SYMBOLCOMMON_NAMEaka. SYNONYMS
win.lodeinfo (Back to overview)

LODEINFO

Actor(s): MirrorFace

VTCollection    

There is no description at this point.

References
2024-07-16JPCERT/CCShusei Tomonaga
MirrorFace Attack against Japanese Organisations
LODEINFO NOOPDOOR
2024-05-01MacnicaMacnica Networks
The Reality of Targeted Attacks and Countermeasures: Trends in Cyber Espionage (Targeted Attacks) Targeting Japan FY2023
LODEINFO NOOPDOOR
2024-02-29YouTube (Kaspersky Tech)Suguru Ishimaru
Unleashing the Secrets:A Full Analysis for the Complex LODEINFO v0.7.1
LODEINFO
2024-01-26TrendmicroHara Hiroaki, Masaoki Shoji, Nick Dai, Vickie Su, Yuka Higashi
Spot the Difference: An Analysis of the New LODEINFO Campaign by Earth Kasha
Anel Cobalt Strike LODEINFO NOOPDOOR
2024-01-24ITOCHUITOCHU Cyber & Intelligence Inc.
The Endless Struggle Against APT10: Insights from LODEINFO v0.6.6 - v0.7.3 Analysis
LODEINFO
2023-10-26ESET ResearchESET Research
ESET APT Activity Report Q2–Q3 2023
SimpleTea LODEINFO
2023-01-25N.F.Laboratories Inc.Daisuke Saika, Hiroki Kubokawa, Ryo Minakawa
Fighting to LODEINFO Investigation for Continuous Cyberespionage Based on Open Source
LODEINFO
2022-12-14ESET ResearchDominik Breitenbacher
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities
LODEINFO MirrorFace
2022-10-31Kaspersky LabsSuguru Ishimaru
APT10: Tracking down LODEINFO 2022, part I
LODEINFO
2022-10-31Kaspersky LabsSuguru Ishimaru
APT10: Tracking down LODEINFO 2022, part II
LODEINFO
2021-02-18JPCERT/CCKota Kino
Further Updates in LODEINFO Malware
LODEINFO
2021-01-19Twitter (@jpcert_ac)JPCERT/CC
Tweet on LODEINFO ver 0.47 spotted ITW targeting Japan
LODEINFO
2020-11-03Kaspersky LabsGReAT
APT trends report Q3 2020
WellMail EVILNUM Janicab Poet RAT AsyncRAT Ave Maria Cobalt Strike Crimson RAT CROSSWALK Dtrack LODEINFO MoriAgent Okrum PlugX poisonplug Rover ShadowPad SoreFang Winnti
2020-06-20Cyber And Ramen blogmsec1203
Analysis of LODEINFO Maldoc
LODEINFO
2020-06-11JPCERT/CCKota Kino
マルウエアLODEINFOの進化 (Evolution of Malware LODEINFO)
LODEINFO
2020-05-01Macnica NetworksMacnica Networks, TeamT5
Cyber Espionage Tradecraft in the Real World Adversaries targeting Japan in the second half of 2019
TSCookie LODEINFO
2020-02-27JPCERT/CCKota Kino
Malware “LODEINFO” Targeting Japan
LODEINFO
2020-02-20JPCERT/CCKota Kino
日本国内の組織を狙ったマルウエアLODEINFO
LODEINFO
Yara Rules
[TLP:WHITE] win_lodeinfo_auto (20241030 | Detects win.lodeinfo.)
rule win_lodeinfo_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2024-10-31"
        version = "1"
        description = "Detects win.lodeinfo."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.lodeinfo"
        malpedia_rule_date = "20241030"
        malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4"
        malpedia_version = "20241030"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 898300010000 8b8558ffffff c7837001000000000000 e9???????? ba???????? 8bcf e8???????? }
            // n = 7, score = 200
            //   898300010000         | mov                 dword ptr [ebx + 0x100], eax
            //   8b8558ffffff         | mov                 eax, dword ptr [ebp - 0xa8]
            //   c7837001000000000000     | mov    dword ptr [ebx + 0x170], 0
            //   e9????????           |                     
            //   ba????????           |                     
            //   8bcf                 | mov                 ecx, edi
            //   e8????????           |                     

        $sequence_1 = { 75a8 8b55e4 8b7d14 8b4508 3bcf 0f84440a0000 }
            // n = 6, score = 200
            //   75a8                 | jne                 0xffffffaa
            //   8b55e4               | mov                 edx, dword ptr [ebp - 0x1c]
            //   8b7d14               | mov                 edi, dword ptr [ebp + 0x14]
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   3bcf                 | cmp                 ecx, edi
            //   0f84440a0000         | je                  0xa4a

        $sequence_2 = { 3bf2 743f 50 ffb548ffffff 51 8b8d5cffffff 8bd1 }
            // n = 7, score = 200
            //   3bf2                 | cmp                 esi, edx
            //   743f                 | je                  0x41
            //   50                   | push                eax
            //   ffb548ffffff         | push                dword ptr [ebp - 0xb8]
            //   51                   | push                ecx
            //   8b8d5cffffff         | mov                 ecx, dword ptr [ebp - 0xa4]
            //   8bd1                 | mov                 edx, ecx

        $sequence_3 = { 7534 0fb64e04 0fbec3 3bc8 7529 0fb64e05 }
            // n = 6, score = 200
            //   7534                 | jne                 0x36
            //   0fb64e04             | movzx               ecx, byte ptr [esi + 4]
            //   0fbec3               | movsx               eax, bl
            //   3bc8                 | cmp                 ecx, eax
            //   7529                 | jne                 0x2b
            //   0fb64e05             | movzx               ecx, byte ptr [esi + 5]

        $sequence_4 = { 8be5 5d c3 83f806 754d 837e0408 8b4d14 }
            // n = 7, score = 200
            //   8be5                 | mov                 esp, ebp
            //   5d                   | pop                 ebp
            //   c3                   | ret                 
            //   83f806               | cmp                 eax, 6
            //   754d                 | jne                 0x4f
            //   837e0408             | cmp                 dword ptr [esi + 4], 8
            //   8b4d14               | mov                 ecx, dword ptr [ebp + 0x14]

        $sequence_5 = { 0f8586000000 8d4ffc 034d08 e8???????? 8b1b 33ff 89450c }
            // n = 7, score = 200
            //   0f8586000000         | jne                 0x8c
            //   8d4ffc               | lea                 ecx, [edi - 4]
            //   034d08               | add                 ecx, dword ptr [ebp + 8]
            //   e8????????           |                     
            //   8b1b                 | mov                 ebx, dword ptr [ebx]
            //   33ff                 | xor                 edi, edi
            //   89450c               | mov                 dword ptr [ebp + 0xc], eax

        $sequence_6 = { 8955d4 8d1418 8b45fc 8955d8 3b5008 7641 8b4008 }
            // n = 7, score = 200
            //   8955d4               | mov                 dword ptr [ebp - 0x2c], edx
            //   8d1418               | lea                 edx, [eax + ebx]
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   8955d8               | mov                 dword ptr [ebp - 0x28], edx
            //   3b5008               | cmp                 edx, dword ptr [eax + 8]
            //   7641                 | jbe                 0x43
            //   8b4008               | mov                 eax, dword ptr [eax + 8]

        $sequence_7 = { e8???????? 84c0 0f8481000000 83fe09 0f8592020000 8bb554ffffff }
            // n = 6, score = 200
            //   e8????????           |                     
            //   84c0                 | test                al, al
            //   0f8481000000         | je                  0x87
            //   83fe09               | cmp                 esi, 9
            //   0f8592020000         | jne                 0x298
            //   8bb554ffffff         | mov                 esi, dword ptr [ebp - 0xac]

        $sequence_8 = { 024df4 8b45c4 880c30 8bc3 0fb64dfc 2bc1 99 }
            // n = 7, score = 200
            //   024df4               | add                 cl, byte ptr [ebp - 0xc]
            //   8b45c4               | mov                 eax, dword ptr [ebp - 0x3c]
            //   880c30               | mov                 byte ptr [eax + esi], cl
            //   8bc3                 | mov                 eax, ebx
            //   0fb64dfc             | movzx               ecx, byte ptr [ebp - 4]
            //   2bc1                 | sub                 eax, ecx
            //   99                   | cdq                 

        $sequence_9 = { e8???????? ff75bc e8???????? ff75c0 e8???????? ff75cc }
            // n = 6, score = 200
            //   e8????????           |                     
            //   ff75bc               | push                dword ptr [ebp - 0x44]
            //   e8????????           |                     
            //   ff75c0               | push                dword ptr [ebp - 0x40]
            //   e8????????           |                     
            //   ff75cc               | push                dword ptr [ebp - 0x34]

    condition:
        7 of them and filesize < 712704
}
Download all Yara Rules