SYMBOLCOMMON_NAMEaka. SYNONYMS
win.maoloa (Back to overview)

Maoloa


Ransomware family closely related to GlobeImposter, notable for its use of SHACAL-2 encryption algorithm.

References
2022-07-20SophosColin Cowie, Gabor Szappanos
@online{cowie:20220720:ooda:6c453ab, author = {Colin Cowie and Gabor Szappanos}, title = {{OODA: X-Ops Takes On Burgeoning SQL Server Attacks}}, date = {2022-07-20}, organization = {Sophos}, url = {https://news.sophos.com/en-us/2022/07/20/ooda-x-ops-takes-on-burgeoning-sql-server-attacks/}, language = {English}, urldate = {2023-05-30} } OODA: X-Ops Takes On Burgeoning SQL Server Attacks
Maoloa Remcos TargetCompany
2020-09-02SangforSangfor Technologies
@online{technologies:20200902:alert:0ee313c, author = {Sangfor Technologies}, title = {{[Alert] New GlobeImposter of Olympian Gods 2.0 is coming}}, date = {2020-09-02}, organization = {Sangfor}, url = {https://www.sangfor.com/blog/cybersecurity/alert-new-globeimposter-olympian-gods-20-coming}, language = {English}, urldate = {2023-05-30} } [Alert] New GlobeImposter of Olympian Gods 2.0 is coming
Maoloa
2019-02-03ID RansomwareAndrew Ivanov
@online{ivanov:20190203:maoloa:52e7c7f, author = {Andrew Ivanov}, title = {{Maoloa Ransomware}}, date = {2019-02-03}, organization = {ID Ransomware}, url = {https://id-ransomware.blogspot.com/2019/02/maoloa-ransomware.html}, language = {English}, urldate = {2019-11-28} } Maoloa Ransomware
Maoloa
Yara Rules
[TLP:WHITE] win_maoloa_auto (20230715 | Detects win.maoloa.)
rule win_maoloa_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.maoloa."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.maoloa"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 83f802 7710 8bd6 8b85a0e3ffff 8b4820 e8???????? 8bce }
            // n = 7, score = 100
            //   83f802               | cmp                 eax, 2
            //   7710                 | ja                  0x12
            //   8bd6                 | mov                 edx, esi
            //   8b85a0e3ffff         | mov                 eax, dword ptr [ebp - 0x1c60]
            //   8b4820               | mov                 ecx, dword ptr [eax + 0x20]
            //   e8????????           |                     
            //   8bce                 | mov                 ecx, esi

        $sequence_1 = { 7707 8d45dc 3bd0 7351 8bc7 83e0c0 }
            // n = 6, score = 100
            //   7707                 | ja                  9
            //   8d45dc               | lea                 eax, [ebp - 0x24]
            //   3bd0                 | cmp                 edx, eax
            //   7351                 | jae                 0x53
            //   8bc7                 | mov                 eax, edi
            //   83e0c0               | and                 eax, 0xffffffc0

        $sequence_2 = { 68000000c0 51 ff15???????? 8945d8 83f8ff 7445 57 }
            // n = 7, score = 100
            //   68000000c0           | push                0xc0000000
            //   51                   | push                ecx
            //   ff15????????         |                     
            //   8945d8               | mov                 dword ptr [ebp - 0x28], eax
            //   83f8ff               | cmp                 eax, -1
            //   7445                 | je                  0x47
            //   57                   | push                edi

        $sequence_3 = { 85f6 0f8543010000 8b55f4 8d45e8 50 8d4ddc e8???????? }
            // n = 7, score = 100
            //   85f6                 | test                esi, esi
            //   0f8543010000         | jne                 0x149
            //   8b55f4               | mov                 edx, dword ptr [ebp - 0xc]
            //   8d45e8               | lea                 eax, [ebp - 0x18]
            //   50                   | push                eax
            //   8d4ddc               | lea                 ecx, [ebp - 0x24]
            //   e8????????           |                     

        $sequence_4 = { 6a30 8d842464010000 6a00 50 a1???????? ffd0 6a20 }
            // n = 7, score = 100
            //   6a30                 | push                0x30
            //   8d842464010000       | lea                 eax, [esp + 0x164]
            //   6a00                 | push                0
            //   50                   | push                eax
            //   a1????????           |                     
            //   ffd0                 | call                eax
            //   6a20                 | push                0x20

        $sequence_5 = { 83c40c c705????????d0704000 8d55dc c705????????80164300 b9???????? c705????????20000000 c705????????10270000 }
            // n = 7, score = 100
            //   83c40c               | add                 esp, 0xc
            //   c705????????d0704000     |     
            //   8d55dc               | lea                 edx, [ebp - 0x24]
            //   c705????????80164300     |     
            //   b9????????           |                     
            //   c705????????20000000     |     
            //   c705????????10270000     |     

        $sequence_6 = { 660fefc8 0f114c07f0 3b4dcc 72d7 8b7dbc 894dc8 8b45d8 }
            // n = 7, score = 100
            //   660fefc8             | pxor                xmm1, xmm0
            //   0f114c07f0           | movups              xmmword ptr [edi + eax - 0x10], xmm1
            //   3b4dcc               | cmp                 ecx, dword ptr [ebp - 0x34]
            //   72d7                 | jb                  0xffffffd9
            //   8b7dbc               | mov                 edi, dword ptr [ebp - 0x44]
            //   894dc8               | mov                 dword ptr [ebp - 0x38], ecx
            //   8b45d8               | mov                 eax, dword ptr [ebp - 0x28]

        $sequence_7 = { 46 83eb03 743b 660f1f440000 4b bf64000000 6a01 }
            // n = 7, score = 100
            //   46                   | inc                 esi
            //   83eb03               | sub                 ebx, 3
            //   743b                 | je                  0x3d
            //   660f1f440000         | nop                 word ptr [eax + eax]
            //   4b                   | dec                 ebx
            //   bf64000000           | mov                 edi, 0x64
            //   6a01                 | push                1

        $sequence_8 = { 03d7 0bc2 33c7 05c3595b65 0345c0 03f0 8bc7 }
            // n = 7, score = 100
            //   03d7                 | add                 edx, edi
            //   0bc2                 | or                  eax, edx
            //   33c7                 | xor                 eax, edi
            //   05c3595b65           | add                 eax, 0x655b59c3
            //   0345c0               | add                 eax, dword ptr [ebp - 0x40]
            //   03f0                 | add                 esi, eax
            //   8bc7                 | mov                 eax, edi

        $sequence_9 = { e8???????? 894508 85c0 752e 33ff 85db }
            // n = 6, score = 100
            //   e8????????           |                     
            //   894508               | mov                 dword ptr [ebp + 8], eax
            //   85c0                 | test                eax, eax
            //   752e                 | jne                 0x30
            //   33ff                 | xor                 edi, edi
            //   85db                 | test                ebx, ebx

    condition:
        7 of them and filesize < 586752
}
Download all Yara Rules