SYMBOLCOMMON_NAMEaka. SYNONYMS
win.ismagent (Back to overview)

ISMAgent

Actor(s): Greenbug, APT34


There is no description at this point.

References
2022-07-18Palo Alto Networks Unit 42Unit 42
@online{42:20220718:evasive:ccfb062, author = {Unit 42}, title = {{Evasive Serpens}}, date = {2022-07-18}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/atoms/evasive-serpens/}, language = {English}, urldate = {2022-07-29} } Evasive Serpens
TwoFace ISMAgent ISMDoor OopsIE RDAT OilRig
2020-05-19SymantecCritical Attack Discovery and Intelligence Team
@online{team:20200519:sophisticated:023b1bd, author = {Critical Attack Discovery and Intelligence Team}, title = {{Sophisticated Espionage Group Turns Attention to Telecom Providers in South Asia}}, date = {2020-05-19}, organization = {Symantec}, url = {https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/greenbug-espionage-telco-south-asia}, language = {English}, urldate = {2020-05-20} } Sophisticated Espionage Group Turns Attention to Telecom Providers in South Asia
ISMAgent ISMDoor
2019-08-22CywareCyware
@online{cyware:20190822:apt34:3439fde, author = {Cyware}, title = {{APT34: The Helix Kitten Cybercriminal Group Loves to Meow Middle Eastern and International Organizations}}, date = {2019-08-22}, organization = {Cyware}, url = {https://cyware.com/blog/apt34-the-helix-kitten-cybercriminal-group-loves-to-meow-middle-eastern-and-international-organizations-48ae}, language = {English}, urldate = {2021-06-29} } APT34: The Helix Kitten Cybercriminal Group Loves to Meow Middle Eastern and International Organizations
TwoFace BONDUPDATER POWRUNER QUADAGENT Helminth ISMAgent Karkoff LONGWATCH OopsIE PICKPOCKET RGDoor VALUEVAULT
2019-04-16Robert Falcone
@online{falcone:20190416:dns:fed953e, author = {Robert Falcone}, title = {{DNS Tunneling in the Wild: Overview of OilRig’s DNS Tunneling}}, date = {2019-04-16}, url = {https://unit42.paloaltonetworks.com/dns-tunneling-in-the-wild-overview-of-oilrigs-dns-tunneling/}, language = {English}, urldate = {2019-12-03} } DNS Tunneling in the Wild: Overview of OilRig’s DNS Tunneling
BONDUPDATER QUADAGENT Alma Communicator Helminth ISMAgent
2017-08-28ClearSkyClearSky Research Team
@online{team:20170828:recent:fab1e53, author = {ClearSky Research Team}, title = {{Recent ISMAgent Samples and Infrastructure by Iranian Threat Group GreenBug}}, date = {2017-08-28}, organization = {ClearSky}, url = {http://www.clearskysec.com/ismagent/}, language = {English}, urldate = {2019-12-19} } Recent ISMAgent Samples and Infrastructure by Iranian Threat Group GreenBug
ISMAgent
Yara Rules
[TLP:WHITE] win_ismagent_auto (20230715 | Detects win.ismagent.)
rule win_ismagent_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.ismagent."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ismagent"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 03048d48404200 50 ff15???????? 5d }
            // n = 4, score = 200
            //   03048d48404200       | add                 eax, dword ptr [ecx*4 + 0x424048]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   5d                   | pop                 ebp

        $sequence_1 = { 68a0860100 e8???????? ba???????? 89442444 8bf8 }
            // n = 5, score = 200
            //   68a0860100           | push                0x186a0
            //   e8????????           |                     
            //   ba????????           |                     
            //   89442444             | mov                 dword ptr [esp + 0x44], eax
            //   8bf8                 | mov                 edi, eax

        $sequence_2 = { 81f900000200 741c 81f900000400 7542 0c80 88441628 8b04bd48404200 }
            // n = 7, score = 200
            //   81f900000200         | cmp                 ecx, 0x20000
            //   741c                 | je                  0x1e
            //   81f900000400         | cmp                 ecx, 0x40000
            //   7542                 | jne                 0x44
            //   0c80                 | or                  al, 0x80
            //   88441628             | mov                 byte ptr [esi + edx + 0x28], al
            //   8b04bd48404200       | mov                 eax, dword ptr [edi*4 + 0x424048]

        $sequence_3 = { ff751c 57 ffd3 84c0 7405 833e00 }
            // n = 6, score = 200
            //   ff751c               | push                dword ptr [ebp + 0x1c]
            //   57                   | push                edi
            //   ffd3                 | call                ebx
            //   84c0                 | test                al, al
            //   7405                 | je                  7
            //   833e00               | cmp                 dword ptr [esi], 0

        $sequence_4 = { 84c0 744d 8b9db8f3ffff 8dbdc0f7ffff 33f6 8d0433 50 }
            // n = 7, score = 200
            //   84c0                 | test                al, al
            //   744d                 | je                  0x4f
            //   8b9db8f3ffff         | mov                 ebx, dword ptr [ebp - 0xc48]
            //   8dbdc0f7ffff         | lea                 edi, [ebp - 0x840]
            //   33f6                 | xor                 esi, esi
            //   8d0433               | lea                 eax, [ebx + esi]
            //   50                   | push                eax

        $sequence_5 = { 50 e8???????? 83a64840420000 59 83c604 }
            // n = 5, score = 200
            //   50                   | push                eax
            //   e8????????           |                     
            //   83a64840420000       | and                 dword ptr [esi + 0x424048], 0
            //   59                   | pop                 ecx
            //   83c604               | add                 esi, 4

        $sequence_6 = { eb7c c745e000fe4100 ebbb d9e8 8b4510 dd18 e9???????? }
            // n = 7, score = 200
            //   eb7c                 | jmp                 0x7e
            //   c745e000fe4100       | mov                 dword ptr [ebp - 0x20], 0x41fe00
            //   ebbb                 | jmp                 0xffffffbd
            //   d9e8                 | fld1                
            //   8b4510               | mov                 eax, dword ptr [ebp + 0x10]
            //   dd18                 | fstp                qword ptr [eax]
            //   e9????????           |                     

        $sequence_7 = { 8b7c241c 83c40c c744241401000000 8d4e01 803c3900 8d0439 }
            // n = 6, score = 200
            //   8b7c241c             | mov                 edi, dword ptr [esp + 0x1c]
            //   83c40c               | add                 esp, 0xc
            //   c744241401000000     | mov                 dword ptr [esp + 0x14], 1
            //   8d4e01               | lea                 ecx, [esi + 1]
            //   803c3900             | cmp                 byte ptr [ecx + edi], 0
            //   8d0439               | lea                 eax, [ecx + edi]

    condition:
        7 of them and filesize < 327680
}
Download all Yara Rules