There is no description at this point.
There are currently no references.
rule win_miancha_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2024-10-31" version = "1" description = "Detects win.miancha." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.miancha" malpedia_rule_date = "20241030" malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4" malpedia_version = "20241030" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 8910 8b15???????? 894804 8b0d???????? 895008 8a15???????? 89480c } // n = 7, score = 200 // 8910 | mov dword ptr [eax], edx // 8b15???????? | // 894804 | mov dword ptr [eax + 4], ecx // 8b0d???????? | // 895008 | mov dword ptr [eax + 8], edx // 8a15???????? | // 89480c | mov dword ptr [eax + 0xc], ecx $sequence_1 = { 6a02 6a00 68???????? 52 ffd6 } // n = 5, score = 200 // 6a02 | push 2 // 6a00 | push 0 // 68???????? | // 52 | push edx // ffd6 | call esi $sequence_2 = { 52 ff15???????? 50 ffd6 85c0 741a 837c241800 } // n = 7, score = 200 // 52 | push edx // ff15???????? | // 50 | push eax // ffd6 | call esi // 85c0 | test eax, eax // 741a | je 0x1c // 837c241800 | cmp dword ptr [esp + 0x18], 0 $sequence_3 = { 50 8d4e01 51 68???????? e8???????? } // n = 5, score = 200 // 50 | push eax // 8d4e01 | lea ecx, [esi + 1] // 51 | push ecx // 68???????? | // e8???????? | $sequence_4 = { 56 8b35???????? 6a02 6a00 68???????? } // n = 5, score = 200 // 56 | push esi // 8b35???????? | // 6a02 | push 2 // 6a00 | push 0 // 68???????? | $sequence_5 = { 68???????? 68???????? c744242000000000 ff15???????? 50 ff15???????? 8bf0 } // n = 7, score = 200 // 68???????? | // 68???????? | // c744242000000000 | mov dword ptr [esp + 0x20], 0 // ff15???????? | // 50 | push eax // ff15???????? | // 8bf0 | mov esi, eax $sequence_6 = { 6a01 6a00 68???????? 51 ffd6 85c0 } // n = 6, score = 200 // 6a01 | push 1 // 6a00 | push 0 // 68???????? | // 51 | push ecx // ffd6 | call esi // 85c0 | test eax, eax $sequence_7 = { 68???????? 68???????? c744242000000000 ff15???????? 50 ff15???????? } // n = 6, score = 200 // 68???????? | // 68???????? | // c744242000000000 | mov dword ptr [esp + 0x20], 0 // ff15???????? | // 50 | push eax // ff15???????? | $sequence_8 = { 85f6 7412 8d542418 52 } // n = 4, score = 200 // 85f6 | test esi, esi // 7412 | je 0x14 // 8d542418 | lea edx, [esp + 0x18] // 52 | push edx $sequence_9 = { 7412 8d542418 52 ff15???????? 50 ffd6 } // n = 6, score = 200 // 7412 | je 0x14 // 8d542418 | lea edx, [esp + 0x18] // 52 | push edx // ff15???????? | // 50 | push eax // ffd6 | call esi condition: 7 of them and filesize < 376832 }
/* This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license. */ import "pe" rule win_miancha_w0 { meta: author = "Context Threat Intelligence" date = "2014/01/27" description = "Bytes inside" reference = "http://www.contextis.com/documents/30/TA10009_20140127_-_CTI_Threat_Advisory_-_The_Monju_Incident1.pdf" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.miancha" malpedia_version = "20170521" malpedia_sharing = "TLP:WHITE" malpedia_license = "" strings: $0x = { 57 5b 5a 5a 51 57 40 34 31 67 2e 31 70 34 5c 40 40 44 3b 25 3a 19 1e 5c 7b 67 60 2e 34 31 67 2e 31 70 19 1e 55 77 77 71 64 60 2e 34 3e 3b 3e 19 1e 57 7b 7a 60 71 7a 60 39 40 6d 64 71 2e 34 60 71 6c 60 3b 7c 60 79 78 19 1e 44 66 7b 6c 6d 39 57 7b 7a 7a 71 77 60 7d 7b 7a 2e 34 5f 71 71 64 39 55 78 7d 62 71 19 1e 57 7b 7a 60 71 7a 60 39 78 71 7a 73 60 7c 2e 34 24 19 1e 19 1e } $1 = { 5c e7 99 bd e5 8a a0 e9 bb 91 5c } $1x = { 48 f3 8d a9 f1 9e b4 fd af 85 48 } $2 = "DllCanLoadNow" $2x = { 50 78 78 57 75 7a 58 7b 75 70 5a 7b 63 } $3x = { 5a 61 79 76 71 66 34 7b 72 34 67 61 76 7f 71 6d 67 2e 34 31 70 } $4 = "JXNcc2hlbGxcb3Blblxjb21tYW5k" $4x = { 5e 4c 5a 77 77 26 7c 78 76 53 6c 77 76 27 56 78 76 78 6c 7e 76 26 25 60 4d 43 21 7f } $6 = "C:\\Users\\why\\" $6x = { 57 2e 48 41 67 71 66 67 48 63 7c 6d 48 } $7 = "g:\\ykcx\\" $7x = { 73 2E 48 6D 7F 77 6C 48 } $8 = "(miansha)" $8x = { 3C 79 7D 75 7A 67 7C 75 3D } $9 = "server(\xE5\xA3\xB3)" $9x = { 7C 2E 48 26 24 25 27 3A 25 25 3A 26 21 48 67 71 66 62 71 66 3C F1 B7 A7 3D 48 46 71 78 71 75 67 71 48 67 71 66 62 71 66 3A 64 70 76 } $cfgDecode = { 8a ?? ?? 80 c2 7a 80 f2 19 88 ?? ?? 41 3b ce 7c ??} condition: any of them }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below. Changes regarding references should be proposed on the Malpedia library page.
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY