Actor(s): Tonto Team
There is no description at this point.
rule win_korlia_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2022-05-16" version = "1" description = "Detects win.korlia." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.korlia" malpedia_rule_date = "20220513" malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26" malpedia_version = "20220516" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 6a32 50 ff15???????? 85c0 } // n = 4, score = 2400 // 6a32 | push 0x32 // 50 | push eax // ff15???????? | // 85c0 | test eax, eax $sequence_1 = { 52 68???????? 51 ffd6 8bc7 b980ee3600 } // n = 6, score = 2200 // 52 | push edx // 68???????? | // 51 | push ecx // ffd6 | call esi // 8bc7 | mov eax, edi // b980ee3600 | mov ecx, 0x36ee80 $sequence_2 = { 5a c745fcffffffff 8a45e4 8b4df0 } // n = 4, score = 2200 // 5a | pop edx // c745fcffffffff | mov dword ptr [ebp - 4], 0xffffffff // 8a45e4 | mov al, byte ptr [ebp - 0x1c] // 8b4df0 | mov ecx, dword ptr [ebp - 0x10] $sequence_3 = { 85db 7410 6a28 68???????? 6aff 53 6a00 } // n = 7, score = 2200 // 85db | test ebx, ebx // 7410 | je 0x12 // 6a28 | push 0x28 // 68???????? | // 6aff | push -1 // 53 | push ebx // 6a00 | push 0 $sequence_4 = { f2ae f7d1 49 83f90f 7604 } // n = 5, score = 2200 // f2ae | repne scasb al, byte ptr es:[edi] // f7d1 | not ecx // 49 | dec ecx // 83f90f | cmp ecx, 0xf // 7604 | jbe 6 $sequence_5 = { 8965e8 c645e401 c745fc00000000 52 51 } // n = 5, score = 2200 // 8965e8 | mov dword ptr [ebp - 0x18], esp // c645e401 | mov byte ptr [ebp - 0x1c], 1 // c745fc00000000 | mov dword ptr [ebp - 4], 0 // 52 | push edx // 51 | push ecx $sequence_6 = { 0f9445e4 5b 59 5a c745fcffffffff } // n = 5, score = 2200 // 0f9445e4 | sete byte ptr [ebp - 0x1c] // 5b | pop ebx // 59 | pop ecx // 5a | pop edx // c745fcffffffff | mov dword ptr [ebp - 4], 0xffffffff $sequence_7 = { 6a00 ffd6 ff15???????? 8bf8 b83bd4b531 } // n = 5, score = 2200 // 6a00 | push 0 // ffd6 | call esi // ff15???????? | // 8bf8 | mov edi, eax // b83bd4b531 | mov eax, 0x31b5d43b $sequence_8 = { 53 6a01 53 53 53 51 } // n = 6, score = 1900 // 53 | push ebx // 6a01 | push 1 // 53 | push ebx // 53 | push ebx // 53 | push ebx // 51 | push ecx $sequence_9 = { e8???????? 83c410 85c0 7f14 } // n = 4, score = 1500 // e8???????? | // 83c410 | add esp, 0x10 // 85c0 | test eax, eax // 7f14 | jg 0x16 $sequence_10 = { 6a01 6a00 6a00 6800000040 50 ff15???????? 8bf0 } // n = 7, score = 700 // 6a01 | push 1 // 6a00 | push 0 // 6a00 | push 0 // 6800000040 | push 0x40000000 // 50 | push eax // ff15???????? | // 8bf0 | mov esi, eax $sequence_11 = { 56 6a00 6a00 6a01 6a00 6a00 } // n = 6, score = 700 // 56 | push esi // 6a00 | push 0 // 6a00 | push 0 // 6a01 | push 1 // 6a00 | push 0 // 6a00 | push 0 $sequence_12 = { 50 56 ff15???????? 