SYMBOLCOMMON_NAMEaka. SYNONYMS
win.keylogger_apt3 (Back to overview)

APT3 Keylogger

Actor(s): UPS


There is no description at this point.

References
2017-05-09IntrusiontruthIntrusiontruth
@online{intrusiontruth:20170509:apt3:4014a9f, author = {Intrusiontruth}, title = {{APT3 is Boyusec, a Chinese Intelligence Contractor}}, date = {2017-05-09}, organization = {Intrusiontruth}, url = {https://intrusiontruth.wordpress.com/2017/05/09/apt3-is-boyusec-a-chinese-intelligence-contractor/}, language = {English}, urldate = {2020-01-07} } APT3 is Boyusec, a Chinese Intelligence Contractor
APT3 Keylogger
2016-09-07Twitter (smoothimpact)Kris McConkey
@online{mcconkey:20160907:with:1cca78a, author = {Kris McConkey}, title = {{Tweet with hashes on APT3}}, date = {2016-09-07}, organization = {Twitter (smoothimpact)}, url = {https://twitter.com/smoothimpact/status/773631684038107136}, language = {English}, urldate = {2019-12-17} } Tweet with hashes on APT3
APT3 Keylogger
2016-09-06SymantecSymantec Security Response
@online{response:20160906:buckeye:ffc6501, author = {Symantec Security Response}, title = {{Buckeye cyberespionage group shifts gaze from US to Hong Kong}}, date = {2016-09-06}, organization = {Symantec}, url = {http://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong}, language = {English}, urldate = {2019-12-24} } Buckeye cyberespionage group shifts gaze from US to Hong Kong
APT3 Keylogger
Yara Rules
[TLP:WHITE] win_keylogger_apt3_auto (20230125 | Detects win.keylogger_apt3.)
rule win_keylogger_apt3_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.keylogger_apt3."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.keylogger_apt3"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 6800000002 52 c744245801000000 89442460 c744246402000000 ff15???????? }
            // n = 6, score = 300
            //   6800000002           | push                0x2000000
            //   52                   | push                edx
            //   c744245801000000     | mov                 dword ptr [esp + 0x58], 1
            //   89442460             | mov                 dword ptr [esp + 0x60], eax
            //   c744246402000000     | mov                 dword ptr [esp + 0x64], 2
            //   ff15????????         |                     

        $sequence_1 = { 8b4dec 83c1f0 e8???????? 8b4508 e8???????? c20400 b8???????? }
            // n = 7, score = 300
            //   8b4dec               | mov                 ecx, dword ptr [ebp - 0x14]
            //   83c1f0               | add                 ecx, -0x10
            //   e8????????           |                     
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   e8????????           |                     
            //   c20400               | ret                 4
            //   b8????????           |                     

        $sequence_2 = { 7462 8d642400 8b4c2414 2bf7 2b742414 8d140f 03742410 }
            // n = 7, score = 300
            //   7462                 | je                  0x64
            //   8d642400             | lea                 esp, [esp]
            //   8b4c2414             | mov                 ecx, dword ptr [esp + 0x14]
            //   2bf7                 | sub                 esi, edi
            //   2b742414             | sub                 esi, dword ptr [esp + 0x14]
            //   8d140f               | lea                 edx, [edi + ecx]
            //   03742410             | add                 esi, dword ptr [esp + 0x10]

        $sequence_3 = { 895008 8b15???????? 89480c 895010 eb3e b8???????? 48 }
            // n = 7, score = 300
            //   895008               | mov                 dword ptr [eax + 8], edx
            //   8b15????????         |                     
            //   89480c               | mov                 dword ptr [eax + 0xc], ecx
            //   895010               | mov                 dword ptr [eax + 0x10], edx
            //   eb3e                 | jmp                 0x40
            //   b8????????           |                     
            //   48                   | dec                 eax

        $sequence_4 = { 6a00 51 6a00 6a00 6a14 6a64 6a00 }
            // n = 7, score = 300
            //   6a00                 | push                0
            //   51                   | push                ecx
            //   6a00                 | push                0
            //   6a00                 | push                0
            //   6a14                 | push                0x14
            //   6a64                 | push                0x64
            //   6a00                 | push                0

        $sequence_5 = { 6689542470 8d44242c ba424d0000 6a01 894c243a 50 c744247c00000000 }
            // n = 7, score = 300
            //   6689542470           | mov                 word ptr [esp + 0x70], dx
            //   8d44242c             | lea                 eax, [esp + 0x2c]
            //   ba424d0000           | mov                 edx, 0x4d42
            //   6a01                 | push                1
            //   894c243a             | mov                 dword ptr [esp + 0x3a], ecx
            //   50                   | push                eax
            //   c744247c00000000     | mov                 dword ptr [esp + 0x7c], 0

        $sequence_6 = { 8bf0 8b4608 6a0c 50 ffd7 }
            // n = 5, score = 300
            //   8bf0                 | mov                 esi, eax
            //   8b4608               | mov                 eax, dword ptr [esi + 8]
            //   6a0c                 | push                0xc
            //   50                   | push                eax
            //   ffd7                 | call                edi

        $sequence_7 = { 8b5c2434 85db 7414 8d4b01 8d9b00000000 }
            // n = 5, score = 300
            //   8b5c2434             | mov                 ebx, dword ptr [esp + 0x34]
            //   85db                 | test                ebx, ebx
            //   7414                 | je                  0x16
            //   8d4b01               | lea                 ecx, [ebx + 1]
            //   8d9b00000000         | lea                 ebx, [ebx]

        $sequence_8 = { 85c0 7e25 bd???????? 837d04ff 750f }
            // n = 5, score = 300
            //   85c0                 | test                eax, eax
            //   7e25                 | jle                 0x27
            //   bd????????           |                     
            //   837d04ff             | cmp                 dword ptr [ebp + 4], -1
            //   750f                 | jne                 0x11

        $sequence_9 = { ffd7 8b0d???????? 8d442420 50 51 e8???????? 8d9600020000 }
            // n = 7, score = 300
            //   ffd7                 | call                edi
            //   8b0d????????         |                     
            //   8d442420             | lea                 eax, [esp + 0x20]
            //   50                   | push                eax
            //   51                   | push                ecx
            //   e8????????           |                     
            //   8d9600020000         | lea                 edx, [esi + 0x200]

    condition:
        7 of them and filesize < 761856
}
Download all Yara Rules