SYMBOLCOMMON_NAMEaka. SYNONYMS
win.kerrdown (Back to overview)

KerrDown

Actor(s): APT32

VTCollection     URLhaus    

There is no description at this point.

References
2021-02-24Amnesty InternationalAmnesty International
Click and Bait: Vietnamese Human Rights Defenders Targeted with Spyware Attacks
KerrDown
2021-02-24Github (AmnestyTech)Amnesty International
Overview of Ocean Lotus Samples used to target Vietnamese Human Rights Defenders
OceanLotus Cobalt Strike KerrDown
2021-02-23CrowdStrikeCrowdStrike
2021 Global Threat Report
RansomEXX Amadey Anchor Avaddon BazarBackdoor Clop Cobalt Strike Conti Cutwail DanaBot DarkSide DoppelPaymer Dridex Egregor Emotet Hakbit IcedID JSOutProx KerrDown LockBit Mailto Maze MedusaLocker Mespinoza Mount Locker NedDnLoader Nemty Pay2Key PlugX Pushdo PwndLocker PyXie QakBot Quasar RAT RagnarLocker Ragnarok RansomEXX REvil Ryuk Sekhmet ShadowPad SmokeLoader Snake SUNBURST SunCrypt TEARDROP TrickBot WastedLocker Winnti Zloader Evilnum OUTLAW SPIDER RIDDLE SPIDER SOLAR SPIDER VIKING SPIDER
2020-11-10Recorded FutureInsikt GroupĀ®
New APT32 Malware Campaign Targets Cambodian Government
KerrDown METALJACK SOUNDBITE
2020-11-06VolexitySteven Adair, Thomas Lancaster, Volexity Threat Research
OceanLotus: Extending Cyber Espionage Operations Through Fake Websites
Cobalt Strike KerrDown APT32
2020-03-04CrowdStrikeCrowdStrike
2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelDridex DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze MECHANICAL Necurs Nokki Outlook Backdoor Phobos Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot Vidar Winnti ANTHROPOID SPIDER APT23 APT31 APT39 APT40 BlackTech BuhTrap Charming Kitten CLOCKWORK SPIDER DOPPEL SPIDER FIN7 Gamaredon Group GOBLIN PANDA MONTY SPIDER MUSTANG PANDA NARWHAL SPIDER NOCTURNAL SPIDER PINCHY SPIDER SALTY SPIDER SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER VICEROY TIGER
2020-02-13QianxinQi Anxin Threat Intelligence Center
APT Report 2019
Chrysaor Exodus Dacls VPNFilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020-01-01SecureworksSecureWorks
TIN WOODLAWN
Cobalt Strike KerrDown MimiKatz PHOREAL RatSnif Remy SOUNDBITE APT32
2019-05-31TradaHackingm4n0w4r
ThĘ°į»Ÿng tįŗætā€¦.
KerrDown
2019-03-24One Night in NorfolkKevin Perlow
JEShell: An OceanLotus (APT32) Backdoor
Cobalt Strike KerrDown
2019-02-02CyStackBach Nguyen
Word-based Malware Attack
KerrDown
2019-02-01Palo Alto Networks Unit 42Kaoru Hayashi, Vicky Ray
Tracking OceanLotusā€™ new Downloader, KerrDown
KerrDown
Yara Rules
[TLP:WHITE] win_kerrdown_auto (20241030 | Detects win.kerrdown.)
rule win_kerrdown_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2024-10-31"
        version = "1"
        description = "Detects win.kerrdown."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.kerrdown"
        malpedia_rule_date = "20241030"
        malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4"
        malpedia_version = "20241030"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 0f83a2000000 c64405e800 40 83f804 }
            // n = 4, score = 200
            //   0f83a2000000         | jae                 0xa8
            //   c64405e800           | mov                 byte ptr [ebp + eax - 0x18], 0
            //   40                   | inc                 eax
            //   83f804               | cmp                 eax, 4

        $sequence_1 = { 64a300000000 8bf9 897ddc c745d800000000 }
            // n = 4, score = 200
            //   64a300000000         | mov                 dword ptr fs:[0], eax
            //   8bf9                 | mov                 edi, ecx
            //   897ddc               | mov                 dword ptr [ebp - 0x24], edi
            //   c745d800000000       | mov                 dword ptr [ebp - 0x28], 0

        $sequence_2 = { b8???????? 5f 5d c20800 85f6 75b2 }
            // n = 6, score = 200
            //   b8????????           |                     
            //   5f                   | pop                 edi
            //   5d                   | pop                 ebp
            //   c20800               | ret                 8
            //   85f6                 | test                esi, esi
            //   75b2                 | jne                 0xffffffb4

        $sequence_3 = { b9???????? 2bc2 50 68???????? e8???????? 5f 5d }
            // n = 7, score = 200
            //   b9????????           |                     
            //   2bc2                 | sub                 eax, edx
            //   50                   | push                eax
            //   68????????           |                     
            //   e8????????           |                     
            //   5f                   | pop                 edi
            //   5d                   | pop                 ebp

        $sequence_4 = { 6800080000 8bf0 e8???????? 8bd8 83c408 }
            // n = 5, score = 200
            //   6800080000           | push                0x800
            //   8bf0                 | mov                 esi, eax
            //   e8????????           |                     
            //   8bd8                 | mov                 ebx, eax
            //   83c408               | add                 esp, 8

        $sequence_5 = { 897710 7202 8b0f c60100 b9???????? }
            // n = 5, score = 200
            //   897710               | mov                 dword ptr [edi + 0x10], esi
            //   7202                 | jb                  4
            //   8b0f                 | mov                 ecx, dword ptr [edi]
            //   c60100               | mov                 byte ptr [ecx], 0
            //   b9????????           |                     

        $sequence_6 = { 897ddc c745d800000000 33f6 c747140f000000 b8cd220000 837f1410 }
            // n = 6, score = 200
            //   897ddc               | mov                 dword ptr [ebp - 0x24], edi
            //   c745d800000000       | mov                 dword ptr [ebp - 0x28], 0
            //   33f6                 | xor                 esi, esi
            //   c747140f000000       | mov                 dword ptr [edi + 0x14], 0xf
            //   b8cd220000           | mov                 eax, 0x22cd
            //   837f1410             | cmp                 dword ptr [edi + 0x14], 0x10

        $sequence_7 = { b8???????? 8b15???????? 57 8b3d???????? 83ff10 0f43c1 3d???????? }
            // n = 7, score = 200
            //   b8????????           |                     
            //   8b15????????         |                     
            //   57                   | push                edi
            //   8b3d????????         |                     
            //   83ff10               | cmp                 edi, 0x10
            //   0f43c1               | cmovae              eax, ecx
            //   3d????????           |                     

        $sequence_8 = { a1???????? 33c4 8944241c 6807800000 ff15???????? }
            // n = 5, score = 200
            //   a1????????           |                     
            //   33c4                 | xor                 eax, esp
            //   8944241c             | mov                 dword ptr [esp + 0x1c], eax
            //   6807800000           | push                0x8007
            //   ff15????????         |                     

        $sequence_9 = { c745f800000000 83feff 7438 6a00 8d45f8 }
            // n = 5, score = 200
            //   c745f800000000       | mov                 dword ptr [ebp - 8], 0
            //   83feff               | cmp                 esi, -1
            //   7438                 | je                  0x3a
            //   6a00                 | push                0
            //   8d45f8               | lea                 eax, [ebp - 8]

    condition:
        7 of them and filesize < 278528
}
Download all Yara Rules