56 ff15???????? b001 } // n = 6, score = 600 // 50 | push eax // 56 | push esi // ff15???????? | // 56 | push esi // ff15???????? | // b001 | mov al, 1 $sequence_13 = { 7423 8b542410 8b44240c 8d4c2408 6a00 51 } // n = 6, score = 600 // 7423 | je 0x25 // 8b542410 | mov edx, dword ptr [esp + 0x10] // 8b44240c | mov eax, dword ptr [esp + 0xc] // 8d4c2408 | lea ecx, [esp + 8] // 6a00 | push 0 // 51 | push ecx $sequence_14 = { 50 ff15???????? 8bf0 83feff 7423 8b542410 } // n = 6, score = 600 // 50 | push eax // ff15???????? | // 8bf0 | mov esi, eax // 83feff | cmp esi, -1 // 7423 | je 0x25 // 8b542410 | mov edx, dword ptr [esp + 0x10] $sequence_15 = { f2ae f7d1 2bf9 6810270000 } // n = 4, score = 600 // f2ae | repne scasb al, byte ptr es:[edi] // f7d1 | not ecx // 2bf9 | sub edi, ecx // 6810270000 | push 0x2710 $sequence_16 = { b8447c0000 e8???????? 53 56 57 } // n = 5, score = 500 // b8447c0000 | mov eax, 0x7c44 // e8???????? | // 53 | push ebx // 56 | push esi // 57 | push edi $sequence_17 = { e8???????? c21000 e8???????? 8a4c2404 } // n = 4, score = 500 // e8???????? | // c21000 | ret 0x10 // e8???????? | // 8a4c2404 | mov cl, byte ptr [esp + 4] $sequence_18 = { 8b4c240c 898840200000 58 c20800 e9???????? 6800060000 } // n = 6, score = 500 // 8b4c240c | mov ecx, dword ptr [esp + 0xc] // 898840200000 | mov dword ptr [eax + 0x2040], ecx // 58 | pop eax // c20800 | ret 8 // e9???????? | // 6800060000 | push 0x600 $sequence_19 = { 8d442444 894d00 8b542438 83c504 50 } // n = 5, score = 500 // 8d442444 | lea eax, [esp + 0x44] // 894d00 | mov dword ptr [ebp], ecx // 8b542438 | mov edx, dword ptr [esp + 0x38] // 83c504 | add ebp, 4 // 50 | push eax $sequence_20 = { 8b65e8 ff7588 ff15???????? 833d????????ff 750c ff742404 } // n = 6, score = 500 // 8b65e8 | mov esp, dword ptr [ebp - 0x18] // ff7588 | push dword ptr [ebp - 0x78] // ff15???????? | // 833d????????ff | // 750c | jne 0xe // ff742404 | push dword ptr [esp + 4] $sequence_21 = { 83c504 50 895500 83c504 } // n = 4, score = 500 // 83c504 | add ebp, 4 // 50 | push eax // 895500 | mov dword ptr [ebp], edx // 83c504 | add ebp, 4 $sequence_22 = { 8bf9 81e7ff000000 03f2 03f7 } // n = 4, score = 500 // 8bf9 | mov edi, ecx // 81e7ff000000 | and edi, 0xff // 03f2 | add esi, edx // 03f7 | add esi, edi $sequence_23 = { e8???????? 8a4c2404 6a01 884814 8b4c240c } // n = 5, score = 500 // e8???????? | // 8a4c2404 | mov cl, byte ptr [esp + 4] // 6a01 | push 1 // 884814 | mov byte ptr [eax + 0x14], cl // 8b4c240c | mov ecx, dword ptr [esp + 0xc] $sequence_24 = { 6a00 6a00 6a00 50 8bce e8???????? 6a00 } // n = 7, score = 400 // 6a00 | push 0 // 6a00 | push 0 // 6a00 | push 0 // 50 | push eax // 8bce | mov ecx, esi // e8???????? | // 6a00 | push 0 $sequence_25 = { 6880000000 6800000400 8bce e8???????? } // n = 4, score = 400 // 6880000000 | push 0x80 // 6800000400 | push 0x40000 // 8bce | mov ecx, esi // e8???????? | $sequence_26 = { 51 ff15???????? a1???????? b981000000 } // n = 4, score = 400 // 51 | push ecx // ff15???????? | // a1???????? | // b981000000 | mov ecx, 0x81 $sequence_27 = { ffd6 8d44240c 6804010000 50 } // n = 4, score = 400 // ffd6 | call esi // 8d44240c | lea eax, [esp + 0xc] // 6804010000 | push 0x104 // 50 | push eax $sequence_28 = { e8???????? 85c0 6804010000 7415 8b4c2418 8d842450020000 50 } // n = 7, score = 400 // e8???????? | // 85c0 | test eax, eax // 6804010000 | push 0x104 // 7415 | je 0x17 // 8b4c2418 | mov ecx, dword ptr [esp + 0x18] // 8d842450020000 | lea eax, [esp + 0x250] // 50 | push eax $sequence_29 = { 81ec08010000 8d442400 50 6806000200 6a00 68???????? 6801000080 } // n = 7, score = 300 // 81ec08010000 | sub esp, 0x108 // 8d442400 | lea eax, [esp] // 50 | push eax // 6806000200 | push 0x20006 // 6a00 | push 0 // 68???????? | // 6801000080 | push 0x80000001 $sequence_30 = { 5e 24fe 5b 40 81c408010000 } // n = 5, score = 300 // 5e | pop esi // 24fe | and al, 0xfe // 5b | pop ebx // 40 | inc eax // 81c408010000 | add esp, 0x108 $sequence_31 = { 56 57 b940000000 8d7c2411 88442410 f3ab } // n = 6, score = 300 // 56 | push esi // 57 | push edi // b940000000 | mov ecx, 0x40 // 8d7c2411 | lea edi, [esp + 0x11] // 88442410 | mov byte ptr [esp + 0x10], al // f3ab | rep stosd dword ptr es:[edi], eax $sequence_32 = { 33c0 8dbc245e020000 66899c245c020000 f3ab } // n = 4, score = 300 // 33c0 | xor eax, eax // 8dbc245e020000 | lea edi, [esp + 0x25e] // 66899c245c020000 | mov word ptr [esp + 0x25c], bx // f3ab | rep stosd dword ptr es:[edi], eax $sequence_33 = { 68???????? 51 ff15???????? 8b54240c 8bf0 } // n = 5, score = 300 // 68???????? | // 51 | push ecx // ff15???????? | // 8b54240c | mov edx, dword ptr [esp + 0xc] // 8bf0 | mov esi, eax $sequence_34 = { 56 3bc3 57 740b 8b35???????? } // n = 5, score = 300 // 56 | push esi // 3bc3 | cmp eax, ebx // 57 | push edi // 740b | je 0xd // 8b35???????? | $sequence_35 = { 83c414 e8???????? 6a00 6a00 8d542414 6a00 52 } // n = 7, score = 300 // 83c414 | add esp, 0x14 // e8???????? | // 6a00 | push 0 // 6a00 | push 0 // 8d542414 | lea edx, [esp + 0x14] // 6a00 | push 0 // 52 | push edx $sequence_36 = { 56 68ff0f1f00 ff15???????? 85c0 740a 56 50 } // n = 7, score = 300 // 56 | push esi // 68ff0f1f00 | push 0x1f0fff // ff15???????? | // 85c0 | test eax, eax // 740a | je 0xc // 56 | push esi // 50 | push eax $sequence_37 = { 8b35???????? 50 ffd6 eb06 8b35???????? a1???????? 3bc3 } // n = 7, score = 300 // 8b35???????? | // 50 | push eax // ffd6 | call esi // eb06 | jmp 8 // 8b35???????? | // a1???????? | // 3bc3 | cmp eax, ebx $sequence_38 = { 8b35???????? a1???????? 3bc3 7403 50 ffd6 } // n = 6, score = 300 // 8b35???????? | // a1???????? | // 3bc3 | cmp eax, ebx // 7403 | je 5 // 50 | push eax // ffd6 | call esi $sequence_39 = { ff15???????? 85c0 0f8599000000 53 } // n = 4, score = 300 // ff15???????? | // 85c0 | test eax, eax // 0f8599000000 | jne 0x9f // 53 | push ebx $sequence_40 = { 56 b981000000 33c0 8d7c2416 } // n = 4, score = 100 // 56 | push esi // b981000000 | mov ecx, 0x81 // 33c0 | xor eax, eax // 8d7c2416 | lea edi, [esp + 0x16] $sequence_41 = { ff15???????? 6a00 53 ff15???????? 8b55e4 83c408 40 } // n = 7, score = 100 // ff15???????? | // 6a00 | push 0 // 53 | push ebx // ff15???????? | // 8b55e4 | mov edx, dword ptr [ebp - 0x1c] // 83c408 | add esp, 8 // 40 | inc eax $sequence_42 = { 50 e8???????? 8d8c24202d0000 50 51 e8???????? } // n = 6, score = 100 // 50 | push eax // e8???????? | // 8d8c24202d0000 | lea ecx, [esp + 0x2d20] // 50 | push eax // 51 | push ecx // e8???????? | $sequence_43 = { ffd7 8b4ddc 51 ffd3 } // n = 4, score = 100 // ffd7 | call edi // 8b4ddc | mov ecx, dword ptr [ebp - 0x24] // 51 | push ecx // ffd3 | call ebx condition: 7 of them and filesize < 163840 }
rule win_korlia_w0 { meta: author = "Nick Hoffman" company = "CBTS - ACS" information = "korlia malware found in apt dump" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.korlia" malpedia_version = "20180125" malpedia_license = "CC BY-NC-SA 4.0" malpedia_sharing = "TLP:WHITE" //case a //b2 1f mov dl, 0x1f ; mov key (wildcard) // ----------------- //8A 86 98 40 00 71 mov al, byte ptr url[esi] //BF 98 40 00 71 mov edi, offset url //32 C2 xor al, dl //83 C9 FF or ecx, 0FFFFFFFFh //88 86 98 40 00 71 mov byte ptr url[esi], al //33 C0 xor eax, eax //46 inc esi //F2 AE repne scasb //F7 D1 not ecx //49 dec ecx //3B F1 cmp esi, ecx //72 DE jb short loc_71001DE0 //case b (variant of loop a) //8A 8A 28 50 40 00 mov cl, byte_405028[edx] //BF 28 50 40 00 mov edi, offset byte_405028 //32 CB xor cl, bl //33 C0 xor eax, eax //88 8A 28 50 40 00 mov byte_405028[edx], cl //83 C9 FF or ecx, 0FFFFFFFFh //42 inc edx //F2 AE repne scasb //F7 D1 not ecx //49 dec ecx //3B D1 cmp edx, ecx //72 DE jb short loc_4047F2 //case c (not a variant of the above loop) //8A 0C 28 mov cl, [eax+ebp] //80 F1 28 xor cl, 28h //88 0C 28 mov [eax+ebp], cl //8B 4C 24 14 mov ecx, [esp+0D78h+var_D64] //40 inc eax //3B C1 cmp eax, ecx //7C EE jl short loc_404F1C strings: $a = {b2 ?? 8A 86 98 40 00 71 BF 98 40 00 71 32 c2 83 C9 FF 88 86 98 40 00 71 33 C0 46 F2 AE F7 D1 49 3B F1} $b = {B3 ?? ?? ?? 8A 8A 28 50 40 00 BF 28 50 40 00 32 CB 33 C0 88 8A 28 50 40 00 83 C9 FF 42 F2 AE F7 D1 49 3B D1} $c = {8A 0C 28 80 F1 ?? 88 0C 28 8B 4C 24 14 40 3B C1} $d = {00 62 69 73 6F 6E 61 6C 00} //config marker "\x00bisonal\x00" condition: any of them }
rule win_korlia_w1 { meta: author = "pinksawtooth" source = "https://github.com/nao-sec/yara_rules/blob/master/Malware/bisonal.yar" reference = "https://www.paloaltonetworks.jp/company/in-the-news/2018/unit42-bisonal-malware-used-attacks-russia-south-korea" description = "rule to detect korlia/bisonal" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.korlia" malpedia_rule_date = "20210204" malpedia_hash = "" malpedia_version = "20210204" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" strings: $s1 = "akspbu.txt" ascii wide $s2 = "ks8d" ascii wide $s3 = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322" ascii wide /* bisonal_decode_jsac */ $decode = { bb bf 58 00 00 [0-2] 8d 0c 40 c1 e1 04 2b c8 8d 0c 49 8d 0c 89 8d 0c c9 8d 04 48 83 c9 ff } condition: uint16(0) == 0x5A4D and (all of ($s*) or $decode) }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY