SYMBOLCOMMON_NAMEaka. SYNONYMS
win.mylobot (Back to overview)

MyloBot

aka: FakeDGA, WillExec

There is no description at this point.

References
2021-01-13AkamaiYael Daihes
@online{daihes:20210113:detecting:a348691, author = {Yael Daihes}, title = {{Detecting Mylobot, unseen DGA based malware, using Deep Learning}}, date = {2021-01-13}, organization = {Akamai}, url = {https://blogs.akamai.com/sitr/2021/01/detecting-mylobot-unseen-dga-based-malware-using-deep-learning.html}, language = {English}, urldate = {2021-01-26} } Detecting Mylobot, unseen DGA based malware, using Deep Learning
MyloBot
2018-11-15CenturylinkLabsBlack Lotus Labs
@online{labs:20181115:mylobot:4f8ccb3, author = {LabsBlack Lotus Labs}, title = {{Mylobot Continues Global Infections}}, date = {2018-11-15}, organization = {Centurylink}, url = {https://blog.centurylink.com/mylobot-continues-global-infections/}, language = {English}, urldate = {2019-12-24} } Mylobot Continues Global Infections
MyloBot
2018-06-20Deep instinctDalya Guttman
@online{guttman:20180620:meet:6ecec40, author = {Dalya Guttman}, title = {{Meet MyloBot – A New Highly Sophisticated Never-Seen-Before Botnet That’s Out In The Wild}}, date = {2018-06-20}, organization = {Deep instinct}, url = {https://www.deepinstinct.com/2018/06/20/meet-mylobot-a-new-highly-sophisticated-never-seen-before-botnet-thats-out-in-the-wild/}, language = {English}, urldate = {2021-11-19} } Meet MyloBot – A New Highly Sophisticated Never-Seen-Before Botnet That’s Out In The Wild
MyloBot
2017-11-08FreebufSecurity Leopard
@online{leopard:20171108:analysis:a6a1a01, author = {Security Leopard}, title = {{Analysis of an active USB flash drive virus}}, date = {2017-11-08}, organization = {Freebuf}, url = {http://www.freebuf.com/column/153424.html}, language = {Chinese}, urldate = {2020-01-13} } Analysis of an active USB flash drive virus
MyloBot
2017-10-27Cisco TalosCisco Talos
@online{talos:20171027:threat:ed694fa, author = {Cisco Talos}, title = {{Threat Round Up for Oct 20 - Oct 27}}, date = {2017-10-27}, organization = {Cisco Talos}, url = {http://blog.talosintelligence.com/2017/10/threat-round-up-1020-1017.html}, language = {English}, urldate = {2019-07-11} } Threat Round Up for Oct 20 - Oct 27
MyloBot
2017-05-27360netlabsuqitian
@online{suqitian:20170527:from:6c80cf6, author = {suqitian}, title = {{From PDNS: Another fix length of 7, a-z. tlds: [ru, com]}}, date = {2017-05-27}, organization = {360netlab}, url = {https://github.com/360netlab/DGA/issues/36}, language = {English}, urldate = {2019-10-23} } From PDNS: Another fix length of 7, a-z. tlds: [ru, com]
MyloBot
Yara Rules
[TLP:WHITE] win_mylobot_auto (20230125 | Detects win.mylobot.)
rule win_mylobot_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.mylobot."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.mylobot"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 50 8d85c8faffff 50 e8???????? 8d45d4 50 }
            // n = 6, score = 1000
            //   50                   | push                eax
            //   8d85c8faffff         | lea                 eax, [ebp - 0x538]
            //   50                   | push                eax
            //   e8????????           |                     
            //   8d45d4               | lea                 eax, [ebp - 0x2c]
            //   50                   | push                eax

        $sequence_1 = { 85d2 7413 57 8b7c2410 2bf8 8a0c37 880e }
            // n = 7, score = 1000
            //   85d2                 | test                edx, edx
            //   7413                 | je                  0x15
            //   57                   | push                edi
            //   8b7c2410             | mov                 edi, dword ptr [esp + 0x10]
            //   2bf8                 | sub                 edi, eax
            //   8a0c37               | mov                 cl, byte ptr [edi + esi]
            //   880e                 | mov                 byte ptr [esi], cl

        $sequence_2 = { 56 57 ffb424a4000000 bb01000080 53 e8???????? 59 }
            // n = 7, score = 1000
            //   56                   | push                esi
            //   57                   | push                edi
            //   ffb424a4000000       | push                dword ptr [esp + 0xa4]
            //   bb01000080           | mov                 ebx, 0x80000001
            //   53                   | push                ebx
            //   e8????????           |                     
            //   59                   | pop                 ecx

