SYMBOLCOMMON_NAMEaka. SYNONYMS
win.milum (Back to overview)

Milum


In August 2019, Kaspersky Labs discovered a malware they dubbed Milum (naming based on internal file name fragments) when investigating an operation they named WildPressure. It is written in C++ using STL, primarily to parse JSON. Functionality includes bidirectional file transmission and remote command execution.

References
2021-07-07KasperskyDenis Legezo
@online{legezo:20210707:wildpressure:0bdf5ef, author = {Denis Legezo}, title = {{WildPressure targets the macOS platform}}, date = {2021-07-07}, organization = {Kaspersky}, url = {https://securelist.com/wildpressure-targets-macos/103072/}, language = {English}, urldate = {2021-07-09} } WildPressure targets the macOS platform
Guard Milum
2020-09-24Kaspersky LabsKaspersky Lab ICS CERT
@techreport{cert:20200924:threat:2d7986d, author = {Kaspersky Lab ICS CERT}, title = {{Threat landscape for industrial automation systems - H1 2020}}, date = {2020-09-24}, institution = {Kaspersky Labs}, url = {https://ics-cert.kaspersky.com/media/KASPERSKY_H1_2020_ICS_REPORT_EN.pdf}, language = {English}, urldate = {2020-10-04} } Threat landscape for industrial automation systems - H1 2020
Poet RAT Mailto Milum RagnarLocker REvil Ryuk Snake
2020-03-24Kaspersky LabsDenis Legezo
@online{legezo:20200324:wildpressure:add6905, author = {Denis Legezo}, title = {{WildPressure targets industrial-related entities in the Middle East}}, date = {2020-03-24}, organization = {Kaspersky Labs}, url = {https://securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/}, language = {English}, urldate = {2020-03-26} } WildPressure targets industrial-related entities in the Middle East
Milum
Yara Rules
[TLP:WHITE] win_milum_auto (20230125 | Detects win.milum.)
rule win_milum_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.milum."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.milum"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 50 8d45f4 64a300000000 33db 895dfc 8d85ecfeffff 6804010000 }
            // n = 7, score = 400
            //   50                   | push                eax
            //   8d45f4               | lea                 eax, [ebp - 0xc]
            //   64a300000000         | mov                 dword ptr fs:[0], eax
            //   33db                 | xor                 ebx, ebx
            //   895dfc               | mov                 dword ptr [ebp - 4], ebx
            //   8d85ecfeffff         | lea                 eax, [ebp - 0x114]
            //   6804010000           | push                0x104

        $sequence_1 = { 80781500 74f6 894df0 eb20 8b4704 80781500 7514 }
            // n = 7, score = 400
            //   80781500             | cmp                 byte ptr [eax + 0x15], 0
            //   74f6                 | je                  0xfffffff8
            //   894df0               | mov                 dword ptr [ebp - 0x10], ecx
            //   eb20                 | jmp                 0x22
            //   8b4704               | mov                 eax, dword ptr [edi + 4]
            //   80781500             | cmp                 byte ptr [eax + 0x15], 0
            //   7514                 | jne                 0x16

        $sequence_2 = { 8b7508 8975cc 895dd0 b801000000 8945fc c746140f000000 895e10 }
            // n = 7, score = 400
            //   8b7508               | mov                 esi, dword ptr [ebp + 8]
            //   8975cc               | mov                 dword ptr [ebp - 0x34], esi
            //   895dd0               | mov                 dword ptr [ebp - 0x30], ebx
            //   b801000000           | mov                 eax, 1
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   c746140f000000       | mov                 dword ptr [esi + 0x14], 0xf
            //   895e10               | mov                 dword ptr [esi + 0x10], ebx

        $sequence_3 = { 83c404 8945ec c745fc00000000 85c0 740d 50 8b4508 }
            // n = 7, score = 400
            //   83c404               | add                 esp, 4
            //   8945ec               | mov                 dword ptr [ebp - 0x14], eax
            //   c745fc00000000       | mov                 dword ptr [ebp - 4], 0
            //   85c0                 | test                eax, eax
            //   740d                 | je                  0xf
            //   50                   | push                eax
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]

        $sequence_4 = { 0f84bc000000 8d9560ffffff 52 33c9 e8???????? c645fc07 83bdb400000010 }
            // n = 7, score = 400
            //   0f84bc000000         | je                  0xc2
            //   8d9560ffffff         | lea                 edx, [ebp - 0xa0]
            //   52                   | push                edx
            //   33c9                 | xor                 ecx, ecx
            //   e8????????           |                     
            //   c645fc07             | mov                 byte ptr [ebp - 4], 7
            //   83bdb400000010       | cmp                 dword ptr [ebp + 0xb4], 0x10

        $sequence_5 = { 8b48f8 8b5104 83c9ff c74402f8???????? 894dfc 8b50e8 8b5204 }
            // n = 7, score = 400
            //   8b48f8               | mov                 ecx, dword ptr [eax - 8]
            //   8b5104               | mov                 edx, dword ptr [ecx + 4]
            //   83c9ff               | or                  ecx, 0xffffffff
            //   c74402f8????????     |                     
            //   894dfc               | mov                 dword ptr [ebp - 4], ecx
            //   8b50e8               | mov                 edx, dword ptr [eax - 0x18]
            //   8b5204               | mov                 edx, dword ptr [edx + 4]

        $sequence_6 = { 8b9554feffff 8975c8 895dc4 885db4 385a45 754f }
            // n = 6, score = 400
            //   8b9554feffff         | mov                 edx, dword ptr [ebp - 0x1ac]
            //   8975c8               | mov                 dword ptr [ebp - 0x38], esi
            //   895dc4               | mov                 dword ptr [ebp - 0x3c], ebx
            //   885db4               | mov                 byte ptr [ebp - 0x4c], bl
            //   385a45               | cmp                 byte ptr [edx + 0x45], bl
            //   754f                 | jne                 0x51

        $sequence_7 = { 0f841cfeffff 8b55f8 8b07 2b5004 }
            // n = 4, score = 400
            //   0f841cfeffff         | je                  0xfffffe22
            //   8b55f8               | mov                 edx, dword ptr [ebp - 8]
            //   8b07                 | mov                 eax, dword ptr [edi]
            //   2b5004               | sub                 edx, dword ptr [eax + 4]

        $sequence_8 = { c645fc02 83c204 8955d0 8b4304 3bf8 736d 8b13 }
            // n = 7, score = 400
            //   c645fc02             | mov                 byte ptr [ebp - 4], 2
            //   83c204               | add                 edx, 4
            //   8955d0               | mov                 dword ptr [ebp - 0x30], edx
            //   8b4304               | mov                 eax, dword ptr [ebx + 4]
            //   3bf8                 | cmp                 edi, eax
            //   736d                 | jae                 0x6f
            //   8b13                 | mov                 edx, dword ptr [ebx]

        $sequence_9 = { 8987b0160000 03772c 8975f8 8b17 8b4204 3bf0 }
            // n = 6, score = 400
            //   8987b0160000         | mov                 dword ptr [edi + 0x16b0], eax
            //   03772c               | add                 esi, dword ptr [edi + 0x2c]
            //   8975f8               | mov                 dword ptr [ebp - 8], esi
            //   8b17                 | mov                 edx, dword ptr [edi]
            //   8b4204               | mov                 eax, dword ptr [edx + 4]
            //   3bf0                 | cmp                 esi, eax

    condition:
        7 of them and filesize < 1076224
}
Download all Yara Rules