There is no description at this point.
rule win_pebbledash_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-03-28" version = "1" description = "Detects win.pebbledash." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.pebbledash" malpedia_rule_date = "20230328" malpedia_hash = "9d2d75cef573c1c2d861f5197df8f563b05a305d" malpedia_version = "20230407" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { f7d8 88856cfeffff 8b4df8 83e120 f7d9 1bc9 f7d9 } // n = 7, score = 100 // f7d8 | neg eax // 88856cfeffff | mov byte ptr [ebp - 0x194], al // 8b4df8 | mov ecx, dword ptr [ebp - 8] // 83e120 | and ecx, 0x20 // f7d9 | neg ecx // 1bc9 | sbb ecx, ecx // f7d9 | neg ecx $sequence_1 = { c3 55 8bec 83ec14 c745f000000000 c745f400000000 8d4508 } // n = 7, score = 100 // c3 | ret // 55 | push ebp // 8bec | mov ebp, esp // 83ec14 | sub esp, 0x14 // c745f000000000 | mov dword ptr [ebp - 0x10], 0 // c745f400000000 | mov dword ptr [ebp - 0xc], 0 // 8d4508 | lea eax, [ebp + 8] $sequence_2 = { c645f9ac c645fae3 c645fb25 c645e400 33c9 894de5 682c010000 } // n = 7, score = 100 // c645f9ac | mov byte ptr [ebp - 7], 0xac // c645fae3 | mov byte ptr [ebp - 6], 0xe3 // c645fb25 | mov byte ptr [ebp - 5], 0x25 // c645e400 | mov byte ptr [ebp - 0x1c], 0 // 33c9 | xor ecx, ecx // 894de5 | mov dword ptr [ebp - 0x1b], ecx // 682c010000 | push 0x12c $sequence_3 = { e8???????? 83c408 85c0 7407 c745f4ffffffff 8d45d4 50 } // n = 7, score = 100 // e8???????? | // 83c408 | add esp, 8 // 85c0 | test eax, eax // 7407 | je 9 // c745f4ffffffff | mov dword ptr [ebp - 0xc], 0xffffffff // 8d45d4 | lea eax, [ebp - 0x2c] // 50 | push eax $sequence_4 = { 52 e8???????? 83c404 8b8518feffff c74004ffffffff 8b8d18feffff 8b5508 } // n = 7, score = 100 // 52 | push edx // e8???????? | // 83c404 | add esp, 4 // 8b8518feffff | mov eax, dword ptr [ebp - 0x1e8] // c74004ffffffff | mov dword ptr [eax + 4], 0xffffffff // 8b8d18feffff | mov ecx, dword ptr [ebp - 0x1e8] // 8b5508 | mov edx, dword ptr [ebp + 8] $sequence_5 = { 8b95ccfeffff 8b4204 8945fc 8d8dd0feffff 51 8b550c 52 } // n = 7, score = 100 // 8b95ccfeffff | mov edx, dword ptr [ebp - 0x134] // 8b4204 | mov eax, dword ptr [edx + 4] // 8945fc | mov dword ptr [ebp - 4], eax // 8d8dd0feffff | lea ecx, [ebp - 0x130] // 51 | push ecx // 8b550c | mov edx, dword ptr [ebp + 0xc] // 52 | push edx $sequence_6 = { 51 b9???????? e8???????? 85c0 7504 33c0 eb30 } // n = 7, score = 100 // 51 | push ecx // b9???????? | // e8???????? | // 85c0 | test eax, eax // 7504 | jne 6 // 33c0 | xor eax, eax // eb30 | jmp 0x32 $sequence_7 = { c68565ffffff82 c68566ffffffc2 c68567ffffff82 c68568ffffff07 c68569ffffffdc c6856affffff18 } // n = 6, score = 100 // c68565ffffff82 | mov byte ptr [ebp - 0x9b], 0x82 // c68566ffffffc2 | mov byte ptr [ebp - 0x9a], 0xc2 // c68567ffffff82 | mov byte ptr [ebp - 0x99], 0x82 // c68568ffffff07 | mov byte ptr [ebp - 0x98], 7 // c68569ffffffdc | mov byte ptr [ebp - 0x97], 0xdc // c6856affffff18 | mov byte ptr [ebp - 0x96], 0x18 $sequence_8 = { 8b85acf9ffff 50 ff15???????? c785a8f9fffffcffffff 6a00 8d8da4f9ffff 51 } // n = 7, score = 100 // 8b85acf9ffff | mov eax, dword ptr [ebp - 0x654] // 50 | push eax // ff15???????? | // c785a8f9fffffcffffff | mov dword ptr [ebp - 0x658], 0xfffffffc // 6a00 | push 0 // 8d8da4f9ffff | lea ecx, [ebp - 0x65c] // 51 | push ecx $sequence_9 = { 8b8550fbffff 83b85c03000000 7414 8b8d50fbffff 8b915c030000 899550fbffff ebdd } // n = 7, score = 100 // 8b8550fbffff | mov eax, dword ptr [ebp - 0x4b0] // 83b85c03000000 | cmp dword ptr [eax + 0x35c], 0 // 7414 | je 0x16 // 8b8d50fbffff | mov ecx, dword ptr [ebp - 0x4b0] // 8b915c030000 | mov edx, dword ptr [ecx + 0x35c] // 899550fbffff | mov dword ptr [ebp - 0x4b0], edx // ebdd | jmp 0xffffffdf condition: 7 of them and filesize < 360448 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY