Actor(s): Pirate Panda
There is no description at this point.
rule win_keyboy_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-01-25" version = "1" description = "Detects win.keyboy." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.keyboy" malpedia_rule_date = "20230124" malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686" malpedia_version = "20230125" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 51 ff75d8 6a00 ff75c0 } // n = 4, score = 600 // 51 | push ecx // ff75d8 | push dword ptr [ebp - 0x28] // 6a00 | push 0 // ff75c0 | push dword ptr [ebp - 0x40] $sequence_1 = { 6a00 8945f2 8d45f8 50 } // n = 4, score = 600 // 6a00 | push 0 // 8945f2 | mov dword ptr [ebp - 0xe], eax // 8d45f8 | lea eax, [ebp - 8] // 50 | push eax $sequence_2 = { 8d45f8 50 6a0e 8d45e8 } // n = 4, score = 600 // 8d45f8 | lea eax, [ebp - 8] // 50 | push eax // 6a0e | push 0xe // 8d45e8 | lea eax, [ebp - 0x18] $sequence_3 = { c705????????d87f958c c705????????0caa6c89 c705????????a856701f c705????????597e743c c705????????0a9769e0 } // n = 5, score = 500 // c705????????d87f958c | // c705????????0caa6c89 | // c705????????a856701f | // c705????????597e743c | // c705????????0a9769e0 | $sequence_4 = { c705????????890e9944 c705????????dbd99823 c705????????d468bcb5 c705????????2086e659 c705????????eec45abf } // n = 5, score = 500 // c705????????890e9944 | // c705????????dbd99823 | // c705????????d468bcb5 | // c705????????2086e659 | // c705????????eec45abf | $sequence_5 = { c705????????597e743c c705????????0a9769e0 c705????????c4b85363 c705????????3abf261f } // n = 4, score = 500 // c705????????597e743c | // c705????????0a9769e0 | // c705????????c4b85363 | // c705????????3abf261f | $sequence_6 = { c3 3b0d???????? f27502 f2c3 f2e953030000 55 } // n = 6, score = 500 // c3 | ret // 3b0d???????? | // f27502 | bnd jne 5 // f2c3 | bnd ret // f2e953030000 | bnd jmp 0x359 // 55 | push ebp $sequence_7 = { e8???????? 85c0 790b b883ffffff } // n = 4, score = 400 // e8???????? | // 85c0 | test eax, eax // 790b | jns 0xd // b883ffffff | mov eax, 0xffffff83 $sequence_8 = { 57 8bf9 0f1145f0 85d2 } // n = 4, score = 400 // 57 | push edi // 8bf9 | mov edi, ecx // 0f1145f0 | movups xmmword ptr [ebp - 0x10], xmm0 // 85d2 | test edx, edx $sequence_9 = { 2408 f6d8 1ac0 24dd 88474e e8???????? } // n = 6, score = 400 // 2408 | and al, 8 // f6d8 | neg al // 1ac0 | sbb al, al // 24dd | and al, 0xdd // 88474e | mov byte ptr [edi + 0x4e], al // e8???????? | $sequence_10 = { c745ec5c417070 c745f06c655c55 8bf2 c745f470646174 } // n = 4, score = 400 // c745ec5c417070 | mov dword ptr [ebp - 0x14], 0x7070415c // c745f06c655c55 | mov dword ptr [ebp - 0x10], 0x555c656c // 8bf2 | mov esi, edx // c745f470646174 | mov dword ptr [ebp - 0xc], 0x74616470 $sequence_11 = { 83c40c e8???????? 8d45d0 c745d04b65726e 50 } // n = 5, score = 400 // 83c40c | add esp, 0xc // e8???????? | // 8d45d0 | lea eax, [ebp - 0x30] // c745d04b65726e | mov dword ptr [ebp - 0x30], 0x6e72654b // 50 | push eax $sequence_12 = { c705????????e6cd2b66 c705????????79e66d38 c705????????ba66ea37 c705????????1671e665 c705????????f3106cb3 c705????????526c1ed0 } // n = 6, score = 400 // c705????????e6cd2b66 | // c705????????79e66d38 | // c705????????ba66ea37 | // c705????????1671e665 | // c705????????f3106cb3 | // c705????????526c1ed0 | $sequence_13 = { e9???????? bbfeffffff eb05 bbfdffffff } // n = 4, score = 400 // e9???????? | // bbfeffffff | mov ebx, 0xfffffffe // eb05 | jmp 7 // bbfdffffff | mov ebx, 0xfffffffd $sequence_14 = { 8d46d6 99 83e23f 03c2 } // n = 4, score = 400 // 8d46d6 | lea eax, [esi - 0x2a] // 99 | cdq // 83e23f | and edx, 0x3f // 03c2 | add eax, edx $sequence_15 = { 24a0 3ca0 7518 b800080000 } // n = 4, score = 400 // 24a0 | and al, 0xa0 // 3ca0 | cmp al, 0xa0 // 7518 | jne 0x1a // b800080000 | mov eax, 0x800 $sequence_16 = { 53 56 57 68cc020000 8d852cfdffff } // n = 5, score = 400 // 53 | push ebx // 56 | push esi // 57 | push edi // 68cc020000 | push 0x2cc // 8d852cfdffff | lea eax, [ebp - 0x2d4] $sequence_17 = { c1e810 884106 8bc2 c1e808 } // n = 4, score = 400 // c1e810 | shr eax, 0x10 // 884106 | mov byte ptr [ecx + 6], al // 8bc2 | mov eax, edx // c1e808 | shr eax, 8 $sequence_18 = { 8d852cfdffff 8bf2 6a00 50 89b528fdffff } // n = 5, score = 400 // 8d852cfdffff | lea eax, [ebp - 0x2d4] // 8bf2 | mov esi, edx // 6a00 | push 0 // 50 | push eax // 89b528fdffff | mov dword ptr [ebp - 0x2d8], esi $sequence_19 = { e8???????? 85c0 755e 83ff20 } // n = 4, score = 400 // e8???????? | // 85c0 | test eax, eax // 755e | jne 0x60 // 83ff20 | cmp edi, 0x20 $sequence_20 = { 80f185 880c3e 46 3bf2 } // n = 4, score = 400 // 80f185 | xor cl, 0x85 // 880c3e | mov byte ptr [esi + edi], cl // 46 | inc esi // 3bf2 | cmp esi, edx $sequence_21 = { b901000000 eb0f 3cfe 7509 } // n = 4, score = 400 // b901000000 | mov ecx, 1 // eb0f | jmp 0x11 // 3cfe | cmp al, 0xfe // 7509 | jne 0xb $sequence_22 = { 8a043e 0fbe4c8de0 3401 0fbec0 0fafc8 80f185 880c3e } // n = 7, score = 400 // 8a043e | mov al, byte ptr [esi + edi] // 0fbe4c8de0 | movsx ecx, byte ptr [ebp + ecx*4 - 0x20] // 3401 | xor al, 1 // 0fbec0 | movsx eax, al // 0fafc8 | imul ecx, eax // 80f185 | xor cl, 0x85 // 880c3e | mov byte ptr [esi + edi], cl condition: 7 of them and filesize < 2170880 }
import "pe" rule win_keyboy_w0 { meta: author = "Florian Roth" reference = "http://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.keyboy" malpedia_version = "20180301" malpedia_license = "CC BY-NC-SA 4.0" malpedia_sharing = "TLP:WHITE" strings: $x1 = "reg add HKLM\\%s\\Parameters /v ServiceDll /t REG_EXPAND_SZ /d \"%s\" /f" fullword ascii $x3 = "Internet using \\svchost.exe -k -n 3" fullword ascii $x4 = "reg add \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\" /v SFCDisable /t REG_DWORD /d 4 /f" fullword ascii $s1 = "sc create %s binpath= \"%s\" Type= share Start= auto DisplayName= \"%s\"" fullword ascii $s2 = "ExecCmd:%s" fullword ascii $s3 = "szCommand : %s" fullword ascii $s4 = "Current user is a member of the %s\\%s group" fullword ascii $s5 = "icacls %s /grant administrators:F" fullword ascii $s6 = "Ping 127.0.0.1 goto Repeat" fullword ascii $s7 = "Start MoveFile %s -> %s" fullword ascii $s8 = "move %s\\dllcache%s %s\\dllcache\\%s" fullword ascii $s9 = "%s\\cmd.exe /c \"%s\"" fullword ascii condition: pe.imphash() == "68f7eced34c46808756db4b0c45fb589" or ( pe.exports("Insys") and pe.exports("Inuser") and pe.exports("SSSS") ) or 1 of ($x*) or 4 of them }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY