Actor(s): Tonto Team
There is no description at this point.
rule win_korlia_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-07-11" version = "1" description = "Detects win.korlia." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.korlia" malpedia_rule_date = "20230705" malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41" malpedia_version = "20230715" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 6a32 50 ff15???????? 85c0 } // n = 4, score = 2400 // 6a32 | push 0x32 // 50 | push eax // ff15???????? | // 85c0 | test eax, eax $sequence_1 = { ffd6 8bc7 b9005c2605 99 } // n = 4, score = 2200 // ffd6 | call esi // 8bc7 | mov eax, edi // b9005c2605 | mov ecx, 0x5265c00 // 99 | cdq $sequence_2 = { 7410 6a28 68???????? 6aff 53 6a00 6a00 } // n = 7, score = 2200 // 7410 | je 0x12 // 6a28 | push 0x28 // 68???????? | // 6aff | push -1 // 53 | push ebx // 6a00 | push 0 // 6a00 | push 0 $sequence_3 = { 6a00 6a00 ffd6 68???????? c705????????1c010000 ff15???????? } // n = 6, score = 2200 // 6a00 | push 0 // 6a00 | push 0 // ffd6 | call esi // 68???????? | // c705????????1c010000 | // ff15???????? | $sequence_4 = { 68???????? 51 ffd6 8bc7 } // n = 4, score = 2200 // 68???????? | // 51 | push ecx // ffd6 | call esi // 8bc7 | mov eax, edi $sequence_5 = { ffd6 8bc7 b980ee3600 99 } // n = 4, score = 2200 // ffd6 | call esi // 8bc7 | mov eax, edi // b980ee3600 | mov ecx, 0x36ee80 // 99 | cdq $sequence_6 = { 5a c745fcffffffff 8a45e4 8b4df0 64890d00000000 5f } // n = 6, score = 2200 // 5a | pop edx // c745fcffffffff | mov dword ptr [ebp - 4], 0xffffffff // 8a45e4 | mov al, byte ptr [ebp - 0x1c] // 8b4df0 | mov ecx, dword ptr [ebp - 0x10] // 64890d00000000 | mov dword ptr fs:[0], ecx // 5f | pop edi $sequence_7 = { c1fa14 8bc2 c1e81f 03d0 52 68???????? 51 } // n = 7, score = 2200 // c1fa14 | sar edx, 0x14 // 8bc2 | mov eax, edx // c1e81f | shr eax, 0x1f // 03d0 | add edx, eax // 52 | push edx // 68???????? | // 51 | push ecx $sequence_8 = { 53 53 6a01 53 53 53 51 } // n = 7, score = 1900 // 53 | push ebx // 53 | push ebx // 6a01 | push 1 // 53 | push ebx // 53 | push ebx // 53 | push ebx // 51 | push ecx $sequence_9 = { e8???????? 83c410 85c0 7f14 } // n = 4, score = 1500 // e8???????? | // 83c410 | add esp, 0x10 // 85c0 | test eax, eax // 7f14 | jg 0x16 $sequence_10 = { 56 6a00 6a00 6a01 6a00 6a00 } // n = 6, score = 700 // 56 | push esi // 6a00 | push 0 // 6a00 | push 0 // 6a01 | push 1 // 6a00 | push 0 // 6a00 | push 0 $sequence_11 = { 6a01 6a00 6a00 6800000040 50 ff15???????? 8bf0 } // n = 7, score = 700 // 6a01 | push 1 // 6a00 | push 0 // 6a00 | push 0 // 6800000040 | push 0x40000000 // 50 | push eax // ff15???????? | // 8bf0 | mov esi, eax $sequence_12 = { 7423 8b542410 8b44240c 8d4c2408 6a00 } // n = 5, score = 600 // 7423 | je 0x25 // 8b542410 | mov edx, dword ptr [esp + 0x10] // 8b44240c | mov eax, dword ptr [esp + 0xc] // 8d4c2408 | lea ecx, [esp + 8] // 6a00 | push 0 $sequence_13 = { 8bf0 83feff 7423 8b542410 } // n = 4, score = 600 // 8bf0 | mov esi, eax // 83feff | cmp esi, -1 // 7423 | je 0x25 // 8b542410 | mov edx, dword ptr [esp + 0x10] $sequence_14 = { 50 56 ff15???????? 56 ff15???????? b001 } // n = 6, score = 600 // 50 | push eax // 56 | push esi // ff15???????? | // 56 | push esi // ff15???????? | // b001 | mov al, 1 $sequence_15 = { ff15???????? 833d????????ff 750c ff742404 ff15???????? 59 c3 } // n = 7, score = 500 // ff15???????? | // 833d????????ff | // 750c | jne 0xe // ff742404 | push dword ptr [esp + 4] // ff15???????? | // 59 | pop ecx // c3 | ret $sequence_16 = { c21000 e8???????? 8a4c2404 6a01 884814 } // n = 5, score = 500 // c21000 | ret 0x10 // e8???????? | // 8a4c2404 | mov cl, byte ptr [esp + 4] // 6a01 | push 1 // 884814 | mov byte ptr [eax + 0x14], cl $sequence_17 = { 8d442444 894d00 8b542438 83c504 50 } // n = 5, score = 500 // 8d442444 | lea eax, [esp + 0x44] // 894d00 | mov dword ptr [ebp], ecx // 8b542438 | mov edx, dword ptr [esp + 0x38] // 83c504 | add ebp, 4 // 50 | push eax $sequence_18 = { 884814 8b4c240c 898840200000 58 c20800 e9???????? } // n = 6, score = 500 // 884814 | mov byte ptr [eax + 0x14], cl // 8b4c240c | mov ecx, dword ptr [esp + 0xc] // 898840200000 | mov dword ptr [eax + 0x2040], ecx // 58 | pop eax // c20800 | ret 8 // e9???????? | $sequence_19 = { c3 8b65e8 ff7588 ff15???????? 833d????????ff } // n = 5, score = 500 // c3 | ret // 8b65e8 | mov esp, dword ptr [ebp - 0x18] // ff7588 | push dword ptr [ebp - 0x78] // ff15???????? | // 833d????????ff | $sequence_20 = { b8447c0000 e8???????? 53 56 57 } // n = 5, score = 500 // b8447c0000 | mov eax, 0x7c44 // e8???????? | // 53 | push ebx // 56 | push esi // 57 | push edi $sequence_21 = { 680030c800 6a00 6a00 68???????? } // n = 4, score = 500 // 680030c800 | push 0xc83000 // 6a00 | push 0 // 6a00 | push 0 // 68???????? | $sequence_22 = { 8bf9 81e7ff000000 03f2 03f7 } // n = 4, score = 500 // 8bf9 | mov edi, ecx // 81e7ff000000 | and edi, 0xff // 03f2 | add esi, edx // 03f7 | add esi, edi $sequence_23 = { 83c504 50 895500 83c504 } // n = 4, score = 500 // 83c504 | add ebp, 4 // 50 | push eax // 895500 | mov dword ptr [ebp], edx // 83c504 | add ebp, 4 $sequence_24 = { 85c0 750c ff15???????? 53 } // n = 4, score = 400 // 85c0 | test eax, eax // 750c | jne 0xe // ff15???????? | // 53 | push ebx $sequence_25 = { ffd6 8d44240c 6804010000 50 } // n = 4, score = 400 // ffd6 | call esi // 8d44240c | lea eax, [esp + 0xc] // 6804010000 | push 0x104 // 50 | push eax $sequence_26 = { 51 ff15???????? a1???????? b981000000 } // n = 4, score = 400 // 51 | push ecx // ff15???????? | // a1???????? | // b981000000 | mov ecx, 0x81 $sequence_27 = { 6a00 6880000000 6800000400 8bce e8???????? } // n = 5, score = 400 // 6a00 | push 0 // 6880000000 | push 0x80 // 6800000400 | push 0x40000 // 8bce | mov ecx, esi // e8???????? | $sequence_28 = { 5e 24fe 5b 40 81c408010000 c3 } // n = 6, score = 300 // 5e | pop esi // 24fe | and al, 0xfe // 5b | pop ebx // 40 | inc eax // 81c408010000 | add esp, 0x108 // c3 | ret $sequence_29 = { 57 740b 8b35???????? 50 ffd6 eb06 } // n = 6, score = 300 // 57 | push edi // 740b | je 0xd // 8b35???????? | // 50 | push eax // ffd6 | call esi // eb06 | jmp 8 $sequence_30 = { 8b54240c 8bf0 52 ff15???????? 8bc6 5f f7d8 } // n = 7, score = 300 // 8b54240c | mov edx, dword ptr [esp + 0xc] // 8bf0 | mov esi, eax // 52 | push edx // ff15???????? | // 8bc6 | mov eax, esi // 5f | pop edi // f7d8 | neg eax $sequence_31 = { 3bc3 7403 50 ffd6 b912010000 33c0 } // n = 6, score = 300 // 3bc3 | cmp eax, ebx // 7403 | je 5 // 50 | push eax // ffd6 | call esi // b912010000 | mov ecx, 0x112 // 33c0 | xor eax, eax $sequence_32 = { eb06 8b35???????? a1???????? 3bc3 7403 } // n = 5, score = 300 // eb06 | jmp 8 // 8b35???????? | // a1???????? | // 3bc3 | cmp eax, ebx // 7403 | je 5 $sequence_33 = { 66ab 8d4c2410 6804010000 51 } // n = 4, score = 300 // 66ab | stosw word ptr es:[edi], ax // 8d4c2410 | lea ecx, [esp + 0x10] // 6804010000 | push 0x104 // 51 | push ecx $sequence_34 = { 33c0 8dbc245e020000 66899c245c020000 f3ab } // n = 4, score = 300 // 33c0 | xor eax, eax // 8dbc245e020000 | lea edi, [esp + 0x25e] // 66899c245c020000 | mov word ptr [esp + 0x25c], bx // f3ab | rep stosd dword ptr es:[edi], eax $sequence_35 = { 56 57 b940000000 8d7c2411 } // n = 4, score = 300 // 56 | push esi // 57 | push edi // b940000000 | mov ecx, 0x40 // 8d7c2411 | lea edi, [esp + 0x11] $sequence_36 = { 6801000080 ff15???????? 85c0 0f8599000000 53 } // n = 5, score = 300 // 6801000080 | push 0x80000001 // ff15???????? | // 85c0 | test eax, eax // 0f8599000000 | jne 0x9f // 53 | push ebx $sequence_37 = { 85c0 740a 56 50 ff15???????? 8bf0 } // n = 6, score = 300 // 85c0 | test eax, eax // 740a | je 0xc // 56 | push esi // 50 | push eax // ff15???????? | // 8bf0 | mov esi, eax $sequence_38 = { 8b4c2410 50 6a01 6a00 68???????? } // n = 5, score = 300 // 8b4c2410 | mov ecx, dword ptr [esp + 0x10] // 50 | push eax // 6a01 | push 1 // 6a00 | push 0 // 68???????? | $sequence_39 = { a1???????? 8985c0edffff 8985bcedffff 33c0 } // n = 4, score = 100 // a1???????? | // 8985c0edffff | mov dword ptr [ebp - 0x1240], eax // 8985bcedffff | mov dword ptr [ebp - 0x1244], eax // 33c0 | xor eax, eax $sequence_40 = { c645fc20 c645fa20 c645f920 eb12 8a55fe 8a75ff } // n = 6, score = 100 // c645fc20 | mov byte ptr [ebp - 4], 0x20 // c645fa20 | mov byte ptr [ebp - 6], 0x20 // c645f920 | mov byte ptr [ebp - 7], 0x20 // eb12 | jmp 0x14 // 8a55fe | mov dl, byte ptr [ebp - 2] // 8a75ff | mov dh, byte ptr [ebp - 1] $sequence_41 = { e8???????? 53 33db 57 8d442420 53 } // n = 6, score = 100 // e8???????? | // 53 | push ebx // 33db | xor ebx, ebx // 57 | push edi // 8d442420 | lea eax, [esp + 0x20] // 53 | push ebx $sequence_42 = { ff15???????? 8b55e4 83c408 40 8bd8 eb83 } // n = 6, score = 100 // ff15???????? | // 8b55e4 | mov edx, dword ptr [ebp - 0x1c] // 83c408 | add esp, 8 // 40 | inc eax // 8bd8 | mov ebx, eax // eb83 | jmp 0xffffff85 $sequence_43 = { 8d9424542c0000 50 52 e8???????? 83c41c } // n = 5, score = 100 // 8d9424542c0000 | lea edx, [esp + 0x2c54] // 50 | push eax // 52 | push edx // e8???????? | // 83c41c | add esp, 0x1c $sequence_44 = { 8bec 81ec4c030000 a1???????? 33c5 8945fc 53 8b5d08 } // n = 7, score = 100 // 8bec | mov ebp, esp // 81ec4c030000 | sub esp, 0x34c // a1???????? | // 33c5 | xor eax, ebp // 8945fc | mov dword ptr [ebp - 4], eax // 53 | push ebx // 8b5d08 | mov ebx, dword ptr [ebp + 8] $sequence_45 = { 50 51 8d85f4f4ffff 50 e8???????? 33c0 } // n = 6, score = 100 // 50 | push eax // 51 | push ecx // 8d85f4f4ffff | lea eax, [ebp - 0xb0c] // 50 | push eax // e8???????? | // 33c0 | xor eax, eax $sequence_46 = { 683f000f00 57 57 ff15???????? 8bd0 3bd7 8955e4 } // n = 7, score = 100 // 683f000f00 | push 0xf003f // 57 | push edi // 57 | push edi // ff15???????? | // 8bd0 | mov edx, eax // 3bd7 | cmp edx, edi // 8955e4 | mov dword ptr [ebp - 0x1c], edx $sequence_47 = { 57 ffd0 ffb5e0e1ffff 8b431c } // n = 4, score = 100 // 57 | push edi // ffd0 | call eax // ffb5e0e1ffff | push dword ptr [ebp - 0x1e20] // 8b431c | mov eax, dword ptr [ebx + 0x1c] $sequence_48 = { 8945fc 53 682c020000 8d85c883ffff 898db483ffff 6a00 } // n = 6, score = 100 // 8945fc | mov dword ptr [ebp - 4], eax // 53 | push ebx // 682c020000 | push 0x22c // 8d85c883ffff | lea eax, [ebp - 0x7c38] // 898db483ffff | mov dword ptr [ebp - 0x7c4c], ecx // 6a00 | push 0 condition: 7 of them and filesize < 263168 }
rule win_korlia_w0 { meta: author = "Nick Hoffman" company = "CBTS - ACS" information = "korlia malware found in apt dump" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.korlia" malpedia_version = "20180125" malpedia_license = "CC BY-NC-SA 4.0" malpedia_sharing = "TLP:WHITE" //case a //b2 1f mov dl, 0x1f ; mov key (wildcard) // ----------------- //8A 86 98 40 00 71 mov al, byte ptr url[esi] //BF 98 40 00 71 mov edi, offset url //32 C2 xor al, dl //83 C9 FF or ecx, 0FFFFFFFFh //88 86 98 40 00 71 mov byte ptr url[esi], al //33 C0 xor eax, eax //46 inc esi //F2 AE repne scasb //F7 D1 not ecx //49 dec ecx //3B F1 cmp esi, ecx //72 DE jb short loc_71001DE0 //case b (variant of loop a) //8A 8A 28 50 40 00 mov cl, byte_405028[edx] //BF 28 50 40 00 mov edi, offset byte_405028 //32 CB xor cl, bl //33 C0 xor eax, eax //88 8A 28 50 40 00 mov byte_405028[edx], cl //83 C9 FF or ecx, 0FFFFFFFFh //42 inc edx //F2 AE repne scasb //F7 D1 not ecx //49 dec ecx //3B D1 cmp edx, ecx //72 DE jb short loc_4047F2 //case c (not a variant of the above loop) //8A 0C 28 mov cl, [eax+ebp] //80 F1 28 xor cl, 28h //88 0C 28 mov [eax+ebp], cl //8B 4C 24 14 mov ecx, [esp+0D78h+var_D64] //40 inc eax //3B C1 cmp eax, ecx //7C EE jl short loc_404F1C strings: $a = {b2 ?? 8A 86 98 40 00 71 BF 98 40 00 71 32 c2 83 C9 FF 88 86 98 40 00 71 33 C0 46 F2 AE F7 D1 49 3B F1} $b = {B3 ?? ?? ?? 8A 8A 28 50 40 00 BF 28 50 40 00 32 CB 33 C0 88 8A 28 50 40 00 83 C9 FF 42 F2 AE F7 D1 49 3B D1} $c = {8A 0C 28 80 F1 ?? 88 0C 28 8B 4C 24 14 40 3B C1} $d = {00 62 69 73 6F 6E 61 6C 00} //config marker "\x00bisonal\x00" condition: any of them }
rule win_korlia_w1 { meta: author = "pinksawtooth" source = "https://github.com/nao-sec/yara_rules/blob/master/Malware/bisonal.yar" reference = "https://www.paloaltonetworks.jp/company/in-the-news/2018/unit42-bisonal-malware-used-attacks-russia-south-korea" description = "rule to detect korlia/bisonal" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.korlia" malpedia_rule_date = "20210204" malpedia_hash = "" malpedia_version = "20210204" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" strings: $s1 = "akspbu.txt" ascii wide $s2 = "ks8d" ascii wide $s3 = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322" ascii wide /* bisonal_decode_jsac */ $decode = { bb bf 58 00 00 [0-2] 8d 0c 40 c1 e1 04 2b c8 8d 0c 49 8d 0c 89 8d 0c c9 8d 04 48 83 c9 ff } condition: uint16(0) == 0x5A4D and (all of ($s*) or $decode) }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY