SYMBOLCOMMON_NAMEaka. SYNONYMS
win.kegotip (Back to overview)

Kegotip


There is no description at this point.

References
2020-05-21Intel 471Intel 471
@online{471:20200521:brief:048d164, author = {Intel 471}, title = {{A brief history of TA505}}, date = {2020-05-21}, organization = {Intel 471}, url = {https://intel471.com/blog/a-brief-history-of-ta505}, language = {English}, urldate = {2022-02-14} } A brief history of TA505
AndroMut Bart Dridex FlawedAmmyy FlawedGrace Gandcrab Get2 GlobeImposter Jaff Kegotip Locky Necurs Philadephia Ransom Pony QuantLoader Rockloader SDBbot ServHelper Shifu Snatch TrickBot
Yara Rules
[TLP:WHITE] win_kegotip_auto (20220516 | Detects win.kegotip.)
rule win_kegotip_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.kegotip."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.kegotip"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 83f80a 7502 eb2a 8b4d20 038d3cf9ffff 8b9540f9ffff 039538f9ffff }
            // n = 7, score = 600
            //   83f80a               | cmp                 eax, 0xa
            //   7502                 | jne                 4
            //   eb2a                 | jmp                 0x2c
            //   8b4d20               | mov                 ecx, dword ptr [ebp + 0x20]
            //   038d3cf9ffff         | add                 ecx, dword ptr [ebp - 0x6c4]
            //   8b9540f9ffff         | mov                 edx, dword ptr [ebp - 0x6c0]
            //   039538f9ffff         | add                 edx, dword ptr [ebp - 0x6c8]

        $sequence_1 = { 7324 8b5510 0355e4 8b45f4 }
            // n = 4, score = 600
            //   7324                 | jae                 0x26
            //   8b5510               | mov                 edx, dword ptr [ebp + 0x10]
            //   0355e4               | add                 edx, dword ptr [ebp - 0x1c]
            //   8b45f4               | mov                 eax, dword ptr [ebp - 0xc]

        $sequence_2 = { ebba 8b55d8 0355d4 8955d8 }
            // n = 4, score = 600
            //   ebba                 | jmp                 0xffffffbc
            //   8b55d8               | mov                 edx, dword ptr [ebp - 0x28]
            //   0355d4               | add                 edx, dword ptr [ebp - 0x2c]
            //   8955d8               | mov                 dword ptr [ebp - 0x28], edx

        $sequence_3 = { 03550c 0fb642ff 50 e8???????? 83c404 0fb6c8 85c9 }
            // n = 7, score = 600
            //   03550c               | add                 edx, dword ptr [ebp + 0xc]
            //   0fb642ff             | movzx               eax, byte ptr [edx - 1]
            //   50                   | push                eax
            //   e8????????           |                     
            //   83c404               | add                 esp, 4
            //   0fb6c8               | movzx               ecx, al
            //   85c9                 | test                ecx, ecx

        $sequence_4 = { 8b450c 8b4dfc 8908 6a00 8b55f4 }
            // n = 5, score = 600
            //   8b450c               | mov                 eax, dword ptr [ebp + 0xc]
            //   8b4dfc               | mov                 ecx, dword ptr [ebp - 4]
            //   8908                 | mov                 dword ptr [eax], ecx
            //   6a00                 | push                0
            //   8b55f4               | mov                 edx, dword ptr [ebp - 0xc]

        $sequence_5 = { eb09 8b55fc 83c201 8955fc 837dfc04 7d37 8b45f8 }
            // n = 7, score = 600
            //   eb09                 | jmp                 0xb
            //   8b55fc               | mov                 edx, dword ptr [ebp - 4]
            //   83c201               | add                 edx, 1
            //   8955fc               | mov                 dword ptr [ebp - 4], edx
            //   837dfc04             | cmp                 dword ptr [ebp - 4], 4
            //   7d37                 | jge                 0x39
            //   8b45f8               | mov                 eax, dword ptr [ebp - 8]

        $sequence_6 = { 734e ff15???????? 33d2 b9fa000000 }
            // n = 4, score = 600
            //   734e                 | jae                 0x50
            //   ff15????????         |                     
            //   33d2                 | xor                 edx, edx
            //   b9fa000000           | mov                 ecx, 0xfa

        $sequence_7 = { c745fc00000000 c745f800000000 eb09 8b4df8 83c101 894df8 8b5510 }
            // n = 7, score = 600
            //   c745fc00000000       | mov                 dword ptr [ebp - 4], 0
            //   c745f800000000       | mov                 dword ptr [ebp - 8], 0
            //   eb09                 | jmp                 0xb
            //   8b4df8               | mov                 ecx, dword ptr [ebp - 8]
            //   83c101               | add                 ecx, 1
            //   894df8               | mov                 dword ptr [ebp - 8], ecx
            //   8b5510               | mov                 edx, dword ptr [ebp + 0x10]

        $sequence_8 = { 7619 8b8554fdffff 8945fc 8b4d10 898d58feffff }
            // n = 5, score = 600
            //   7619                 | jbe                 0x1b
            //   8b8554fdffff         | mov                 eax, dword ptr [ebp - 0x2ac]
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8b4d10               | mov                 ecx, dword ptr [ebp + 0x10]
            //   898d58feffff         | mov                 dword ptr [ebp - 0x1a8], ecx

        $sequence_9 = { 2b4d84 790c c7856cffffff00000000 eb0c }
            // n = 4, score = 600
            //   2b4d84               | sub                 ecx, dword ptr [ebp - 0x7c]
            //   790c                 | jns                 0xe
            //   c7856cffffff00000000     | mov    dword ptr [ebp - 0x94], 0
            //   eb0c                 | jmp                 0xe

    condition:
        7 of them and filesize < 278528
}
Download all Yara Rules