SYMBOLCOMMON_NAMEaka. SYNONYMS
win.lightneuron (Back to overview)

LightNeuron

aka: NETTRANS, XTRANS

Actor(s): Turla Group


There is no description at this point.

References
2020-03-12ESET ResearchMatthieu Faou
@online{faou:20200312:tracking:913d16e, author = {Matthieu Faou}, title = {{Tracking Turla: New backdoor delivered via Armenian watering holes}}, date = {2020-03-12}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2020/03/12/tracking-turla-new-backdoor-armenian-watering-holes/}, language = {English}, urldate = {2020-03-13} } Tracking Turla: New backdoor delivered via Armenian watering holes
LightNeuron Mosquito NetFlash Skipper
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-07-24} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze MECHANICAL Necurs Nokki Outlook Backdoor Phobos Ransomware Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot vidar Winnti ANTHROPOID SPIDER Anunak APT31 APT39 BlackTech BuhTrap Charming Kitten CLOCKWORD SPIDER DOPPEL SPIDER Gamaredon Group Leviathan MONTY SPIDER Mustang Panda NARWHAL SPIDER NOCTURNAL SPIDER Pinchy Spider Pirate Panda Salty Spider SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER
2020-02-13QianxinQi Anxin Threat Intelligence Center
@techreport{center:20200213:report:146d333, author = {Qi Anxin Threat Intelligence Center}, title = {{APT Report 2019}}, date = {2020-02-13}, institution = {Qianxin}, url = {https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf}, language = {English}, urldate = {2020-02-27} } APT Report 2019
Chrysaor Exodus Dacls elf.vpnfilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020SecureworksSecureWorks
@online{secureworks:2020:iron:de2007f, author = {SecureWorks}, title = {{IRON HUNTER}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/iron-hunter}, language = {English}, urldate = {2020-05-23} } IRON HUNTER
Agent.BTZ Cobra Carbon System LightNeuron Mosquito Nautilus Neuron Skipper Uroburos Turla Group
2019-06-20SymantecSymantec DeepSight Adversary Intelligence Team, Symantec Network Protection Security Labs
@online{team:20190620:waterbug:9c50dd1, author = {Symantec DeepSight Adversary Intelligence Team and Symantec Network Protection Security Labs}, title = {{Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments}}, date = {2019-06-20}, organization = {Symantec}, url = {https://www.symantec.com/blogs/threat-intelligence/waterbug-espionage-governments}, language = {English}, urldate = {2020-01-13} } Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments
LightNeuron
2019-05-07ESET ResearchMatthieu Faou
@online{faou:20190507:turla:0300283, author = {Matthieu Faou}, title = {{Turla LightNeuron: An email too far}}, date = {2019-05-07}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2019/05/07/turla-lightneuron-email-too-far/}, language = {English}, urldate = {2019-11-14} } Turla LightNeuron: An email too far
LightNeuron
2019-05ESET ResearchMatthieu Faou
@techreport{faou:201905:turla:5a8a05f, author = {Matthieu Faou}, title = {{TURLA LIGHTNEURON: One email away from remote code execution}}, date = {2019-05}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf}, language = {English}, urldate = {2020-01-08} } TURLA LIGHTNEURON: One email away from remote code execution
LightNeuron
2018-07-10Kaspersky LabsGReAT
@online{great:20180710:trends:4651c7b, author = {GReAT}, title = {{APT Trends Report Q2 2018}}, date = {2018-07-10}, organization = {Kaspersky Labs}, url = {https://securelist.com/apt-trends-report-q2-2018/86487/}, language = {English}, urldate = {2019-12-20} } APT Trends Report Q2 2018
LightNeuron PoorWeb
Yara Rules
[TLP:WHITE] win_lightneuron_auto (20200817 | autogenerated rule brought to you by yara-signator)
rule win_lightneuron_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-08-17"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.lightneuron"
        malpedia_rule_date = "20200817"
        malpedia_hash = "8c895fd01eccb47a6225bcb1a3ba53cbb98644c5"
        malpedia_version = "20200817"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 4533c0 488bd3 33c9 89742428 c744242001000000 ff15???????? 83c9ff }
            // n = 7, score = 100
            //   4533c0               | add                 edi, 4
            //   488bd3               | shl                 ebp, 8
            //   33c9                 | sub                 ebx, 4
            //   89742428             | mov                 edx, 0xd0
            //   c744242001000000     | or                  ebp, eax
            //   ff15????????         |                     
            //   83c9ff               | movsx               eax, byte ptr [edi - 4]

        $sequence_1 = { 498b06 c1e908 884806 498b06 8bca c1e910 }
            // n = 6, score = 100
            //   498b06               | test                ebx, ebx
            //   c1e908               | jne                 0xef9
            //   884806               | mov                 eax, dword ptr [esp + 0x1d8]
            //   498b06               | mov                 dword ptr [esp + 0xb8], eax
            //   8bca                 | dec                 eax
            //   c1e910               | mov                 eax, dword ptr [esp + 0x100]

        $sequence_2 = { 488bce 4885c0 480f45d0 ff15???????? 85c0 0f85bf000000 488d9ea81f0000 }
            // n = 7, score = 100
            //   488bce               | xor                 ecx, ecx
            //   4885c0               | inc                 ebp
            //   480f45d0             | xor                 eax, eax
            //   ff15????????         |                     
            //   85c0                 | mov                 edx, 0xbf
            //   0f85bf000000         | mov                 ecx, 0x100000
            //   488d9ea81f0000       | dec                 eax

        $sequence_3 = { 4885c0 0f84a6070000 488d96a81f0000 488bc8 ff15???????? 488b4f48 4885c9 }
            // n = 7, score = 100
            //   4885c0               | je                  0xba6
            //   0f84a6070000         | dec                 eax
            //   488d96a81f0000       | mov                 dword ptr [esp + 8], ebx
            //   488bc8               | push                edi
            //   ff15????????         |                     
            //   488b4f48             | dec                 eax
            //   4885c9               | sub                 esp, 0x20

        $sequence_4 = { 480f45d1 488bcb e8???????? 488d542440 41b801000000 488bcf e8???????? }
            // n = 7, score = 100
            //   480f45d1             | dec                 eax
            //   488bcb               | mov                 ecx, edi
            //   e8????????           |                     
            //   488d542440           | dec                 eax
            //   41b801000000         | test                eax, eax
            //   488bcf               | je                  0x73d
            //   e8????????           |                     

        $sequence_5 = { 2bde 8d4b01 e8???????? 488bf8 4885c0 0f84c5020000 448bc3 }
            // n = 7, score = 100
            //   2bde                 | mov                 eax, dword ptr [ebx]
            //   8d4b01               | inc                 esp
            //   e8????????           |                     
            //   488bf8               | cmp                 ecx, ecx
            //   4885c0               | inc                 ecx
            //   0f84c5020000         | adc                 eax, 0
            //   448bc3               | inc                 esp

        $sequence_6 = { 448b842490000000 eb21 8b542430 4863c6 488d0c40 458b44cf10 eb0f }
            // n = 7, score = 100
            //   448b842490000000     | dec                 eax
            //   eb21                 | lea                 ebp, [eax + esi + 0xe]
            //   8b542430             | dec                 eax
            //   4863c6               | test                ebp, ebp
            //   488d0c40             | je                  0xf1c
            //   458b44cf10           | sub                 esi, ebp
            //   eb0f                 | add                 esi, edi

        $sequence_7 = { 418d4940 4c897c2428 44897c2420 e8???????? 488d4c2460 e8???????? b803000000 }
            // n = 7, score = 100
            //   418d4940             | inc                 ecx
            //   4c897c2428           | mov                 ebx, eax
            //   44897c2420           | dec                 eax
            //   e8????????           |                     
            //   488d4c2460           | mov                 edi, edx
            //   e8????????           |                     
            //   b803000000           | dec                 esp

        $sequence_8 = { 4889742438 0f42e8 4885c9 7437 e8???????? 488bf0 }
            // n = 6, score = 100
            //   4889742438           | test                esi, esi
            //   0f42e8               | je                  0xe79
            //   4885c9               | dec                 esp
            //   7437                 | mov                 eax, edx
            //   e8????????           |                     
            //   488bf0               | dec                 ebx

        $sequence_9 = { c6441c3000 ff15???????? 33ff 448be0 8bf7 85c0 741d }
            // n = 7, score = 100
            //   c6441c3000           | cmp                 dword ptr [esp + 0xa0], edx
            //   ff15????????         |                     
            //   33ff                 | jge                 0x1a54
            //   448be0               | or                  eax, 0xffffffff
            //   8bf7                 | dec                 eax
            //   85c0                 | add                 esp, 0x58
            //   741d                 | inc                 ecx

    condition:
        7 of them and filesize < 573440
}
Download all Yara Rules