SYMBOLCOMMON_NAMEaka. SYNONYMS
win.outlook_backdoor (Back to overview)

Outlook Backdoor

aka: FACADE

Actor(s): Turla Group


There is no description at this point.

References
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-03-04} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze Necurs Nokki Outlook Backdoor Phobos Ransomware Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot vidar Winnti ANTHROPOID SPIDER Anunak APT39 BlackTech BuhTrap Charming Kitten CLOCKWORD SPIDER DOPPEL SPIDER Gamaredon Group Judgment Panda Leviathan MONTY SPIDER Mustang Panda NARWHAL SPIDER NOCTURNAL SPIDER Pinchy Spider Pirate Panda Salty Spider SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER
2019-01-17Twitter (@VK_intel)Vitali Kremez
@online{kremez:20190117:turla:1eff5e6, author = {Vitali Kremez}, title = {{Tweet on Turla Outlook Backdoor}}, date = {2019-01-17}, organization = {Twitter (@VK_intel)}, url = {https://twitter.com/VK_Intel/status/1085820673811992576}, language = {English}, urldate = {2020-01-13} } Tweet on Turla Outlook Backdoor
Outlook Backdoor
2018-08-22ESET ResearchESET researchers
@techreport{researchers:20180822:turla:d444ef7, author = {ESET researchers}, title = {{Turla Outlook Backdoor}}, date = {2018-08-22}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2018/08/Eset-Turla-Outlook-Backdoor.pdf}, language = {English}, urldate = {2019-10-18} } Turla Outlook Backdoor
Outlook Backdoor
Yara Rules
[TLP:WHITE] win_outlook_backdoor_auto (20200529 | autogenerated rule brought to you by yara-signator)
rule win_outlook_backdoor_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-05-30"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.4.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.outlook_backdoor"
        malpedia_rule_date = "20200529"
        malpedia_hash = "92c362319514e5a6da26204961446caa3a8b32a8"
        malpedia_version = "20200529"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 837de400 7425 ff75ec ff75e8 ff75e4 53 ff7608 }
            // n = 7, score = 600
            //   837de400             | cmp                 dword ptr [ebp - 0x1c], 0
            //   7425                 | je                  0x27
            //   ff75ec               | push                dword ptr [ebp - 0x14]
            //   ff75e8               | push                dword ptr [ebp - 0x18]
            //   ff75e4               | push                dword ptr [ebp - 0x1c]
            //   53                   | push                ebx
            //   ff7608               | push                dword ptr [esi + 8]

        $sequence_1 = { e8???????? 8bf8 8d45bc e8???????? 6a00 6a01 8d4dd8 }
            // n = 7, score = 600
            //   e8????????           |                     
            //   8bf8                 | mov                 edi, eax
            //   8d45bc               | lea                 eax, [ebp - 0x44]
            //   e8????????           |                     
            //   6a00                 | push                0
            //   6a01                 | push                1
            //   8d4dd8               | lea                 ecx, [ebp - 0x28]

        $sequence_2 = { 8b7508 57 ff750c 8d5c2410 8bc6 e8???????? 8b7604 }
            // n = 7, score = 600
            //   8b7508               | mov                 esi, dword ptr [ebp + 8]
            //   57                   | push                edi
            //   ff750c               | push                dword ptr [ebp + 0xc]
            //   8d5c2410             | lea                 ebx, [esp + 0x10]
            //   8bc6                 | mov                 eax, esi
            //   e8????????           |                     
            //   8b7604               | mov                 esi, dword ptr [esi + 4]

        $sequence_3 = { 3b4d08 7c5c 3930 7514 8d43fe 80380d }
            // n = 6, score = 600
            //   3b4d08               | cmp                 ecx, dword ptr [ebp + 8]
            //   7c5c                 | jl                  0x5e
            //   3930                 | cmp                 dword ptr [eax], esi
            //   7514                 | jne                 0x16
            //   8d43fe               | lea                 eax, [ebx - 2]
            //   80380d               | cmp                 byte ptr [eax], 0xd

        $sequence_4 = { e8???????? 59 5f 5e 6a00 }
            // n = 5, score = 600
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   6a00                 | push                0

        $sequence_5 = { f6455404 740e 836554fb 57 56 8d4dbc e8???????? }
            // n = 7, score = 600
            //   f6455404             | test                byte ptr [ebp + 0x54], 4
            //   740e                 | je                  0x10
            //   836554fb             | and                 dword ptr [ebp + 0x54], 0xfffffffb
            //   57                   | push                edi
            //   56                   | push                esi
            //   8d4dbc               | lea                 ecx, [ebp - 0x44]
            //   e8????????           |                     

        $sequence_6 = { 89770c ff15???????? 8365f000 897dec 8d7b08 8b4704 8d4dec }
            // n = 7, score = 600
            //   89770c               | mov                 dword ptr [edi + 0xc], esi
            //   ff15????????         |                     
            //   8365f000             | and                 dword ptr [ebp - 0x10], 0
            //   897dec               | mov                 dword ptr [ebp - 0x14], edi
            //   8d7b08               | lea                 edi, [ebx + 8]
            //   8b4704               | mov                 eax, dword ptr [edi + 4]
            //   8d4dec               | lea                 ecx, [ebp - 0x14]

        $sequence_7 = { e8???????? 59 c20800 6a00 8bce c746180f000000 e8???????? }
            // n = 7, score = 600
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   c20800               | ret                 8
            //   6a00                 | push                0
            //   8bce                 | mov                 ecx, esi
            //   c746180f000000       | mov                 dword ptr [esi + 0x18], 0xf
            //   e8????????           |                     

        $sequence_8 = { ff7514 ff7510 51 e8???????? 8b4e08 }
            // n = 5, score = 600
            //   ff7514               | push                dword ptr [ebp + 0x14]
            //   ff7510               | push                dword ptr [ebp + 0x10]
            //   51                   | push                ecx
            //   e8????????           |                     
            //   8b4e08               | mov                 ecx, dword ptr [esi + 8]

        $sequence_9 = { 53 8d75bc e8???????? 8b4df4 8b450c 5e 5b }
            // n = 7, score = 600
            //   53                   | push                ebx
            //   8d75bc               | lea                 esi, [ebp - 0x44]
            //   e8????????           |                     
            //   8b4df4               | mov                 ecx, dword ptr [ebp - 0xc]
            //   8b450c               | mov                 eax, dword ptr [ebp + 0xc]
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx

    condition:
        7 of them and filesize < 2912256
}
Download all Yara Rules