SYMBOLCOMMON_NAMEaka. SYNONYMS
win.kerrdown (Back to overview)

KerrDown

Actor(s): APT32

URLhaus    

There is no description at this point.

References
2021-02-24Amnesty InternationalAmnesty International
@techreport{international:20210224:click:aec5095, author = {Amnesty International}, title = {{Click and Bait: Vietnamese Human Rights Defenders Targeted with Spyware Attacks}}, date = {2021-02-24}, institution = {Amnesty International}, url = {https://www.amnesty.de/sites/default/files/2021-02/Amnesty-Bericht-Vietnam-Click-And-Bait-Blogger-Deutschland-Spionage-Menschenrechtsverteidiger-Februar-2021.pdf}, language = {English}, urldate = {2021-02-25} } Click and Bait: Vietnamese Human Rights Defenders Targeted with Spyware Attacks
KerrDown
2021-02-24Github (AmnestyTech)Amnesty International
@online{international:20210224:overview:95b80e0, author = {Amnesty International}, title = {{Overview of Ocean Lotus Samples used to target Vietnamese Human Rights Defenders}}, date = {2021-02-24}, organization = {Github (AmnestyTech)}, url = {https://github.com/AmnestyTech/investigations/tree/master/2021-02-24_vietnam}, language = {English}, urldate = {2021-02-25} } Overview of Ocean Lotus Samples used to target Vietnamese Human Rights Defenders
OceanLotus Cobalt Strike KerrDown
2021-02-23CrowdStrikeCrowdStrike
@techreport{crowdstrike:20210223:2021:bf5bc4f, author = {CrowdStrike}, title = {{2021 Global Threat Report}}, date = {2021-02-23}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2021GTR.pdf}, language = {English}, urldate = {2021-02-25} } 2021 Global Threat Report
RansomEXX Amadey Anchor Avaddon Ransomware BazarBackdoor Clop Cobalt Strike Conti Ransomware Cutwail DanaBot DarkSide DoppelPaymer Dridex Egregor Emotet Hakbit IcedID JSOutProx KerrDown LockBit Mailto Maze MedusaLocker Mespinoza Mount Locker NedDnLoader Nemty Pay2Key PlugX Pushdo PwndLocker PyXie QakBot Quasar RAT RagnarLocker Ragnarok RansomEXX REvil Ryuk Sekhmet Ransomware ShadowPad SmokeLoader Snake Ransomware SUNBURST SunCrypt TEARDROP TrickBot WastedLocker Winnti Zloader
2020-11-10Recorded FutureInsikt Group®
@techreport{group:20201110:new:97e5657, author = {Insikt Group®}, title = {{New APT32 Malware Campaign Targets Cambodian Government}}, date = {2020-11-10}, institution = {Recorded Future}, url = {https://go.recordedfuture.com/hubfs/reports/cta-2020-1110.pdf}, language = {English}, urldate = {2020-11-11} } New APT32 Malware Campaign Targets Cambodian Government
KerrDown METALJACK SOUNDBITE
2020-11-06VolexitySteven Adair, Thomas Lancaster, Volexity Threat Research
@online{adair:20201106:oceanlotus:f7b11ac, author = {Steven Adair and Thomas Lancaster and Volexity Threat Research}, title = {{OceanLotus: Extending Cyber Espionage Operations Through Fake Websites}}, date = {2020-11-06}, organization = {Volexity}, url = {https://www.volexity.com/blog/2020/11/06/oceanlotus-extending-cyber-espionage-operations-through-fake-websites/}, language = {English}, urldate = {2020-11-09} } OceanLotus: Extending Cyber Espionage Operations Through Fake Websites
Cobalt Strike KerrDown APT32
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-07-24} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze MECHANICAL Necurs Nokki Outlook Backdoor Phobos Ransomware Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot vidar Winnti ANTHROPOID SPIDER Anunak APT31 APT39 BlackTech BuhTrap Charming Kitten CLOCKWORD SPIDER DOPPEL SPIDER Gamaredon Group Leviathan MONTY SPIDER Mustang Panda NARWHAL SPIDER NOCTURNAL SPIDER Pinchy Spider Pirate Panda Salty Spider SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER
2020-02-13QianxinQi Anxin Threat Intelligence Center
@techreport{center:20200213:report:146d333, author = {Qi Anxin Threat Intelligence Center}, title = {{APT Report 2019}}, date = {2020-02-13}, institution = {Qianxin}, url = {https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf}, language = {English}, urldate = {2020-02-27} } APT Report 2019
Chrysaor Exodus Dacls elf.vpnfilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020SecureworksSecureWorks
@online{secureworks:2020:tin:ccd6795, author = {SecureWorks}, title = {{TIN WOODLAWN}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/tin-woodlawn}, language = {English}, urldate = {2020-05-23} } TIN WOODLAWN
Cobalt Strike KerrDown MimiKatz PHOREAL RatSnif Remy SOUNDBITE APT32
2019-05-31TradaHackingm4n0w4r
@online{m4n0w4r:20190531:thng:c687d46, author = {m4n0w4r}, title = {{Thưởng tết….}}, date = {2019-05-31}, organization = {TradaHacking}, url = {https://tradahacking.vn/th%C6%B0%E1%BB%9Fng-t%E1%BA%BFt-fbcbbed49da7}, language = {Vietnamese}, urldate = {2020-01-10} } Thưởng tết….
KerrDown
2019-03-24One Night in NorfolkKevin Perlow
@online{perlow:20190324:jeshell:439ae8b, author = {Kevin Perlow}, title = {{JEShell: An OceanLotus (APT32) Backdoor}}, date = {2019-03-24}, organization = {One Night in Norfolk}, url = {https://norfolkinfosec.com/jeshell-an-oceanlotus-apt32-backdoor/}, language = {English}, urldate = {2020-05-19} } JEShell: An OceanLotus (APT32) Backdoor
Cobalt Strike KerrDown
2019-02-02CyStackBach Nguyen
@online{nguyen:20190202:wordbased:89a23db, author = {Bach Nguyen}, title = {{Word-based Malware Attack}}, date = {2019-02-02}, organization = {CyStack}, url = {https://blog.cystack.net/word-based-malware-attack/}, language = {English}, urldate = {2019-12-20} } Word-based Malware Attack
KerrDown
2019-02-01Palo Alto Networks Unit 42Vicky Ray, Kaoru Hayashi
@online{ray:20190201:tracking:479c2b7, author = {Vicky Ray and Kaoru Hayashi}, title = {{Tracking OceanLotus’ new Downloader, KerrDown}}, date = {2019-02-01}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/tracking-oceanlotus-new-downloader-kerrdown/}, language = {English}, urldate = {2019-10-23} } Tracking OceanLotus’ new Downloader, KerrDown
KerrDown
Yara Rules
[TLP:WHITE] win_kerrdown_auto (20201023 | autogenerated rule brought to you by yara-signator)
rule win_kerrdown_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-12-22"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.kerrdown"
        malpedia_rule_date = "20201222"
        malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130"
        malpedia_version = "20201023"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 750e 80fb2b 7409 80fb2f 0f858f000000 8b4de0 8a01 }
            // n = 7, score = 200
            //   750e                 | jne                 0x10
            //   80fb2b               | cmp                 bl, 0x2b
            //   7409                 | je                  0xb
            //   80fb2f               | cmp                 bl, 0x2f
            //   0f858f000000         | jne                 0x95
            //   8b4de0               | mov                 ecx, dword ptr [ebp - 0x20]
            //   8a01                 | mov                 al, byte ptr [ecx]

        $sequence_1 = { e8???????? 8d4c2404 e8???????? 83ec18 8d44241c 8bcc 6aff }
            // n = 7, score = 200
            //   e8????????           |                     
            //   8d4c2404             | lea                 ecx, [esp + 4]
            //   e8????????           |                     
            //   83ec18               | sub                 esp, 0x18
            //   8d44241c             | lea                 eax, [esp + 0x1c]
            //   8bcc                 | mov                 ecx, esp
            //   6aff                 | push                -1

        $sequence_2 = { ff15???????? 6a01 68???????? 68???????? 53 68???????? 6a00 }
            // n = 7, score = 200
            //   ff15????????         |                     
            //   6a01                 | push                1
            //   68????????           |                     
            //   68????????           |                     
            //   53                   | push                ebx
            //   68????????           |                     
            //   6a00                 | push                0

        $sequence_3 = { 50 e8???????? 8b3d???????? 83c40c 8b0d???????? 83ff10 }
            // n = 6, score = 200
            //   50                   | push                eax
            //   e8????????           |                     
            //   8b3d????????         |                     
            //   83c40c               | add                 esp, 0xc
            //   8b0d????????         |                     
            //   83ff10               | cmp                 edi, 0x10

        $sequence_4 = { e8???????? 8b442430 83c418 83f810 722f }
            // n = 5, score = 200
            //   e8????????           |                     
            //   8b442430             | mov                 eax, dword ptr [esp + 0x30]
            //   83c418               | add                 esp, 0x18
            //   83f810               | cmp                 eax, 0x10
            //   722f                 | jb                  0x31

        $sequence_5 = { 8d44241c 8bcc 6aff 6a00 c741140f000000 c7411000000000 }
            // n = 6, score = 200
            //   8d44241c             | lea                 eax, [esp + 0x1c]
            //   8bcc                 | mov                 ecx, esp
            //   6aff                 | push                -1
            //   6a00                 | push                0
            //   c741140f000000       | mov                 dword ptr [ecx + 0x14], 0xf
            //   c7411000000000       | mov                 dword ptr [ecx + 0x10], 0

        $sequence_6 = { 80fb2b 7409 80fb2f 0f858f000000 8b4de0 }
            // n = 5, score = 200
            //   80fb2b               | cmp                 bl, 0x2b
            //   7409                 | je                  0xb
            //   80fb2f               | cmp                 bl, 0x2f
            //   0f858f000000         | jne                 0x95
            //   8b4de0               | mov                 ecx, dword ptr [ebp - 0x20]

        $sequence_7 = { 03c2 3d???????? 762a ff750c 83ff10 }
            // n = 5, score = 200
            //   03c2                 | add                 eax, edx
            //   3d????????           |                     
            //   762a                 | jbe                 0x2c
            //   ff750c               | push                dword ptr [ebp + 0xc]
            //   83ff10               | cmp                 edi, 0x10

        $sequence_8 = { 8a01 41 884435e8 46 }
            // n = 4, score = 200
            //   8a01                 | mov                 al, byte ptr [ecx]
            //   41                   | inc                 ecx
            //   884435e8             | mov                 byte ptr [ebp + esi - 0x18], al
            //   46                   | inc                 esi

        $sequence_9 = { ff750c 83ff10 ba???????? b8???????? 0f43d1 b9???????? 2bc2 }
            // n = 7, score = 200
            //   ff750c               | push                dword ptr [ebp + 0xc]
            //   83ff10               | cmp                 edi, 0x10
            //   ba????????           |                     
            //   b8????????           |                     
            //   0f43d1               | cmovae              edx, ecx
            //   b9????????           |                     
            //   2bc2                 | sub                 eax, edx

    condition:
        7 of them and filesize < 278528
}
Download all Yara Rules