        $sequence_3 = { 75dd 39542418 7d04 c6062d 46 }
            // n = 5, score = 1000
            //   75dd                 | jne                 0xffffffdf
            //   39542418             | cmp                 dword ptr [esp + 0x18], edx
            //   7d04                 | jge                 6
            //   c6062d               | mov                 byte ptr [esi], 0x2d
            //   46                   | inc                 esi

        $sequence_4 = { 8bf0 41 894dfc 85f6 }
            // n = 4, score = 1000
            //   8bf0                 | mov                 esi, eax
            //   41                   | inc                 ecx
            //   894dfc               | mov                 dword ptr [ebp - 4], ecx
            //   85f6                 | test                esi, esi

        $sequence_5 = { 7413 68???????? 56 e8???????? 47 59 59 }
            // n = 7, score = 1000
            //   7413                 | je                  0x15
            //   68????????           |                     
            //   56                   | push                esi
            //   e8????????           |                     
            //   47                   | inc                 edi
            //   59                   | pop                 ecx
            //   59                   | pop                 ecx

        $sequence_6 = { 6a1a 56 ff903c010000 85c0 752f }
            // n = 5, score = 1000
            //   6a1a                 | push                0x1a
            //   56                   | push                esi
            //   ff903c010000         | call                dword ptr [eax + 0x13c]
            //   85c0                 | test                eax, eax
            //   752f                 | jne                 0x31

        $sequence_7 = { ff15???????? 68???????? 8d85e0fdffff 50 ff15???????? 8d45f8 50 }
            // n = 7, score = 1000
            //   ff15????????         |                     
            //   68????????           |                     
            //   8d85e0fdffff         | lea                 eax, [ebp - 0x220]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8d45f8               | lea                 eax, [ebp - 8]
            //   50                   | push                eax

        $sequence_8 = { 6a00 6a00 8d8de0feffff 51 8d95dcfdffff 52 }
            // n = 6, score = 800
            //   6a00                 | push                0
            //   6a00                 | push                0
            //   8d8de0feffff         | lea                 ecx, [ebp - 0x120]
            //   51                   | push                ecx
            //   8d95dcfdffff         | lea                 edx, [ebp - 0x224]
            //   52                   | push                edx

        $sequence_9 = { 8bc7 83c420 8d4801 8a10 40 84d2 }
            // n = 6, score = 800
            //   8bc7                 | mov                 eax, edi
            //   83c420               | add                 esp, 0x20
            //   8d4801               | lea                 ecx, [eax + 1]
            //   8a10                 | mov                 dl, byte ptr [eax]
            //   40                   | inc                 eax
            //   84d2                 | test                dl, dl

        $sequence_10 = { 03c2 3bf8 7502 893b }
            // n = 4, score = 800
            //   03c2                 | add                 eax, edx
            //   3bf8                 | cmp                 edi, eax
            //   7502                 | jne                 4
            //   893b                 | mov                 dword ptr [ebx], edi

        $sequence_11 = { 6a00 6805020000 8d85f8fdffff 50 51 ff15???????? 3d05020000 }
            // n = 7, score = 800
            //   6a00                 | push                0
            //   6805020000           | push                0x205
            //   8d85f8fdffff         | lea                 eax, [ebp - 0x208]
            //   50                   | push                eax
            //   51                   | push                ecx
            //   ff15????????         |                     
            //   3d05020000           | cmp                 eax, 0x205

        $sequence_12 = { 52 ff15???????? 8b75ec 3bf3 74d8 }
            // n = 5, score = 800
            //   52                   | push                edx
            //   ff15????????         |                     
            //   8b75ec               | mov                 esi, dword ptr [ebp - 0x14]
            //   3bf3                 | cmp                 esi, ebx
            //   74d8                 | je                  0xffffffda

        $sequence_13 = { 85c0 7436 8b3d???????? 68???????? 56 }
            // n = 5, score = 800
            //   85c0                 | test                eax, eax
            //   7436                 | je                  0x38
            //   8b3d????????         |                     
            //   68????????           |                     
            //   56                   | push                esi

        $sequence_14 = { ffd3 99 b90a000000 f7f9 }
            // n = 4, score = 800
            //   ffd3                 | call                ebx
            //   99                   | cdq                 
            //   b90a000000           | mov                 ecx, 0xa
            //   f7f9                 | idiv                ecx

        $sequence_15 = { e8???????? 8bf0 e8???????? 8b45f4 50 }
            // n = 5, score = 800
            //   e8????????           |                     
            //   8bf0                 | mov                 esi, eax
            //   e8????????           |                     
            //   8b45f4               | mov                 eax, dword ptr [ebp - 0xc]
            //   50                   | push                eax

    condition:
        7 of them and filesize < 8028160
}
Download all Yara Rules