SYMBOLCOMMON_NAMEaka. SYNONYMS
win.lightneuron (Back to overview)

LightNeuron

aka: NETTRANS, XTRANS

Actor(s): Turla Group


There is no description at this point.

References
2020-03-12ESET ResearchMatthieu Faou
@online{faou:20200312:tracking:913d16e, author = {Matthieu Faou}, title = {{Tracking Turla: New backdoor delivered via Armenian watering holes}}, date = {2020-03-12}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2020/03/12/tracking-turla-new-backdoor-armenian-watering-holes/}, language = {English}, urldate = {2020-03-13} } Tracking Turla: New backdoor delivered via Armenian watering holes
LightNeuron Mosquito NetFlash Skipper
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-03-04} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze Necurs Nokki Outlook Backdoor Phobos Ransomware Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot vidar Winnti ANTHROPOID SPIDER Anunak APT39 BlackTech BuhTrap Charming Kitten CLOCKWORD SPIDER DOPPEL SPIDER Gamaredon Group Judgment Panda Leviathan MONTY SPIDER Mustang Panda NARWHAL SPIDER NOCTURNAL SPIDER Pinchy Spider Pirate Panda Salty Spider SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER
2020-02-13QianxinQi Anxin Threat Intelligence Center
@techreport{center:20200213:report:146d333, author = {Qi Anxin Threat Intelligence Center}, title = {{APT Report 2019}}, date = {2020-02-13}, institution = {Qianxin}, url = {https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf}, language = {English}, urldate = {2020-02-27} } APT Report 2019
Chrysaor Exodus Dacls elf.vpnfilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020SecureworksSecureWorks
@online{secureworks:2020:iron:de2007f, author = {SecureWorks}, title = {{IRON HUNTER}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/iron-hunter}, language = {English}, urldate = {2020-05-23} } IRON HUNTER
Agent.BTZ Cobra Carbon System LightNeuron Mosquito Nautilus Neuron Skipper Uroburos Turla Group
2019-06-20SymantecSymantec DeepSight Adversary Intelligence Team, Symantec Network Protection Security Labs
@online{team:20190620:waterbug:9c50dd1, author = {Symantec DeepSight Adversary Intelligence Team and Symantec Network Protection Security Labs}, title = {{Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments}}, date = {2019-06-20}, organization = {Symantec}, url = {https://www.symantec.com/blogs/threat-intelligence/waterbug-espionage-governments}, language = {English}, urldate = {2020-01-13} } Waterbug: Espionage Group Rolls Out Brand-New Toolset in Attacks Against Governments
LightNeuron
2019-05-07ESET ResearchMatthieu Faou
@online{faou:20190507:turla:0300283, author = {Matthieu Faou}, title = {{Turla LightNeuron: An email too far}}, date = {2019-05-07}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2019/05/07/turla-lightneuron-email-too-far/}, language = {English}, urldate = {2019-11-14} } Turla LightNeuron: An email too far
LightNeuron
2019-05ESET ResearchMatthieu Faou
@techreport{faou:201905:turla:5a8a05f, author = {Matthieu Faou}, title = {{TURLA LIGHTNEURON: One email away from remote code execution}}, date = {2019-05}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf}, language = {English}, urldate = {2020-01-08} } TURLA LIGHTNEURON: One email away from remote code execution
LightNeuron
2018-07-10Kaspersky LabsGReAT
@online{great:20180710:trends:4651c7b, author = {GReAT}, title = {{APT Trends Report Q2 2018}}, date = {2018-07-10}, organization = {Kaspersky Labs}, url = {https://securelist.com/apt-trends-report-q2-2018/86487/}, language = {English}, urldate = {2019-12-20} } APT Trends Report Q2 2018
LightNeuron PoorWeb
Yara Rules
[TLP:WHITE] win_lightneuron_auto (20200529 | autogenerated rule brought to you by yara-signator)
rule win_lightneuron_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-05-30"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.lightneuron"
        malpedia_rule_date = "20200529"
        malpedia_hash = "92c362319514e5a6da26204961446caa3a8b32a8"
        malpedia_version = "20200529"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 75de 85ed 7454 4c3b642430 721e 498d542401 }
            // n = 6, score = 100
            //   75de                 | inc                 ebx
            //   85ed                 | test                eax, eax
            //   7454                 | je                  0xdcd
            //   4c3b642430           | dec                 esp
            //   721e                 | mov                 esp, dword ptr [esp + 0xe0]
            //   498d542401           | dec                 eax

        $sequence_1 = { 8bc2 448bc5 48c1e810 448bce 0fb6c8 8bc5 418b948ed0030300 }
            // n = 7, score = 100
            //   8bc2                 | sub                 eax, 4
            //   448bc5               | dec                 ecx
            //   48c1e810             | sub                 edi, 1
            //   448bce               | jne                 0x1c38
            //   0fb6c8               | jmp                 0x1c4e
            //   8bc5                 | cmp                 dword ptr [eax], 0
            //   418b948ed0030300     | jne                 0x1c62

        $sequence_2 = { 448ba48dc0ed0300 410fb6c1 4433a485c0e90300 41337508 410fb6c2 4433a48580d90300 410fb6c3 }
            // n = 7, score = 100
            //   448ba48dc0ed0300     | pop                 edi
            //   410fb6c1             | ret                 
            //   4433a485c0e90300     | cmp                 cl, 0x20
            //   41337508             | jne                 0xb23
            //   410fb6c2             | mov                 dword ptr [esi + 0x28], 5
            //   4433a48580d90300     | dec                 eax
            //   410fb6c3             | add                 esp, 0x20

        $sequence_3 = { c1e810 488bcf 8844243e e8???????? 488d35c760ffff 8b03 3d02010000 }
            // n = 7, score = 100
            //   c1e810               | mov                 eax, dword ptr [esp + 0x50]
            //   488bcf               | dec                 eax
            //   8844243e             | mov                 ebx, dword ptr [esp + 0xf0]
            //   e8????????           |                     
            //   488d35c760ffff       | mov                 edi, dword ptr [esp + 0xe8]
            //   8b03                 | dec                 esp
            //   3d02010000           | mov                 ebp, dword ptr [esp + 0x48]

        $sequence_4 = { 448b5314 4183d100 450fb7c2 41c1ea10 418bc8 418bd2 0fafcf }
            // n = 7, score = 100
            //   448b5314             | add                 esp, 8
            //   4183d100             | ret                 
            //   450fb7c2             | inc                 ecx
            //   41c1ea10             | cmp                 edx, 0x4b0
            //   418bc8               | jne                 0x71a
            //   418bd2               | movzx               ecx, byte ptr [edx + 1]
            //   0fafcf               | movzx               eax, byte ptr [edx]

        $sequence_5 = { 33ca 453bc3 0fb6d1 7cd5 418bd1 4c8d056bd40100 41ba0a000000 }
            // n = 7, score = 100
            //   33ca                 | mov                 ecx, ebx
            //   453bc3               | inc                 esp
            //   0fb6d1               | mov                 dword ptr [esp + 0x88], edi
            //   7cd5                 | inc                 ebp
            //   418bd1               | mov                 esi, edi
            //   4c8d056bd40100       | mov                 ecx, 0x4ae
            //   41ba0a000000         | inc                 esp

        $sequence_6 = { 83ea03 7447 81faf20f0000 7533 488b5318 488b4b10 4889742430 }
            // n = 7, score = 100
            //   83ea03               | pop                 edi
            //   7447                 | je                  0x1dfb
            //   81faf20f0000         | dec                 esp
            //   7533                 | mov                 eax, dword ptr [esp + 0x30]
            //   488b5318             | xor                 edx, edx
            //   488b4b10             | dec                 eax
            //   4889742430           | mov                 ecx, eax

        $sequence_7 = { 767f 498d7f01 6666666666660f1f840000000000 0fb617 ffc3 48ffc7 88542470 }
            // n = 7, score = 100
            //   767f                 | mov                 edx, dword ptr [ebp + 0xc]
            //   498d7f01             | inc                 esp
            //   6666666666660f1f840000000000     | mov    eax, dword ptr [ebp + 4]
            //   0fb617               | mov                 eax, edx
            //   ffc3                 | shr                 eax, 0x10
            //   48ffc7               | movzx               ecx, al
            //   88542470             | cmp                 ax, cx

        $sequence_8 = { 0f858d000000 83c801 48896c2440 8b6c2460 83fd02 894128 }
            // n = 6, score = 100
            //   0f858d000000         | dec                 eax
            //   83c801               | mov                 eax, dword ptr [ebx + 0x18]
            //   48896c2440           | dec                 eax
            //   8b6c2460             | mov                 ecx, dword ptr [eax + 8]
            //   83fd02               | dec                 eax
            //   894128               | test                ecx, ecx

        $sequence_9 = { 741e 448b842418010000 33d2 488bcf 41c1e002 e8???????? }
            // n = 6, score = 100
            //   741e                 | inc                 ecx
            //   448b842418010000     | lea                 edx, [ecx + 0x64]
            //   33d2                 | inc                 esp
            //   488bcf               | mov                 eax, eax
            //   41c1e002             | inc                 ebp
            //   e8????????           |                     

    condition:
        7 of them and filesize < 573440
}
Download all Yara Rules