SYMBOLCOMMON_NAMEaka. SYNONYMS
win.marap (Back to overview)

Marap


Marap is a downloader, named after its command and control (C&C) phone home parameter "param" spelled backwards. It is written in C and contains a few notable anti-analysis features.

References
2020-08-20CERT-FRCERT-FR
@techreport{certfr:20200820:development:d518522, author = {CERT-FR}, title = {{Development of the Activity of the TA505 Cybercriminal Group}}, date = {2020-08-20}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-009.pdf}, language = {English}, urldate = {2020-08-28} } Development of the Activity of the TA505 Cybercriminal Group
AndroMut Bart Clop Dridex FlawedAmmyy FlawedGrace Get2 Locky Marap QuantLoader SDBbot ServHelper tRat TrickBot
2020-06-22CERT-FRCERT-FR
@techreport{certfr:20200622:volution:fba1cfa, author = {CERT-FR}, title = {{Évolution De Lactivité du Groupe Cybercriminel TA505}}, date = {2020-06-22}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-006.pdf}, language = {French}, urldate = {2020-06-24} } Évolution De Lactivité du Groupe Cybercriminel TA505
Amadey AndroMut Bart Clop Dridex FlawedGrace Gandcrab Get2 GlobeImposter Jaff Locky Marap Philadephia Ransom QuantLoader Scarab Ransomware SDBbot ServHelper Silence tRat TrickBot
2018-08-16ProofpointProofpoint Staff
@online{staff:20180816:new:b372eeb, author = {Proofpoint Staff}, title = {{New modular downloaders fingerprint systems, prepare for more - Part 1: Marap}}, date = {2018-08-16}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/new-modular-downloaders-fingerprint-systems-prepare-more-part-1-marap}, language = {English}, urldate = {2019-12-20} } New modular downloaders fingerprint systems, prepare for more - Part 1: Marap
Marap
Yara Rules
[TLP:WHITE] win_marap_auto (20210616 | Detects win.marap.)
rule win_marap_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2021-06-10"
        version = "1"
        description = "Detects win.marap."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.marap"
        malpedia_rule_date = "20210604"
        malpedia_hash = "be09d5d71e77373c0f538068be31a2ad4c69cfbd"
        malpedia_version = "20210616"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 83c40c 66833f00 7511 b920000000 }
            // n = 4, score = 100
            //   83c40c               | add                 esp, 0xc
            //   66833f00             | cmp                 word ptr [edi], 0
            //   7511                 | jne                 0x13
            //   b920000000           | mov                 ecx, 0x20

        $sequence_1 = { ff15???????? 8b859cfdffff 8d8da4fdffff 51 57 6a20 68???????? }
            // n = 7, score = 100
            //   ff15????????         |                     
            //   8b859cfdffff         | mov                 eax, dword ptr [ebp - 0x264]
            //   8d8da4fdffff         | lea                 ecx, dword ptr [ebp - 0x25c]
            //   51                   | push                ecx
            //   57                   | push                edi
            //   6a20                 | push                0x20
            //   68????????           |                     

        $sequence_2 = { 0f85c0010000 6828020000 8d8dc0fdffff 6a00 51 c785bcfdffff2c020000 }
            // n = 6, score = 100
            //   0f85c0010000         | jne                 0x1c6
            //   6828020000           | push                0x228
            //   8d8dc0fdffff         | lea                 ecx, dword ptr [ebp - 0x240]
            //   6a00                 | push                0
            //   51                   | push                ecx
            //   c785bcfdffff2c020000     | mov    dword ptr [ebp - 0x244], 0x22c

        $sequence_3 = { 7408 8b11 8b4208 51 ffd0 ff15???????? }
            // n = 6, score = 100
            //   7408                 | je                  0xa
            //   8b11                 | mov                 edx, dword ptr [ecx]
            //   8b4208               | mov                 eax, dword ptr [edx + 8]
            //   51                   | push                ecx
            //   ffd0                 | call                eax
            //   ff15????????         |                     

        $sequence_4 = { 8bec 8b450c 48 750c 8b4510 }
            // n = 5, score = 100
            //   8bec                 | mov                 ebp, esp
            //   8b450c               | mov                 eax, dword ptr [ebp + 0xc]
            //   48                   | dec                 eax
            //   750c                 | jne                 0xe
            //   8b4510               | mov                 eax, dword ptr [ebp + 0x10]

        $sequence_5 = { ff15???????? 85c0 0f85a6feffff 56 }
            // n = 4, score = 100
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   0f85a6feffff         | jne                 0xfffffeac
            //   56                   | push                esi

        $sequence_6 = { 33c9 668907 66898ef40c0000 8b8c24a4020000 5f 5e }
            // n = 6, score = 100
            //   33c9                 | xor                 ecx, ecx
            //   668907               | mov                 word ptr [edi], ax
            //   66898ef40c0000       | mov                 word ptr [esi + 0xcf4], cx
            //   8b8c24a4020000       | mov                 ecx, dword ptr [esp + 0x2a4]
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi

        $sequence_7 = { 57 8bf1 6800080000 8d9e2a040000 6a00 53 e8???????? }
            // n = 7, score = 100
            //   57                   | push                edi
            //   8bf1                 | mov                 esi, ecx
            //   6800080000           | push                0x800
            //   8d9e2a040000         | lea                 ebx, dword ptr [esi + 0x42a]
            //   6a00                 | push                0
            //   53                   | push                ebx
            //   e8????????           |                     

        $sequence_8 = { 2558020000 052c010000 8986e41d0000 68???????? }
            // n = 4, score = 100
            //   2558020000           | and                 eax, 0x258
            //   052c010000           | add                 eax, 0x12c
            //   8986e41d0000         | mov                 dword ptr [esi + 0x1de4], eax
            //   68????????           |                     

        $sequence_9 = { 8917 8bbdb4fdffff 899db0fdffff 81c710020000 89bdb4fdffff 81ff???????? 0f8ccdfeffff }
            // n = 7, score = 100
            //   8917                 | mov                 dword ptr [edi], edx
            //   8bbdb4fdffff         | mov                 edi, dword ptr [ebp - 0x24c]
            //   899db0fdffff         | mov                 dword ptr [ebp - 0x250], ebx
            //   81c710020000         | add                 edi, 0x210
            //   89bdb4fdffff         | mov                 dword ptr [ebp - 0x24c], edi
            //   81ff????????         |                     
            //   0f8ccdfeffff         | jl                  0xfffffed3

    condition:
        7 of them and filesize < 188416
}
Download all Yara Rules