SYMBOLCOMMON_NAMEaka. SYNONYMS
win.keylogger_apt3 (Back to overview)

APT3 Keylogger

Actor(s): UPS


There is no description at this point.

References
2023-05-11cocomelonccocomelonc
@online{cocomelonc:20230511:malware:f557876, author = {cocomelonc}, title = {{Malware development trick - part 28: Dump lsass.exe. Simple C++ example.}}, date = {2023-05-11}, organization = {cocomelonc}, url = {https://cocomelonc.github.io/malware/2023/05/11/malware-tricks-28.html}, language = {English}, urldate = {2023-05-15} } Malware development trick - part 28: Dump lsass.exe. Simple C++ example.
Cobalt Strike APT3 Keylogger
2017-05-09IntrusiontruthIntrusiontruth
@online{intrusiontruth:20170509:apt3:4014a9f, author = {Intrusiontruth}, title = {{APT3 is Boyusec, a Chinese Intelligence Contractor}}, date = {2017-05-09}, organization = {Intrusiontruth}, url = {https://intrusiontruth.wordpress.com/2017/05/09/apt3-is-boyusec-a-chinese-intelligence-contractor/}, language = {English}, urldate = {2020-01-07} } APT3 is Boyusec, a Chinese Intelligence Contractor
APT3 Keylogger
2016-09-07Twitter (smoothimpact)Kris McConkey
@online{mcconkey:20160907:with:1cca78a, author = {Kris McConkey}, title = {{Tweet with hashes on APT3}}, date = {2016-09-07}, organization = {Twitter (smoothimpact)}, url = {https://twitter.com/smoothimpact/status/773631684038107136}, language = {English}, urldate = {2019-12-17} } Tweet with hashes on APT3
APT3 Keylogger
2016-09-06SymantecSymantec Security Response
@online{response:20160906:buckeye:ffc6501, author = {Symantec Security Response}, title = {{Buckeye cyberespionage group shifts gaze from US to Hong Kong}}, date = {2016-09-06}, organization = {Symantec}, url = {http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong}, language = {English}, urldate = {2019-12-24} } Buckeye cyberespionage group shifts gaze from US to Hong Kong
APT3 Keylogger
Yara Rules
[TLP:WHITE] win_keylogger_apt3_auto (20230715 | Detects win.keylogger_apt3.)
rule win_keylogger_apt3_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.keylogger_apt3."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.keylogger_apt3"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 0f8fc0000000 68ec000000 e8???????? a3???????? 896840 8b0d???????? }
            // n = 6, score = 300
            //   0f8fc0000000         | jg                  0xc6
            //   68ec000000           | push                0xec
            //   e8????????           |                     
            //   a3????????           |                     
            //   896840               | mov                 dword ptr [eax + 0x40], ebp
            //   8b0d????????         |                     

        $sequence_1 = { 8d44246c 50 51 e8???????? a1???????? 8d542434 52 }
            // n = 7, score = 300
            //   8d44246c             | lea                 eax, [esp + 0x6c]
            //   50                   | push                eax
            //   51                   | push                ecx
            //   e8????????           |                     
            //   a1????????           |                     
            //   8d542434             | lea                 edx, [esp + 0x34]
            //   52                   | push                edx

        $sequence_2 = { 52 a3???????? ff15???????? 8b0d???????? 8d44240c 50 }
            // n = 6, score = 300
            //   52                   | push                edx
            //   a3????????           |                     
            //   ff15????????         |                     
            //   8b0d????????         |                     
            //   8d44240c             | lea                 eax, [esp + 0xc]
            //   50                   | push                eax

        $sequence_3 = { 8944241c 758d 33c0 b9???????? 8d9b00000000 833900 7410 }
            // n = 7, score = 300
            //   8944241c             | mov                 dword ptr [esp + 0x1c], eax
            //   758d                 | jne                 0xffffff8f
            //   33c0                 | xor                 eax, eax
            //   b9????????           |                     
            //   8d9b00000000         | lea                 ebx, [ebx]
            //   833900               | cmp                 dword ptr [ecx], 0
            //   7410                 | je                  0x12

        $sequence_4 = { 740b 380e 7416 50 ffd7 85c0 }
            // n = 6, score = 300
            //   740b                 | je                  0xd
            //   380e                 | cmp                 byte ptr [esi], cl
            //   7416                 | je                  0x18
            //   50                   | push                eax
            //   ffd7                 | call                edi
            //   85c0                 | test                eax, eax

        $sequence_5 = { 41 0fb65c0c18 885c041b 83c004 }
            // n = 4, score = 300
            //   41                   | inc                 ecx
            //   0fb65c0c18           | movzx               ebx, byte ptr [esp + ecx + 0x18]
            //   885c041b             | mov                 byte ptr [esp + eax + 0x1b], bl
            //   83c004               | add                 eax, 4

        $sequence_6 = { 51 ffd7 a1???????? 8d54243c }
            // n = 4, score = 300
            //   51                   | push                ecx
            //   ffd7                 | call                edi
            //   a1????????           |                     
            //   8d54243c             | lea                 edx, [esp + 0x3c]

        $sequence_7 = { 6a00 56 ff15???????? 56 ff15???????? 8b4c2438 5e }
            // n = 7, score = 300
            //   6a00                 | push                0
            //   56                   | push                esi
            //   ff15????????         |                     
            //   56                   | push                esi
            //   ff15????????         |                     
            //   8b4c2438             | mov                 ecx, dword ptr [esp + 0x38]
            //   5e                   | pop                 esi

        $sequence_8 = { ffd7 a1???????? 8d96b0010000 52 83c048 50 ffd7 }
            // n = 7, score = 300
            //   ffd7                 | call                edi
            //   a1????????           |                     
            //   8d96b0010000         | lea                 edx, [esi + 0x1b0]
            //   52                   | push                edx
            //   83c048               | add                 eax, 0x48
            //   50                   | push                eax
            //   ffd7                 | call                edi

        $sequence_9 = { ffd3 89442420 83f8ff 7551 8b35???????? }
            // n = 5, score = 300
            //   ffd3                 | call                ebx
            //   89442420             | mov                 dword ptr [esp + 0x20], eax
            //   83f8ff               | cmp                 eax, -1
            //   7551                 | jne                 0x53
            //   8b35????????         |                     

    condition:
        7 of them and filesize < 761856
}
Download all Yara Rules