edi
            //   e8????????           |                     
            //   e9????????           |                     

        $sequence_56 = { 50 83c604 e8???????? 3bfb }
            // n = 4, score = 1300
            //   50                   | cmp                 dword ptr [esp + 0x88], 0
            //   83c604               | dec                 esp
            //   e8????????           |                     
            //   3bfb                 | mov                 eax, dword ptr [esp + 0x40]

        $sequence_57 = { 8945e0 e8???????? 85c0 0f84dc000000 8b45e0 }
            // n = 5, score = 1300
            //   8945e0               | or                  eax, edx
            //   e8????????           |                     
            //   85c0                 | push                edi
            //   0f84dc000000         | mov                 dword ptr [ebp - 0xc], ebx
            //   8b45e0               | mov                 dword ptr [ebp - 0x10], ebx

        $sequence_58 = { c745f408000000 ff15???????? 3bc3 8945f8 }
            // n = 4, score = 1300
            //   c745f408000000       | pop                 edi
            //   ff15????????         |                     
            //   3bc3                 | je                  0xa
            //   8945f8               | push                dword ptr [ebp + 8]

        $sequence_59 = { 68???????? ff75f8 ffd6 8b4df4 66c7015c00 }
            // n = 5, score = 1300
            //   68????????           |                     
            //   ff75f8               | cmp                 dword ptr [ebp + 8], 0
            //   ffd6                 | je                  0xe
            //   8b4df4               | push                dword ptr [ebp + 8]
            //   66c7015c00           | mov                 eax, edi

        $sequence_60 = { 8bd5 488bcf bb57000000 e8???????? }
            // n = 4, score = 1300
            //   8bd5                 | push                eax
            //   488bcf               | push                0x10
            //   bb57000000           | pop                 eax
            //   e8????????           |                     

        $sequence_61 = { 8bd7 e8???????? eb02 33c0 3bc3 7413 }
            // n = 6, score = 1300
            //   8bd7                 | mov                 ebx, eax
            //   e8????????           |                     
            //   eb02                 | dec                 eax
            //   33c0                 | mov                 ecx, edi
            //   3bc3                 | mov                 dword ptr [esp + 0x28], 0xea60
            //   7413                 | dec                 esp

        $sequence_62 = { 85db 7423 8b0d???????? 0fb701 663d6100 }
            // n = 5, score = 1300
            //   85db                 | je                  0x17
            //   7423                 | push                eax
            //   8b0d????????         |                     
            //   0fb701               | push                0x10
            //   663d6100             | je                  0x15

        $sequence_63 = { e8???????? 3bc3 7406 50 e8???????? 3bfb 7414 }
            // n = 7, score = 1300
            //   e8????????           |                     
            //   3bc3                 | dec                 esp
            //   7406                 | cmovne              ecx, eax
            //   50                   | dec                 eax
            //   e8????????           |                     
            //   3bfb                 | mov                 dword ptr [esp + 0x20], ebx
            //   7414                 | test                eax, eax

        $sequence_64 = { e8???????? 3bc3 740f 8b35???????? 50 83c604 }
            // n = 6, score = 1300
            //   e8????????           |                     
            //   3bc3                 | cmovne              ecx, eax
            //   740f                 | dec                 eax
            //   8b35????????         |                     
            //   50                   | mov                 dword ptr [esp + 0x20], ebx
            //   83c604               | test                eax, eax

        $sequence_65 = { 53 50 89450c ff15???????? 3bc3 8945f4 741a }
            // n = 7, score = 1300
            //   53                   | mov                 eax, edi
            //   50                   | test                eax, eax
            //   89450c               | jne                 0xb6
            //   ff15????????         |                     
            //   3bc3                 | sub                 esi, 0x40
            //   8945f4               | push                3
            //   741a                 | and                 eax, 0xffef

        $sequence_66 = { 83fd05 72c1 eb0c bb7f000000 eb05 }
            // n = 5, score = 1300
            //   83fd05               | je                  0x16
            //   72c1                 | cmp                 eax, edi
            //   eb0c                 | je                  0x1f
            //   bb7f000000           | push                eax
            //   eb05                 | xor                 eax, eax

        $sequence_67 = { 33db 6a01 e8???????? 85db 7423 }
            // n = 5, score = 1300
            //   33db                 | cmp                 eax, edi
            //   6a01                 | push                eax
            //   e8????????           |                     
            //   85db                 | push                0x10
            //   7423                 | pop                 eax

        $sequence_68 = { 6641b85c00 33d2 488bcd ff15???????? }
            // n = 4, score = 1300
            //   6641b85c00           | push                ebp
            //   33d2                 | mov                 ebp, esp
            //   488bcd               | sub                 esp, 0xc
            //   ff15????????         |                     

        $sequence_69 = { 33f6 3975fc 7410 ff75fc 56 ff35???????? ff15???????? }
            // n = 7, score = 1200
            //   33f6                 | je                  0x23
            //   3975fc               | push                eax
            //   7410                 | push                dword ptr [ebp - 8]
            //   ff75fc               | call                esi
            //   56                   | mov                 ecx, dword ptr [ebp - 0xc]
            //   ff35????????         |                     
            //   ff15????????         |                     

        $sequence_70 = { 0f845d010000 8b4730 a808 7412 }
            // n = 4, score = 1200
            //   0f845d010000         | je                  7
            //   8b4730               | dec                 eax
            //   a808                 | add                 esp, 0x28
            //   7412                 | ret                 

        $sequence_71 = { ff5214 8bf7 8bfe e8???????? 5f 5e 5b }
            // n = 7, score = 1200
            //   ff5214               | cmp                 eax, ebx
            //   8bf7                 | je                  0xa
            //   8bfe                 | push                eax
            //   e8????????           |                     
            //   5f                   | cmp                 edi, ebx
            //   5e                   | je                  0x1d
            //   5b                   | pop                 eax

        $sequence_72 = { 8945f8 ff15???????? 8bd8 3bde }
            // n = 4, score = 1200
            //   8945f8               | mov                 word ptr [ecx], 0x5c
            //   ff15????????         |                     
            //   8bd8                 | mov                 dword ptr [ebp - 0xc], 8
            //   3bde                 | cmp                 eax, ebx

        $sequence_73 = { e8???????? 85c0 0f8586000000 8b4720 }
            // n = 4, score = 1200
            //   e8????????           |                     
            //   85c0                 | add                 esp, 0x28
            //   0f8586000000         | ret                 
            //   8b4720               | dec                 eax

        $sequence_74 = { c20800 8b4330 a804 0f8451ffffff 8b470c }
            // n = 5, score = 1200
            //   c20800               | dec                 eax
            //   8b4330               | add                 esp, 0x28
            //   a804                 | ret                 
            //   0f8451ffffff         | dec                 eax
            //   8b470c               | lea                 eax, [edx + 0x4a20]

        $sequence_75 = { 7509 83632800 e9???????? 8b4330 a840 0f84e2000000 }
            // n = 6, score = 1200
            //   7509                 | add                 esi, 4
            //   83632800             | cmp                 edi, ebx
            //   e9????????           |                     
            //   8b4330               | je                  0x1c
            //   a840                 | test                al, 0x40
            //   0f84e2000000         | je                  0xea

        $sequence_76 = { 8b7508 e8???????? 33f6 3975fc }
            // n = 4, score = 1200
            //   8b7508               | dec                 eax
            //   e8????????           |                     
            //   33f6                 | cmp                 ebx, edi
            //   3975fc               | xor                 edx, edx

        $sequence_77 = { 0f8544010000 8b472c a801 742d ff37 }
            // n = 5, score = 1200
            //   0f8544010000         | lea                 eax, [edx + 0x4a20]
            //   8b472c               | dec                 eax
            //   a801                 | add                 esp, 0x28
            //   742d                 | ret                 
            //   ff37                 | dec                 eax

        $sequence_78 = { c744242000010000 ff15???????? 4883f8ff 488bf8 7442 }
            // n = 5, score = 1200
            //   c744242000010000     | xor                 eax, eax
            //   ff15????????         |                     
            //   4883f8ff             | cmp                 eax, edi
            //   488bf8               | je                  0x23
            //   7442                 | push                eax

        $sequence_79 = { 0f854affffff 894330 e9???????? 55 8bec }
            // n = 5, score = 1200
            //   0f854affffff         | mov                 dword ptr [eax], eax
            //   894330               | dec                 eax
            //   e9????????           |                     
            //   55                   | test                ecx, ecx
            //   8bec                 | je                  7

        $sequence_80 = { 57 ff750c 53 e8???????? 3bfe 740e 57 }
            // n = 7, score = 1200
            //   57                   | mov                 dword ptr [ebp - 0x20], eax
            //   ff750c               | test                eax, eax
            //   53                   | je                  0xf1
            //   e8????????           |                     
            //   3bfe                 | mov                 dword ptr [ebp - 0x20], eax
            //   740e                 | test                eax, eax
            //   57                   | je                  0xe7

        $sequence_81 = { f6400408 752e 53 e8???????? 6a01 6a01 }
            // n = 6, score = 1200
            //   f6400408             | cmovne              ecx, eax
            //   752e                 | dec                 eax
            //   53                   | mov                 dword ptr [esp + 0x20], ebx
            //   e8????????           |                     
            //   6a01                 | mov                 dword ptr [esp + 0x28], 0xea60
            //   6a01                 | dec                 esp

        $sequence_82 = { 8b8c2490000000 83bc248800000000 4c8b442440 488b542448 }
            // n = 4, score = 1200
            //   8b8c2490000000       | cmp                 eax, edi
            //   83bc248800000000     | je                  0x21
            //   4c8b442440           | push                eax
            //   488b542448           | xor                 eax, eax

        $sequence_83 = { ff15???????? 53 56 ff35???????? ff15???????? 5b }
            // n = 6, score = 1200
            //   ff15????????         |                     
            //   53                   | mov                 eax, dword ptr [ebp - 0x20]
            //   56                   | lea                 ecx, [ebp - 0x20]
            //   ff35????????         |                     
            //   ff15????????         |                     
            //   5b                   | cmp                 eax, ecx

        $sequence_84 = { 8b4330 a840 0f84e2000000 8b7334 8d442418 50 8d442410 }
            // n = 7, score = 1200
            //   8b4330               | dec                 eax
            //   a840                 | test                ecx, ecx
            //   0f84e2000000         | je                  7
            //   8b7334               | dec                 eax
            //   8d442418             | add                 esp, 0x28
            //   50                   | ret                 
            //   8d442410             | dec                 eax

        $sequence_85 = { 85d2 4d8bf1 458bf8 8bc2 }
            // n = 4, score = 1100
            //   85d2                 | mov                 ecx, dword ptr [ebx]
            //   4d8bf1               | test                eax, eax
            //   458bf8               | jne                 0xa8
            //   8bc2                 | jne                 0x12

        $sequence_86 = { 5b c9 c20400 51 56 ff74240c }
            // n = 6, score = 1100
            //   5b                   | pop                 ebx
            //   c9                   | leave               
            //   c20400               | ret                 4
            //   51                   | push                ecx
            //   56                   | push                esi
            //   ff74240c             | push                dword ptr [esp + 0xc]

        $sequence_87 = { e8???????? 85c0 7507 33db 895d08 }
            // n = 5, score = 1100
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7507                 | jne                 9
            //   33db                 | xor                 ebx, ebx
            //   895d08               | mov                 dword ptr [ebp + 8], ebx

        $sequence_88 = { c3 418bd8 4803df 410fb64101 }
            // n = 4, score = 1100
            //   c3                   | sub                 esp, 0xc
            //   418bd8               | and                 dword ptr [ebp - 8], 0
            //   4803df               | pop                 ebx
            //   410fb64101           | ret                 4

        $sequence_89 = { 48890d???????? 410fb64102 488d0cc3 48890d???????? }
            // n = 4, score = 1100
            //   48890d????????       |                     
            //   410fb64102           | sub                 esp, 0xc
            //   488d0cc3             | and                 dword ptr [ebp - 8], 0
            //   48890d????????       |                     

        $sequence_90 = { 33d2 498bcc 498bfd e8???????? }
            // n = 4, score = 1100
            //   33d2                 | dec                 eax
            //   498bcc               | cmp                 eax, -1
            //   498bfd               | dec                 esp
            //   e8????????           |                     

        $sequence_91 = { 83ff03 72d6 eb13 ff75fc 6a00 ff35???????? }
            // n = 6, score = 1100
            //   83ff03               | push                eax
            //   72d6                 | push                eax
            //   eb13                 | xor                 eax, eax
            //   ff75fc               | cmp                 eax, edi
            //   6a00                 | je                  0x15
            //   ff35????????         |                     

        $sequence_92 = { 8a4b1c 488b4558 4c8b4d30 4c8b4510 }
            // n = 4, score = 1100
            //   8a4b1c               | jne                 0x171
            //   488b4558             | mov                 eax, dword ptr [ebx + 0x48]
            //   4c8b4d30             | jne                 0x12
            //   4c8b4510             | dec                 eax

        $sequence_93 = { 33db 895d08 eb03 8b5d08 }
            // n = 4, score = 1100
            //   33db                 | xor                 ebx, ebx
            //   895d08               | mov                 dword ptr [ebp + 8], ebx
            //   eb03                 | jmp                 5
            //   8b5d08               | mov                 ebx, dword ptr [ebp + 8]

        $sequence_94 = { 50 57 e8???????? e9???????? 68???????? }
            // n = 5, score = 1100
            //   50                   | push                eax
            //   57                   | push                edi
            //   e8????????           |                     
            //   e9????????           |                     
            //   68????????           |                     

        $sequence_95 = { 48890d???????? 410fb64103 488d0cc3 48890d???????? }
            // n = 4, score = 1100
            //   48890d????????       |                     
            //   410fb64103           | push                edi
            //   488d0cc3             | push                eax
            //   48890d????????       |                     

        $sequence_96 = { 488bce ff15???????? 488b0d???????? 33d2 4c63c0 }
            // n = 5, score = 1100
            //   488bce               | pop                 eax
            //   ff15????????         |                     
            //   488b0d????????       |                     
            //   33d2                 | jmp                 4
            //   4c63c0               | xor                 eax, eax

        $sequence_97 = { ff15???????? 4885db 740c 4c8b0d???????? }
            // n = 4, score = 1100
            //   ff15????????         |                     
            //   4885db               | push                ebp
            //   740c                 | mov                 ebp, esp
            //   4c8b0d????????       |                     

        $sequence_98 = { 33d2 ff15???????? 483bc3 4c8be8 }
            // n = 4, score = 1100
            //   33d2                 | and                 dword ptr [ebp - 8], 0
            //   ff15????????         |                     
            //   483bc3               | ret                 4
            //   4c8be8               | push                ebp

        $sequence_99 = { 33d2 488d0cc3 48890d???????? 410fb64102 }
            // n = 4, score = 1100
            //   33d2                 | ret                 4
            //   488d0cc3             | push                ebp
            //   48890d????????       |                     
            //   410fb64102           | mov                 ebp, esp

        $sequence_100 = { 4103ee 4883c608 83fd05 72c1 }
            // n = 4, score = 1100
            //   4103ee               | lea                 eax, [ebx + 1]
            //   4883c608             | dec                 eax
            //   83fd05               | cmp                 eax, ebx
            //   72c1                 | dec                 eax

        $sequence_101 = { ff15???????? 488bcf 48870d???????? 483bcf 7405 e8???????? }
            // n = 6, score = 1100
            //   ff15????????         |                     
            //   488bcf               | push                esi
            //   48870d????????       |                     
            //   483bcf               | mov                 esi, ecx
            //   7405                 | add                 eax, 0xfffffefe
            //   e8????????           |                     

        $sequence_102 = { 448be8 418b4310 41394308 410f474308 4533c0 }
            // n = 5, score = 1100
            //   448be8               | push                dword ptr [ebp + 0xc]
            //   418b4310             | push                ebx
            //   41394308             | mov                 ebx, 0xea60
            //   410f474308           | push                ebx
            //   4533c0               | push                dword ptr [ebp + 0xc]

        $sequence_103 = { 753e ff7618 8b3d???????? ffd7 ff761c ffd7 53 }
            // n = 7, score = 1000
            //   753e                 | jne                 0x40
            //   ff7618               | push                dword ptr [esi + 0x18]
            //   8b3d????????         |                     
            //   ffd7                 | call                edi
            //   ff761c               | push                dword ptr [esi + 0x1c]
            //   ffd7                 | call                edi
            //   53                   | push                ebx

        $sequence_104 = { 8b02 43 8acb d3c0 33c6 33442410 }
            // n = 6, score = 1000
            //   8b02                 | mov                 eax, dword ptr [edx]
            //   43                   | inc                 ebx
            //   8acb                 | mov                 cl, bl
            //   d3c0                 | rol                 eax, cl
            //   33c6                 | xor                 eax, esi
            //   33442410             | xor                 eax, dword ptr [esp + 0x10]

        $sequence_105 = { eb08 488bce e8???????? 488b5c2440 488b742448 488bc7 }
            // n = 6, score = 1000
            //   eb08                 | xor                 eax, eax
            //   488bce               | je                  0x1d
            //   e8????????           |                     
            //   488b5c2440           | push                eax
            //   488b742448           | xor                 eax, eax
            //   488bc7               | cmp                 eax, edi

        $sequence_106 = { 8b3d???????? 56 ffd7 53 56 ffd7 }
            // n = 6, score = 1000
            //   8b3d????????         |                     
            //   56                   | cmp                 eax, edi
            //   ffd7                 | push                eax
            //   53                   | add                 esp, 0xc
            //   56                   | cmp                 eax, edi
            //   ffd7                 | mov                 dword ptr [ebp - 0x10], eax

        $sequence_107 = { 8bf1 05fefeffff 33db 33c9 }
            // n = 4, score = 1000
            //   8bf1                 | dec                 ecx
            //   05fefeffff           | sub                 esi, esi
            //   33db                 | jne                 0xffffffe4
            //   33c9                 | dec                 eax

        $sequence_108 = { c9 c20400 53 56 8bf0 8a06 }
            // n = 6, score = 1000
            //   c9                   | pop                 ebp
            //   c20400               | inc                 ecx
            //   53                   | pop                 esp
            //   56                   | mov                 esi, 1
            //   8bf0                 | mov                 eax, esi
            //   8a06                 | dec                 eax

        $sequence_109 = { 5b c3 a1???????? 83c040 }
            // n = 4, score = 1000
            //   5b                   | add                 esp, 0xc
            //   c3                   | cmp                 eax, edi
            //   a1????????           |                     
            //   83c040               | mov                 dword ptr [ebp - 0x10], eax

        $sequence_110 = { ff15???????? 8ac3 5b c9 c20400 53 }
            // n = 6, score = 1000
            //   ff15????????         |                     
            //   8ac3                 | dec                 eax
            //   5b                   | add                 esp, 0x40
            //   c9                   | inc                 ecx
            //   c20400               | pop                 esi
            //   53                   | inc                 ecx

        $sequence_111 = { 8bf0 8932 83c204 ff4c240c 75e6 }
            // n = 5, score = 1000
            //   8bf0                 | mov                 esi, eax
            //   8932                 | mov                 dword ptr [edx], esi
            //   83c204               | add                 edx, 4
            //   ff4c240c             | dec                 dword ptr [esp + 0xc]
            //   75e6                 | jne                 0xffffffe8

        $sequence_112 = { ff4c240c 75e6 5e 5b c20800 }
            // n = 5, score = 1000
            //   ff4c240c             | dec                 dword ptr [esp + 0xc]
            //   75e6                 | jne                 0xffffffe8
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx
            //   c20800               | ret                 8

        $sequence_113 = { 832700 458be0 bb08000000 e8???????? 85c0 }
            // n = 5, score = 900
            //   832700               | push                dword ptr [ebp + 0x10]
            //   458be0               | push                dword ptr [ebp + 8]
            //   bb08000000           | mov                 eax, esi
            //   e8????????           |                     
            //   85c0                 | mov                 eax, dword ptr [esi]

        $sequence_114 = { 4c8bc7 33d2 ff15???????? 33ff 4885ff }
            // n = 5, score = 900
            //   4c8bc7               | push                eax
            //   33d2                 | push                0x10
            //   ff15????????         |                     
            //   33ff                 | pop                 eax
            //   4885ff               | cmp                 eax, edi

        $sequence_115 = { 488bd6 ff15???????? eb14 488b0d???????? 4c8bc7 33d2 }
            // n = 6, score = 900
            //   488bd6               | push                0x10
            //   ff15????????         |                     
            //   eb14                 | xor                 eax, eax
            //   488b0d????????       |                     
            //   4c8bc7               | cmp                 eax, edi
            //   33d2                 | je                  0x17

        $sequence_116 = { e8???????? 483bc3 488be8 0f84de000000 83c8ff 48895c2430 }
            // n = 6, score = 900
            //   e8????????           |                     
            //   483bc3               | mov                 ebx, 0xea60
            //   488be8               | push                ebx
            //   0f84de000000         | jne                 7
            //   83c8ff               | push                ebx
            //   48895c2430           | mov                 ebx, 0xea60

        $sequence_117 = { ff35???????? ffd3 8bd8 85db 7476 }
            // n = 5, score = 900
            //   ff35????????         |                     
            //   ffd3                 | dec                 eax
            //   8bd8                 | add                 esp, 0x40
            //   85db                 | inc                 ecx
            //   7476                 | pop                 esi

        $sequence_118 = { 50 8d442430 50 8d442428 50 8d442428 50 }
            // n = 7, score = 900
            //   50                   | mov                 eax, dword ptr [edi + 0x54]
            //   8d442430             | test                al, 4
            //   50                   | mov                 esi, 1
            //   8d442428             | mov                 eax, esi
            //   50                   | dec                 eax
            //   8d442428             | add                 esp, 0x40
            //   50                   | inc                 ecx

        $sequence_119 = { ff15???????? 488d542440 488bcd ff15???????? 4883f8ff 4c8be0 }
            // n = 6, score = 900
            //   ff15????????         |                     
            //   488d542440           | jne                 7
            //   488bcd               | push                ebx
            //   ff15????????         |                     
            //   4883f8ff             | mov                 ebx, 0xea60
            //   4c8be0               | push                ebx

        $sequence_120 = { 4883f8ff 4c8be0 0f8583000000 488b0d???????? 4d8bc5 33d2 }
            // n = 6, score = 900
            //   4883f8ff             | push                ebp
            //   4c8be0               | mov                 ebp, esp
            //   0f8583000000         | sub                 esp, 0xc
            //   488b0d????????       |                     
            //   4d8bc5               | and                 dword ptr [ebp - 8], 0
            //   33d2                 | push                4

        $sequence_121 = { e9???????? 33c9 bb26040000 48870d???????? }
            // n = 4, score = 900
            //   e9????????           |                     
            //   33c9                 | push                ecx
            //   bb26040000           | mov                 eax, edi
            //   48870d????????       |                     

        $sequence_122 = { 488bc8 41b905000000 488bd8 ff15???????? }
            // n = 4, score = 900
            //   488bc8               | mov                 eax, dword ptr [esi]
            //   41b905000000         | mov                 ecx, dword ptr [eax]
            //   488bd8               | push                edi
            //   ff15????????         |                     

        $sequence_123 = { 8d45fc 50 ff750c 33ff ff7508 217dfc e8???????? }
            // n = 7, score = 900
            //   8d45fc               | push                ebx
            //   50                   | cmp                 edi, esi
            //   ff750c               | je                  0x17
            //   33ff                 | push                edi
            //   ff7508               | push                ebx
            //   217dfc               | push                esi
            //   e8????????           |                     

        $sequence_124 = { 488bce ff15???????? 4c8d4c2450 4c8d442458 8d5001 }
            // n = 5, score = 900
            //   488bce               | xor                 eax, eax
            //   ff15????????         |                     
            //   4c8d4c2450           | cmp                 eax, edi
            //   4c8d442458           | je                  0x17
            //   8d5001               | push                eax

        $sequence_125 = { 66ba2e00 ff15???????? 488bf0 488d44246c 2bf0 443bf3 }
            // n = 6, score = 900
            //   66ba2e00             | push                ebx
            //   ff15????????         |                     
            //   488bf0               | push                dword ptr [ebp + 0xc]
            //   488d44246c           | jne                 7
            //   2bf0                 | push                ebx
            //   443bf3               | mov                 ebx, 0xea60

        $sequence_126 = { 4533c9 4889442428 215c2420 4533c0 }
            // n = 4, score = 900
            //   4533c9               | mov                 eax, esi
            //   4889442428           | mov                 eax, dword ptr [esi]
            //   215c2420             | mov                 ecx, dword ptr [eax]
            //   4533c0               | mov                 eax, esi

        $sequence_127 = { 7404 3bfe 754f 488d4c246c 66ba2e00 ff15???????? }
            // n = 6, score = 900
            //   7404                 | push                ebx
            //   3bfe                 | mov                 ebx, 0xea60
            //   754f                 | push                ebx
            //   488d4c246c           | push                dword ptr [ebp + 0xc]
            //   66ba2e00             | jne                 7
            //   ff15????????         |                     

        $sequence_128 = { 4c8d442458 8d5001 488bce e8???????? }
            // n = 4, score = 900
            //   4c8d442458           | cmp                 eax, edi
            //   8d5001               | je                  0x19
            //   488bce               | push                eax
            //   e8????????           |                     

        $sequence_129 = { 7416 a1???????? 83c004 50 be???????? e8???????? }
            // n = 6, score = 900
            //   7416                 | pop                 esi
            //   a1????????           |                     
            //   83c004               | pop                 ebp
            //   50                   | pop                 ebx
            //   be????????           |                     
            //   e8????????           |                     

        $sequence_130 = { a1???????? 25efff0000 0bc2 e9???????? }
            // n = 4, score = 800
            //   a1????????           |                     
            //   25efff0000           | and                 eax, 0xffef
            //   0bc2                 | or                  eax, edx
            //   e9????????           |                     

        $sequence_131 = { 448bc0 8bd8 33d2 4983c001 }
            // n = 4, score = 800
            //   448bc0               | push                dword ptr [ebp - 4]
            //   8bd8                 | push                esi
            //   33d2                 | push                ebx
            //   4983c001             | je                  0x12

        $sequence_132 = { 803f2a 750b 4883c701 83c3ff }
            // n = 4, score = 800
            //   803f2a               | mov                 eax, 0x800
            //   750b                 | push                eax
            //   4883c701             | push                esi
            //   83c3ff               | mov                 dword ptr [ebp - 8], eax

        $sequence_133 = { 6a03 8935???????? 8935???????? 8935???????? }
            // n = 4, score = 800
            //   6a03                 | push                3
            //   8935????????         |                     
            //   8935????????         |                     
            //   8935????????         |                     

        $sequence_134 = { 53 56 8bf1 05fefeffff }
            // n = 4, score = 800
            //   53                   | mov                 dword ptr [edi + ecx], eax
            //   56                   | dec                 eax
            //   8bf1                 | add                 edi, 8
            //   05fefeffff           | dec                 ecx

        $sequence_135 = { e9???????? 488bcb ff15???????? a810 }
            // n = 4, score = 800
            //   e9????????           |                     
            //   488bcb               | add                 eax, 0xc
            //   ff15????????         |                     
            //   a810                 | dec                 esp

        $sequence_136 = { 4c63c0 33d2 4983c00c ff15???????? }
            // n = 4, score = 800
            //   4c63c0               | dec                 eax
            //   33d2                 | add                 esp, 0x40
            //   4983c00c             | inc                 ecx
            //   ff15????????         |                     

        $sequence_137 = { 57 895df4 895df0 c745f857000000 bf19010000 }
            // n = 5, score = 800
            //   57                   | dec                 ecx
            //   895df4               | sub                 esi, esi
            //   895df0               | jne                 0xffffffe4
            //   c745f857000000       | dec                 eax
            //   bf19010000           | mov                 ecx, dword ptr [edi + ecx]

        $sequence_138 = { 41be01000000 33c9 418bd6 ff15???????? }
            // n = 4, score = 800
            //   41be01000000         | xor                 eax, eax
            //   33c9                 | xor                 edx, edx
            //   418bd6               | test                eax, eax
            //   ff15????????         |                     

        $sequence_139 = { 488bc8 e8???????? 85c0 740f 488d4f50 488bd6 ff15???????? }
            // n = 7, score = 800
            //   488bc8               | pop                 ecx
            //   e8????????           |                     
            //   85c0                 | ret                 4
            //   740f                 | pop                 ebx
            //   488d4f50             | pop                 ecx
            //   488bd6               | ret                 4
            //   ff15????????         |                     

        $sequence_140 = { 4533c0 33d2 ff15???????? 85c0 7511 ff15???????? }
            // n = 6, score = 800
            //   4533c0               | add                 eax, 0xc
            //   33d2                 | dec                 esp
            //   ff15????????         |                     
            //   85c0                 | arpl                ax, ax
            //   7511                 | xor                 edx, edx
            //   ff15????????         |                     

        $sequence_141 = { 8bc7 e8???????? 8d4618 8b08 50 51 ff7614 }
            // n = 7, score = 700
            //   8bc7                 | mov                 eax, edi
            //   e8????????           |                     
            //   8d4618               | lea                 eax, [esi + 0x18]
            //   8b08                 | mov                 ecx, dword ptr [eax]
            //   50                   | push                eax
            //   51                   | push                ecx
            //   ff7614               | push                dword ptr [esi + 0x14]

        $sequence_142 = { 5e 33c0 c9 c20400 55 8bec 51 }
            // n = 7, score = 700
            //   5e                   | push                ebp
            //   33c0                 | inc                 ecx
            //   c9                   | push                esi
            //   c20400               | dec                 eax
            //   55                   | sub                 esp, 0x20
            //   8bec                 | dec                 esp
            //   51                   | mov                 esi, edx

        $sequence_143 = { 57 4154 4155 4156 4883ec50 488bf1 }
            // n = 6, score = 700
            //   57                   | xor                 edx, edx
            //   4154                 | test                eax, eax
            //   4155                 | and                 dword ptr [esp + 0x20], ebx
            //   4156                 | inc                 ebp
            //   4883ec50             | xor                 ecx, ecx
            //   488bf1               | inc                 ebp

        $sequence_144 = { 8bc6 e8???????? 8b06 8b08 }
            // n = 4, score = 700
            //   8bc6                 | sub                 esi, esi
            //   e8????????           |                     
            //   8b06                 | jne                 0xffffffe4
            //   8b08                 | inc                 ecx

        $sequence_145 = { 488d542438 488bcb e8???????? eb02 }
            // n = 4, score = 700
            //   488d542438           | cmp                 eax, edi
            //   488bcb               | je                  0x15
            //   e8????????           |                     
            //   eb02                 | push                eax

        $sequence_146 = { 488b0d???????? 4889040f 4883c708 492bf6 75db }
            // n = 5, score = 700
            //   488b0d????????       |                     
            //   4889040f             | mov                 esi, 1
            //   4883c708             | xor                 ecx, ecx
            //   492bf6               | inc                 ecx
            //   75db                 | mov                 edx, esi

        $sequence_147 = { 6a20 40 50 ffd6 }
            // n = 4, score = 700
            //   6a20                 | mov                 dword ptr [eax + 0x20], edi
            //   40                   | inc                 ecx
            //   50                   | push                esp
            //   ffd6                 | inc                 ecx

        $sequence_148 = { 750a 488bcf e8???????? 8bd8 488b0d???????? 4c8bc7 }
            // n = 6, score = 700
            //   750a                 | jne                 0x1d
            //   488bcf               | inc                 ecx
            //   e8????????           |                     
            //   8bd8                 | mov                 esi, 1
            //   488b0d????????       |                     
            //   4c8bc7               | xor                 ecx, ecx

        $sequence_149 = { 5f c20400 55 8bec 83e4f8 81ec9c000000 }
            // n = 6, score = 700
            //   5f                   | push                eax
            //   c20400               | lea                 eax, [ebp + 8]
            //   55                   | push                eax
            //   8bec                 | push                ebx
            //   83e4f8               | mov                 eax, esi
            //   81ec9c000000         | jne                 0x31

        $sequence_150 = { e8???????? 4883c428 c3 488d82204a0000 488982284a0000 488900 }
            // n = 6, score = 600
            //   e8????????           |                     
            //   4883c428             | mov                 ebx, eax
            //   c3                   | push                eax
            //   488d82204a0000       | push                esi
            //   488982284a0000       | mov                 dword ptr [ebp - 8], eax
            //   488900               | mov                 ebx, eax

        $sequence_151 = { 418bcd e8???????? 8b842410020000 4c8d9c24f0010000 498b5b28 498b7330 498be3 }
            // n = 7, score = 600
            //   418bcd               | push                eax
            //   e8????????           |                     
            //   8b842410020000       | push                0x10
            //   4c8d9c24f0010000     | pop                 eax
            //   498b5b28             | cmp                 eax, edi
            //   498b7330             | je                  0xa
            //   498be3               | push                eax

        $sequence_152 = { 7417 4863461c 2b6e1c 4c03e8 488b4610 48894718 }
            // n = 6, score = 600
            //   7417                 | je                  0x15
            //   4863461c             | push                eax
            //   2b6e1c               | push                0x10
            //   4c03e8               | pop                 eax
            //   488b4610             | pop                 eax
            //   48894718             | cmp                 eax, edi

        $sequence_153 = { 21442428 488b8c2428020000 488364242000 448d4803 4533c0 }
            // n = 5, score = 600
            //   21442428             | push                eax
            //   488b8c2428020000     | push                0x10
            //   488364242000         | pop                 eax
            //   448d4803             | cmp                 eax, edi
            //   4533c0               | je                  0xd

        $sequence_154 = { 3bc3 741b e8???????? 85c0 7412 ff7508 }
            // n = 6, score = 600
            //   3bc3                 | jmp                 0xf
            //   741b                 | xor                 edi, edi
            //   e8????????           |                     
            //   85c0                 | jmp                 0xb
            //   7412                 | mov                 eax, dword ptr [ebp + 0xc]
            //   ff7508               | mov                 dword ptr [eax], esi

        $sequence_155 = { 807de502 764d 0fb645e5 83c0fe 33c9 3bc3 7e0f }
            // n = 7, score = 600
            //   807de502             | jmp                 0x3a
            //   764d                 | push                0
            //   0fb645e5             | je                  0xa
            //   83c0fe               | push                dword ptr [ebp + 8]
            //   33c9                 | mov                 eax, edi
            //   3bc3                 | pop                 edi
            //   7e0f                 | test                edi, edi

        $sequence_156 = { 488bcb ff15???????? 8bc8 ff15???????? 21b42410020000 }
            // n = 5, score = 600
            //   488bcb               | push                eax
            //   ff15????????         |                     
            //   8bc8                 | push                0x10
            //   ff15????????         |                     
            //   21b42410020000       | pop                 eax

        $sequence_157 = { 21b42410020000 eb0d ff15???????? 89842410020000 488bcb ff15???????? 8b842410020000 }
            // n = 7, score = 600
            //   21b42410020000       | pop                 eax
            //   eb0d                 | cmp                 eax, edi
            //   ff15????????         |                     
            //   89842410020000       | push                eax
            //   488bcb               | push                0x10
            //   ff15????????         |                     
            //   8b842410020000       | pop                 eax

        $sequence_158 = { 448d4803 4533c0 488bd3 ff15???????? 488b8c2428020000 8bf0 }
            // n = 6, score = 600
            //   448d4803             | push                eax
            //   4533c0               | push                0x10
            //   488bd3               | pop                 eax
            //   ff15????????         |                     
            //   488b8c2428020000     | cmp                 eax, edi
            //   8bf0                 | je                  0xb

        $sequence_159 = { 4154 4155 4881ecf0010000 33f6 33c0 }
            // n = 5, score = 600
            //   4154                 | cmp                 eax, edi
            //   4155                 | je                  0x1b
            //   4881ecf0010000       | push                eax
            //   33f6                 | push                0x10
            //   33c0                 | jmp                 4

        $sequence_160 = { 85c0 0f85e8000000 488b4608 488b0e }
            // n = 4, score = 500
            //   85c0                 | inc                 ebp
            //   0f85e8000000         | xor                 eax, eax
            //   488b4608             | dec                 eax
            //   488b0e               | mov                 ecx, ebx

        $sequence_161 = { 7415 397b44 7510 488b0b e8???????? 85c0 0f859b000000 }
            // n = 7, score = 500
            //   7415                 | inc                 ecx
            //   397b44               | mov                 ecx, ebp
            //   7510                 | mov                 eax, dword ptr [esp + 0x210]
            //   488b0b               | dec                 esp
            //   e8????????           |                     
            //   85c0                 | lea                 ebx, [esp + 0x1f0]
            //   0f859b000000         | and                 dword ptr [esp + 0x28], eax

        $sequence_162 = { 8b434c 84c0 0f89a3000000 8b434c }
            // n = 4, score = 500
            //   8b434c               | mov                 ecx, dword ptr [esp + 0x228]
            //   84c0                 | dec                 eax
            //   0f89a3000000         | and                 dword ptr [esp + 0x20], 0
            //   8b434c               | inc                 esp

        $sequence_163 = { e8???????? 488b0d???????? 4c8bc3 33d2 ff15???????? 488b0d???????? 4c8bc7 }
            // n = 7, score = 500
            //   e8????????           |                     
            //   488b0d????????       |                     
            //   4c8bc3               | cmp                 edi, esi
            //   33d2                 | je                  0x12
            //   ff15????????         |                     
            //   488b0d????????       |                     
            //   4c8bc7               | push                edi

        $sequence_164 = { 4c8d40cc 33d2 33c9 e8???????? 85c0 0f8561010000 }
            // n = 6, score = 500
            //   4c8d40cc             | inc                 ecx
            //   33d2                 | push                esp
            //   33c9                 | inc                 ecx
            //   e8????????           |                     
            //   85c0                 | push                ebp
            //   0f8561010000         | dec                 eax

        $sequence_165 = { ffc1 807c043000 7531 8bd3 2bd1 }
            // n = 5, score = 500
            //   ffc1                 | inc                 ecx
            //   807c043000           | push                esp
            //   7531                 | inc                 ecx
            //   8bd3                 | push                ebp
            //   2bd1                 | inc                 ecx

        $sequence_166 = { 33db 89442430 e8???????? 483bc3 488905???????? 0f84b9020000 }
            // n = 6, score = 500
            //   33db                 | test                byte ptr [eax + 4], 8
            //   89442430             | jne                 0x34
            //   e8????????           |                     
            //   483bc3               | push                ebx
            //   488905????????       |                     
            //   0f84b9020000         | push                1

        $sequence_167 = { 448bcf 4533c0 e8???????? 483bc3 488905???????? 0f84b5000000 }
            // n = 6, score = 500
            //   448bcf               | push                esi
            //   4533c0               | jne                 0x30
            //   e8????????           |                     
            //   483bc3               | push                ebx
            //   488905????????       |                     
            //   0f84b5000000         | push                1

        $sequence_168 = { 8b4348 a801 742c 488b0b e8???????? 85c0 0f85e8000000 }
            // n = 7, score = 500
            //   8b4348               | and                 dword ptr [esp + 0x20], 0
            //   a801                 | inc                 esp
            //   742c                 | lea                 ecx, [eax + 3]
            //   488b0b               | inc                 ebp
            //   e8????????           |                     
            //   85c0                 | xor                 eax, eax
            //   0f85e8000000         | dec                 eax

        $sequence_169 = { 85c0 0f8561010000 8b4348 a801 }
            // n = 4, score = 500
            //   85c0                 | inc                 ebp
            //   0f8561010000         | xor                 eax, eax
            //   8b4348               | dec                 eax
            //   a801                 | mov                 edx, ebx

        $sequence_170 = { 85c0 0f859b000000 4863533c 488b4608 }
            // n = 4, score = 500
            //   85c0                 | lea                 ecx, [eax + 3]
            //   0f859b000000         | inc                 ebp
            //   4863533c             | xor                 eax, eax
            //   488b4608             | dec                 eax

        $sequence_171 = { 488bf8 4885c0 7427 488d542420 b901020000 }
            // n = 5, score = 400
            //   488bf8               | dec                 ecx
            //   4885c0               | mov                 ecx, esp
            //   7427                 | jmp                 0xc
            //   488d542420           | add                 ebx, 1
            //   b901020000           | dec                 eax

        $sequence_172 = { ba10000000 488bc8 e8???????? 48898424e0010000 4885c0 }
            // n = 5, score = 400
            //   ba10000000           | mov                 dword ptr [ebp + ebx*8], esp
            //   488bc8               | add                 ebx, 1
            //   e8????????           |                     
            //   48898424e0010000     | dec                 eax
            //   4885c0               | test                edi, edi

        $sequence_173 = { e8???????? 8bd8 85c0 0f85f3010000 4c8b842418020000 8d5808 488d8c24b0000000 }
            // n = 7, score = 400
            //   e8????????           |                     
            //   8bd8                 | dec                 eax
            //   85c0                 | mov                 eax, dword ptr [ebp + 0x58]
            //   0f85f3010000         | dec                 esp
            //   4c8b842418020000     | mov                 ecx, dword ptr [ebp + 0x30]
            //   8d5808               | dec                 esp
            //   488d8c24b0000000     | mov                 eax, dword ptr [ebp + 0x10]

        $sequence_174 = { 458bf9 33ff e8???????? 4c8be8 4885c0 7508 }
            // n = 6, score = 400
            //   458bf9               | inc                 ecx
            //   33ff                 | add                 ebp, esi
            //   e8????????           |                     
            //   4c8be8               | dec                 eax
            //   4885c0               | add                 esi, 8
            //   7508                 | cmp                 ebp, 5

        $sequence_175 = { ff15???????? 488b0d???????? 03c6 33d2 468d44385f ff15???????? 4c8bf0 }
            // n = 7, score = 400
            //   ff15????????         |                     
            //   488b0d????????       |                     
            //   03c6                 | jb                  0xffffffca
            //   33d2                 | jmp                 0x17
            //   468d44385f           | mov                 ebx, 0x7f
            //   ff15????????         |                     
            //   4c8bf0               | jmp                 0x17

        $sequence_176 = { 4c89642448 ff15???????? 8bd8 83f8ff }
            // n = 4, score = 400
            //   4c89642448           | jmp                 7
            //   ff15????????         |                     
            //   8bd8                 | xor                 ebx, ebx
            //   83f8ff               | mov                 ebx, 1

        $sequence_177 = { 488d542420 b901020000 ff15???????? 85c0 7513 }
            // n = 5, score = 400
            //   488d542420           | mov                 dword ptr [esi], ebp
            //   b901020000           | jb                  0xffffffc3
            //   ff15????????         |                     
            //   85c0                 | jmp                 0xe
            //   7513                 | mov                 ebx, 0x7f

        $sequence_178 = { 4885c0 7508 8d5f08 e9???????? 8b842420020000 4c8b442440 }
            // n = 6, score = 400
            //   4885c0               | xor                 edx, edx
            //   7508                 | dec                 ecx
            //   8d5f08               | mov                 ecx, esp
            //   e9????????           |                     
            //   8b842420020000       | dec                 ecx
            //   4c8b442440           | mov                 edi, ebp

        $sequence_179 = { 3b5c2428 0f8266ffffff 5f 5e 89e8 5d 5b }
            // n = 7, score = 300
            //   3b5c2428             | add                 esp, 0xc
            //   0f8266ffffff         | cmp                 eax, edi
            //   5f                   | mov                 dword ptr [ebp - 0x10], eax
            //   5e                   | push                eax
            //   89e8                 | add                 esp, 0xc
            //   5d                   | cmp                 eax, edi
            //   5b                   | push                0x64

        $sequence_180 = { 01f2 6683f9ff 896c2428 7508 8b5304 }
            // n = 5, score = 300
            //   01f2                 | push                edi
            //   6683f9ff             | push                eax
            //   896c2428             | add                 esp, 0xc
            //   7508                 | cmp                 eax, edi
            //   8b5304               | push                eax

        $sequence_181 = { 89e5 8b4508 8b4d0c 8b5510 31db 90 89ce }
            // n = 7, score = 300
            //   89e5                 | dec                 esp
            //   8b4508               | mov                 esp, edi
            //   8b4d0c               | jne                 0xffffffcc
            //   8b5510               | dec                 eax
            //   31db                 | mov                 dword ptr [esi], ebp
            //   90                   | dec                 ecx
            //   89ce                 | mov                 ecx, esp

        $sequence_182 = { 8b4508 03450c 034510 39d0 75c3 5e }
            // n = 6, score = 300
            //   8b4508               | mov                 dword ptr [esi], ebp
            //   03450c               | jmp                 7
            //   034510               | xor                 ebx, ebx
            //   39d0                 | mov                 byte ptr [esi + 8], bl
            //   75c3                 | dec                 eax
            //   5e                   | test                edi, edi

        $sequence_183 = { 8b5304 83c304 01f2 8b4c241c 01d1 }
            // n = 5, score = 300
            //   8b5304               | push                eax
            //   83c304               | cmp                 ebx, edi
            //   01f2                 | je                  0x19
            //   8b4c241c             | cmp                 eax, edi
            //   01d1                 | je                  8

        $sequence_184 = { 66837b0200 7451 0fb70b 0fb76b02 0fb7d1 01f2 }
            // n = 6, score = 300
            //   66837b0200           | push                eax
            //   7451                 | cmp                 ebx, edi
            //   0fb70b               | je                  0x1b
            //   0fb76b02             | add                 ebx, 1
            //   0fb7d1               | dec                 eax
            //   01f2                 | test                edi, edi

        $sequence_185 = { 01cb 30c9 eb59 8b4c242c }
            // n = 4, score = 300
            //   01cb                 | push                eax
            //   30c9                 | add                 esp, 0xc
            //   eb59                 | cmp                 eax, edi
            //   8b4c242c             | mov                 dword ptr [ebp - 0x10], eax

        $sequence_186 = { 56 90 57 51 8b742420 8b7c241c 8b4c2434 }
            // n = 7, score = 300
            //   56                   | add                 esp, 0xc
            //   90                   | cmp                 eax, edi
            //   57                   | mov                 dword ptr [ebp - 0x10], eax
            //   51                   | add                 esp, 0xc
            //   8b742420             | cmp                 eax, edi
            //   8b7c241c             | mov                 dword ptr [ebp - 0x10], eax
            //   8b4c2434             | push                edi

    condition:
        7 of them and filesize < 2940928
}
Download all Yara Rules