SYMBOLCOMMON_NAMEaka. SYNONYMS
win.paladin (Back to overview)

paladin

Actor(s): Pitty Panda


Paladin RAT is a variant of Gh0st RAT used by PittyPanda active since at least 2011.

References
2014-07-31FireEyeNart Villeneuve, Joshua Homan
@online{villeneuve:20140731:spy:5aeca9b, author = {Nart Villeneuve and Joshua Homan}, title = {{Spy of the Tiger}}, date = {2014-07-31}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2014/07/spy-of-the-tiger.html}, language = {English}, urldate = {2019-12-20} } Spy of the Tiger
paladin Pitty Panda
2014Airbus Defence & SpaceIvan Fontarensky, Fabien Perigaud, Ronan Mouchoux, Cedric Pernet, David Bizeul
@techreport{fontarensky:2014:eye:a4c3c1b, author = {Ivan Fontarensky and Fabien Perigaud and Ronan Mouchoux and Cedric Pernet and David Bizeul}, title = {{The Eye of the Tiger}}, date = {2014}, institution = {Airbus Defence & Space}, url = {https://bitbucket.org/cybertools/whitepapers/downloads/Pitty%20Tiger%20Final%20Report.pdf}, language = {English}, urldate = {2020-01-08} } The Eye of the Tiger
paladin PittyTiger RAT
Yara Rules
[TLP:WHITE] win_paladin_auto (20220411 | Detects win.paladin.)
rule win_paladin_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-04-08"
        version = "1"
        description = "Detects win.paladin."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.paladin"
        malpedia_rule_date = "20220405"
        malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a"
        malpedia_version = "20220411"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 6a04 eb57 05fdfdffff 83f803 774f }
            // n = 5, score = 200
            //   6a04                 | push                4
            //   eb57                 | jmp                 0x59
            //   05fdfdffff           | add                 eax, 0xfffffdfd
            //   83f803               | cmp                 eax, 3
            //   774f                 | ja                  0x51

        $sequence_1 = { 774f ff248528490010 6a00 6a00 }
            // n = 4, score = 200
            //   774f                 | ja                  0x51
            //   ff248528490010       | jmp                 dword ptr [eax*4 + 0x10004928]
            //   6a00                 | push                0
            //   6a00                 | push                0

        $sequence_2 = { c744241c00000000 ff15???????? 8bf0 8d4c2414 6a00 51 c60630 }
            // n = 7, score = 200
            //   c744241c00000000     | mov                 dword ptr [esp + 0x1c], 0
            //   ff15????????         |                     
            //   8bf0                 | mov                 esi, eax
            //   8d4c2414             | lea                 ecx, dword ptr [esp + 0x14]
            //   6a00                 | push                0
            //   51                   | push                ecx
            //   c60630               | mov                 byte ptr [esi], 0x30

        $sequence_3 = { 85c0 7537 85f6 75b1 eb5e }
            // n = 5, score = 200
            //   85c0                 | test                eax, eax
            //   7537                 | jne                 0x39
            //   85f6                 | test                esi, esi
            //   75b1                 | jne                 0xffffffb3
            //   eb5e                 | jmp                 0x60

        $sequence_4 = { e8???????? 8b4c2444 83c438 894614 64890d00000000 5f }
            // n = 6, score = 200
            //   e8????????           |                     
            //   8b4c2444             | mov                 ecx, dword ptr [esp + 0x44]
            //   83c438               | add                 esp, 0x38
            //   894614               | mov                 dword ptr [esi + 0x14], eax
            //   64890d00000000       | mov                 dword ptr fs:[0], ecx
            //   5f                   | pop                 edi

        $sequence_5 = { 8b86ac000000 50 ff15???????? c686b500000000 a1???????? 85c0 7417 }
            // n = 7, score = 200
            //   8b86ac000000         | mov                 eax, dword ptr [esi + 0xac]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   c686b500000000       | mov                 byte ptr [esi + 0xb5], 0
            //   a1????????           |                     
            //   85c0                 | test                eax, eax
            //   7417                 | je                  0x19

        $sequence_6 = { 53 6a20 6a01 53 53 8d942458010000 51 }
            // n = 7, score = 200
            //   53                   | push                ebx
            //   6a20                 | push                0x20
            //   6a01                 | push                1
            //   53                   | push                ebx
            //   53                   | push                ebx
            //   8d942458010000       | lea                 edx, dword ptr [esp + 0x158]
            //   51                   | push                ecx

        $sequence_7 = { ff15???????? 5f 5d 85c0 5e 5b 0f95c0 }
            // n = 7, score = 200
            //   ff15????????         |                     
            //   5f                   | pop                 edi
            //   5d                   | pop                 ebp
            //   85c0                 | test                eax, eax
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx
            //   0f95c0               | setne               al

        $sequence_8 = { 8b2d???????? 57 8b3d???????? 807c24402e 7448 8a442414 8d4c2440 }
            // n = 7, score = 200
            //   8b2d????????         |                     
            //   57                   | push                edi
            //   8b3d????????         |                     
            //   807c24402e           | cmp                 byte ptr [esp + 0x40], 0x2e
            //   7448                 | je                  0x4a
            //   8a442414             | mov                 al, byte ptr [esp + 0x14]
            //   8d4c2440             | lea                 ecx, dword ptr [esp + 0x40]

        $sequence_9 = { f3a4 ff15???????? 50 ff15???????? 8d4c2414 8d542430 51 }
            // n = 7, score = 200
            //   f3a4                 | rep movsb           byte ptr es:[edi], byte ptr [esi]
            //   ff15????????         |                     
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8d4c2414             | lea                 ecx, dword ptr [esp + 0x14]
            //   8d542430             | lea                 edx, dword ptr [esp + 0x30]
            //   51                   | push                ecx

    condition:
        7 of them and filesize < 106496
}
Download all Yara Rules