SYMBOLCOMMON_NAMEaka. SYNONYMS
win.juicy_potato (Back to overview)

JuicyPotato

VTCollection    

As described on the Github repository page, "A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM".

References
2025-05-27Trend MicroJoseph C Chen
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
BypassBoss Cobalt Strike JuicyPotato PULSEPACK STOWAWAY VShell
2025-03-20Cisco TalosAsheer Malhotra, Brandon White, Jungsoo An, Vitor Ventura
UAT-5918 targets critical infrastructure entities in Taiwan
ShortLeash LaZagne JuicyPotato Meterpreter MimiKatz ShortLeash UAT-5918
2025-01-23AhnLabASEC
RID Hijacking Technique Utilized by Andariel Attack Group
CreateHiddenAccount JuicyPotato
2024-05-23Palo Alto Networks Unit 42Daniel Frank, Lior Rochberger
Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia
Agent Racoon CHINACHOPPER Ghost RAT JuicyPotato MimiKatz Ntospy PlugX SweetSpecter TunnelSpecter CL-STA-0043
2022-08-25SentinelOneJim Walter
BlueSky Ransomware | AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar
BlueSky Cobalt Strike JuicyPotato
2022-01-17Trend MicroCedric Pernet, Daniel Lunghi, Gloria Chen, Jaromír Hořejší, Joseph Chen, Kenney Lu
Delving Deep: An Analysis of Earth Lusca’s Operations
BIOPASS Cobalt Strike FunnySwitch JuicyPotato ShadowPad Winnti Earth Lusca
2021-08-09ESET ResearchZuzana Hromcová
IISpy: A complex server‑side backdoor with anti‑forensic features
IISpy JuicyPotato
2020-05-01LIFARSLIFARS
XMRig-based CoinMinersby Blue Mockingbird Threat Actor
JuicyPotato
2019-01-14Github (ohpe)OHPE
Juicy Potato (abusing the golden privileges)
JuicyPotato
Yara Rules
[TLP:WHITE] win_juicy_potato_auto (20251219 | Detects win.juicy_potato.)
rule win_juicy_potato_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2026-01-05"
        version = "1"
        description = "Detects win.juicy_potato."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_rule_date = "20260105"
        malpedia_hash = "19b79e7cab4eaf532122e5b45a77dd8f6bb5cc79"
        malpedia_version = "20251219"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 0f8521ffffff 44882b eb7b 488b9540070000 4c8d05d7b20200 }
            // n = 5, score = 100
            //   0f8521ffffff         | lea                 eax, [0x193c9]
            //   44882b               | test                al, al
            //   eb7b                 | je                  0xdc
            //   488b9540070000       | dec                 eax
            //   4c8d05d7b20200       | lea                 ecx, [0x95f]

        $sequence_1 = { e8???????? 488d1548380300 488d4c2420 e8???????? cc 488d4c2420 e8???????? }
            // n = 7, score = 100
            //   e8????????           |                     
            //   488d1548380300       | dec                 eax
            //   488d4c2420           | lea                 ecx, [edi + 8]
            //   e8????????           |                     
            //   cc                   | nop                 
            //   488d4c2420           | dec                 eax
            //   e8????????           |                     

        $sequence_2 = { 0fb7d0 488d8de0000000 81ca00000780 85c0 0f4ed0 e8???????? 488d15a8350200 }
            // n = 7, score = 100
            //   0fb7d0               | lea                 ecx, [0x4225e]
            //   488d8de0000000       | mov                 dword ptr [ebp - 0x10], esi
            //   81ca00000780         | test                eax, eax
            //   85c0                 | jne                 0x3c2
            //   0f4ed0               | dec                 eax
            //   e8????????           |                     
            //   488d15a8350200       | lea                 ecx, [0x422c8]

        $sequence_3 = { 488d054ab1ffff 4889442438 488d4c2428 e8???????? }
            // n = 4, score = 100
            //   488d054ab1ffff       | mov                 dword ptr [eax + 0x28], ecx
            //   4889442438           | dec                 eax
            //   488d4c2428           | mov                 ecx, eax
            //   e8????????           |                     

        $sequence_4 = { e8???????? eb98 488d4c2420 e8???????? 488d15fee90200 488d4c2420 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   eb98                 | dec                 eax
            //   488d4c2420           | lea                 ecx, [0x4d96f]
            //   e8????????           |                     
            //   488d15fee90200       | jne                 0x115
            //   488d4c2420           | dec                 eax

        $sequence_5 = { 4889442430 8b442478 89442428 488b442470 4c8b11 4889442420 }
            // n = 6, score = 100
            //   4889442430           | dec                 eax
            //   8b442478             | mov                 dword ptr [esp + 0x8b8], ebx
            //   89442428             | mov                 ecx, 0x10
            //   488b442470           | dec                 eax
            //   4c8b11               | mov                 dword ptr [ebx], eax
            //   4889442420           | dec                 eax

        $sequence_6 = { 488901 488d05660b0100 48894110 f6c201 740a ba90000000 e8???????? }
            // n = 7, score = 100
            //   488901               | mov                 ebx, dword ptr [esp + 0x60]
            //   488d05660b0100       | dec                 eax
            //   48894110             | add                 esp, 0x30
            //   f6c201               | int3                
            //   740a                 | je                  0xd78
            //   ba90000000           | jne                 0xd87
            //   e8????????           |                     

        $sequence_7 = { 4885c0 7509 488d056f200400 eb04 4883c024 8938 e8???????? }
            // n = 7, score = 100
            //   4885c0               | nop                 dword ptr [eax + eax]
            //   7509                 | dec                 eax
            //   488d056f200400       | mov                 eax, dword ptr [edi + 0x10]
            //   eb04                 | mov                 edx, dword ptr [eax + 8]
            //   4883c024             | dec                 esp
            //   8938                 | lea                 ecx, [esp + 0x48]
            //   e8????????           |                     

        $sequence_8 = { 4883ec20 488bd9 488bc2 488d0d9dc10000 48890b }
            // n = 5, score = 100
            //   4883ec20             | mov                 eax, ebx
            //   488bd9               | dec                 eax
            //   488bc2               | lea                 eax, [0x1b0e9]
            //   488d0d9dc10000       | dec                 eax
            //   48890b               | mov                 dword ptr [ebx], eax

        $sequence_9 = { 44016f6c 48875308 4c396b08 7521 8364242800 488d0560acfeff 4889442430 }
            // n = 7, score = 100
            //   44016f6c             | mov                 ebx, eax
            //   48875308             | dec                 eax
            //   4c396b08             | mov                 dword ptr [esp + 0x50], eax
            //   7521                 | xor                 edx, edx
            //   8364242800           | inc                 esp
            //   488d0560acfeff       | lea                 eax, [edx + 0x60]
            //   4889442430           | mov                 ecx, 0x64

    condition:
        7 of them and filesize < 736256
}
[TLP:WHITE] win_juicy_potato_w0   (20200624 | No description)
rule win_juicy_potato_w0 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "JuicyPotato" nocase wide ascii
        $str2 = "4991d34b-80a1-4291-83b6-3328366b9097" nocase wide ascii
        $str3 = "JuicyPotato.pdb" nocase wide ascii
        $str4 = "Waiting for auth" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and 3 of ($str*) and filesize < 500KB
}
[TLP:WHITE] win_juicy_potato_w1   (20200624 | No description)
rule win_juicy_potato_w1 {
    meta:
        author = "SpiderLabs"
        source = "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/copy-paste-threat-actor-in-the-asia-pacific-region/"
        group = "copy_paste"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.juicy_potato"
        malpedia_version = "20200624"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
    strings:
        $str1 = "Potato.dll" nocase wide ascii
        $str2 = "VirusDeleted" nocase wide ascii
        $str3 = "Page404r" nocase wide ascii
    condition:        
        (uint16(0) == 0x5A4D) and all of them and filesize < 200KB
}
Download all Yara Rules