SYMBOLCOMMON_NAMEaka. SYNONYMS
win.nosu (Back to overview)

Nosu

VTCollection    

According to PCrisk, Nosu is the name of a malicious program classified as a stealer. This malware is designed to steal information from infected machines. The Nosu stealer can extract a wide variety of data from devices and installed applications. The most active campaigns associated with Nosu were noted in North and South America, as well as Southeast Asia.

References
2022-12-06BitSightJoão Batista
Cova and Nosu: a new loader spreads a new stealer
Cova Nosu
Yara Rules
[TLP:WHITE] win_nosu_auto (20241030 | Detects win.nosu.)
rule win_nosu_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2024-10-31"
        version = "1"
        description = "Detects win.nosu."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.nosu"
        malpedia_rule_date = "20241030"
        malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4"
        malpedia_version = "20241030"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 56 c605????????01 ff15???????? ff35???????? ff15???????? }
            // n = 5, score = 200
            //   56                   | push                esi
            //   c605????????01       |                     
            //   ff15????????         |                     
            //   ff35????????         |                     
            //   ff15????????         |                     

        $sequence_1 = { eb1e 8d4714 50 8d5710 8d4c2418 e8???????? 8bf0 }
            // n = 7, score = 200
            //   eb1e                 | jmp                 0x20
            //   8d4714               | lea                 eax, [edi + 0x14]
            //   50                   | push                eax
            //   8d5710               | lea                 edx, [edi + 0x10]
            //   8d4c2418             | lea                 ecx, [esp + 0x18]
            //   e8????????           |                     
            //   8bf0                 | mov                 esi, eax

        $sequence_2 = { 8d87d8000000 50 e8???????? 8b542420 8d87480d0000 83c40c 8bcf }
            // n = 7, score = 200
            //   8d87d8000000         | lea                 eax, [edi + 0xd8]
            //   50                   | push                eax
            //   e8????????           |                     
            //   8b542420             | mov                 edx, dword ptr [esp + 0x20]
            //   8d87480d0000         | lea                 eax, [edi + 0xd48]
            //   83c40c               | add                 esp, 0xc
            //   8bcf                 | mov                 ecx, edi

        $sequence_3 = { 55 50 57 55 6a00 6a00 8d8680000000 }
            // n = 7, score = 200
            //   55                   | push                ebp
            //   50                   | push                eax
            //   57                   | push                edi
            //   55                   | push                ebp
            //   6a00                 | push                0
            //   6a00                 | push                0
            //   8d8680000000         | lea                 eax, [esi + 0x80]

        $sequence_4 = { 8bc8 8954243c e8???????? 83c120 83ef01 75f3 8d86f8030000 }
            // n = 7, score = 200
            //   8bc8                 | mov                 ecx, eax
            //   8954243c             | mov                 dword ptr [esp + 0x3c], edx
            //   e8????????           |                     
            //   83c120               | add                 ecx, 0x20
            //   83ef01               | sub                 edi, 1
            //   75f3                 | jne                 0xfffffff5
            //   8d86f8030000         | lea                 eax, [esi + 0x3f8]

        $sequence_5 = { 663902 74f8 52 51 8d85f8fbffff 50 ff15???????? }
            // n = 7, score = 200
            //   663902               | cmp                 word ptr [edx], ax
            //   74f8                 | je                  0xfffffffa
            //   52                   | push                edx
            //   51                   | push                ecx
            //   8d85f8fbffff         | lea                 eax, [ebp - 0x408]
            //   50                   | push                eax
            //   ff15????????         |                     

        $sequence_6 = { 744c 6800020000 ff74242c 8d442438 50 ff15???????? 8d442430 }
            // n = 7, score = 200
            //   744c                 | je                  0x4e
            //   6800020000           | push                0x200
            //   ff74242c             | push                dword ptr [esp + 0x2c]
            //   8d442438             | lea                 eax, [esp + 0x38]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8d442430             | lea                 eax, [esp + 0x30]

        $sequence_7 = { c20400 53 8bda 8bd1 56 57 8b3a }
            // n = 7, score = 200
            //   c20400               | ret                 4
            //   53                   | push                ebx
            //   8bda                 | mov                 ebx, edx
            //   8bd1                 | mov                 edx, ecx
            //   56                   | push                esi
            //   57                   | push                edi
            //   8b3a                 | mov                 edi, dword ptr [edx]

        $sequence_8 = { 8d5508 6a02 894508 e8???????? 85c0 59 0f95c0 }
            // n = 7, score = 200
            //   8d5508               | lea                 edx, [ebp + 8]
            //   6a02                 | push                2
            //   894508               | mov                 dword ptr [ebp + 8], eax
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   59                   | pop                 ecx
            //   0f95c0               | setne               al

        $sequence_9 = { 50 56 ff15???????? 8bd0 8bce e8???????? 59 }
            // n = 7, score = 200
            //   50                   | push                eax
            //   56                   | push                esi
            //   ff15????????         |                     
            //   8bd0                 | mov                 edx, eax
            //   8bce                 | mov                 ecx, esi
            //   e8????????           |                     
            //   59                   | pop                 ecx

    condition:
        7 of them and filesize < 513024
}
[TLP:WHITE] win_nosu_w0   (20230118 | Detect_Nosu_stealer)
rule win_nosu_w0 {
    meta:
	    description = "Detect_Nosu_stealer"
	    author = "@malgamy12"
	    date = "2023/1/9"
        license = "DRL 1.1"
        hash = "6499cadaea169c7dfe75b55f9c949659af49649a10c8b593a8db378692a11962"
        hash = "e227246cbebf72eb2867ef21b1b103ec07ddd87f4f8a5ac89a47536d5b831f6d"
        hash = "3d18b9c312abaa8dd93dc0d1abfdc97e72788100fb1effb938b5f6f4fd3b59eb"
        hash = "e513f5e424371cce491ae28d45aaa7e361f370c790dc86bb33dc9313b3660ac3"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.nosu"
        malpedia_rule_date = "20230118"
        malpedia_hash = ""
        malpedia_version = "20230118"
        malpedia_license = "DRL 1.1"
        malpedia_sharing = "TLP:WHITE"
                
    strings:
	    $s1 = "release\\lilly.pdb" ascii

		
        $op1 = {33 D2 8B C3 F7 F7 8A C3 24 ?? 32 04 32 30 04 19 43 8B 4C 24 ?? 3B DD 72}
        $op2 = {8B 86 [4] 80 34 08 ?? 41 8B 86 [4] 3B C8 72}
	$op3 = {69 D2 [4] 33 C9 42 8B C2 0F A4 C1 ?? 30 0C 1E 46}
        
    condition:
        uint16(0) == 0x5A4D and ($s1 or all of ($op*))
}
Download all Yara Rules