SYMBOLCOMMON_NAMEaka. SYNONYMS
win.pittytiger_rat (Back to overview)

PittyTiger RAT


There is no description at this point.

References
2014-07-15McAfeeMcAfee
@online{mcafee:20140715:targeted:06d811a, author = {McAfee}, title = {{Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities}}, date = {2014-07-15}, organization = {McAfee}, url = {https://securingtomorrow.mcafee.com/mcafee-labs/targeted-attacks-on-french-company-exploit-multiple-word-vulnerabilities/}, language = {English}, urldate = {2019-11-22} } Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
PittyTiger RAT
2014Airbus Defence & SpaceIvan Fontarensky, Fabien Perigaud, Ronan Mouchoux, Cedric Pernet, David Bizeul
@techreport{fontarensky:2014:eye:a4c3c1b, author = {Ivan Fontarensky and Fabien Perigaud and Ronan Mouchoux and Cedric Pernet and David Bizeul}, title = {{The Eye of the Tiger}}, date = {2014}, institution = {Airbus Defence & Space}, url = {https://bitbucket.org/cybertools/whitepapers/downloads/Pitty%20Tiger%20Final%20Report.pdf}, language = {English}, urldate = {2020-01-08} } The Eye of the Tiger
paladin PittyTiger RAT
Yara Rules
[TLP:WHITE] win_pittytiger_rat_auto (20230125 | Detects win.pittytiger_rat.)
rule win_pittytiger_rat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.pittytiger_rat."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.pittytiger_rat"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 897dfc 817de8ea000000 0f8433ffffff 68???????? ff750c }
            // n = 5, score = 100
            //   897dfc               | mov                 dword ptr [ebp - 4], edi
            //   817de8ea000000       | cmp                 dword ptr [ebp - 0x18], 0xea
            //   0f8433ffffff         | je                  0xffffff39
            //   68????????           |                     
            //   ff750c               | push                dword ptr [ebp + 0xc]

        $sequence_1 = { 8b9eac010000 83c430 85db 744f 8d4304 50 }
            // n = 6, score = 100
            //   8b9eac010000         | mov                 ebx, dword ptr [esi + 0x1ac]
            //   83c430               | add                 esp, 0x30
            //   85db                 | test                ebx, ebx
            //   744f                 | je                  0x51
            //   8d4304               | lea                 eax, [ebx + 4]
            //   50                   | push                eax

        $sequence_2 = { 8945fc 0f84cf000000 8b75fc 6a00 6a01 6a02 }
            // n = 6, score = 100
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   0f84cf000000         | je                  0xd5
            //   8b75fc               | mov                 esi, dword ptr [ebp - 4]
            //   6a00                 | push                0
            //   6a01                 | push                1
            //   6a02                 | push                2

        $sequence_3 = { 6802020000 ff15???????? 85c0 0f853a020000 8b35???????? }
            // n = 5, score = 100
            //   6802020000           | push                0x202
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   0f853a020000         | jne                 0x240
            //   8b35????????         |                     

        $sequence_4 = { eb30 6a02 53 53 ff75fc ff15???????? }
            // n = 6, score = 100
            //   eb30                 | jmp                 0x32
            //   6a02                 | push                2
            //   53                   | push                ebx
            //   53                   | push                ebx
            //   ff75fc               | push                dword ptr [ebp - 4]
            //   ff15????????         |                     

        $sequence_5 = { 3bc3 a3???????? 0f8476ffffff 8d459c c745ac65416500 50 }
            // n = 6, score = 100
            //   3bc3                 | cmp                 eax, ebx
            //   a3????????           |                     
            //   0f8476ffffff         | je                  0xffffff7c
            //   8d459c               | lea                 eax, [ebp - 0x64]
            //   c745ac65416500       | mov                 dword ptr [ebp - 0x54], 0x654165
            //   50                   | push                eax

        $sequence_6 = { ff15???????? 50 68???????? ff750c ff15???????? 83c410 33c0 }
            // n = 7, score = 100
            //   ff15????????         |                     
            //   50                   | push                eax
            //   68????????           |                     
            //   ff750c               | push                dword ptr [ebp + 0xc]
            //   ff15????????         |                     
            //   83c410               | add                 esp, 0x10
            //   33c0                 | xor                 eax, eax

        $sequence_7 = { c7459c57726974 c745a06546696c 885da5 ffd6 3bc3 a3???????? 74d1 }
            // n = 7, score = 100
            //   c7459c57726974       | mov                 dword ptr [ebp - 0x64], 0x74697257
            //   c745a06546696c       | mov                 dword ptr [ebp - 0x60], 0x6c694665
            //   885da5               | mov                 byte ptr [ebp - 0x5b], bl
            //   ffd6                 | call                esi
            //   3bc3                 | cmp                 eax, ebx
            //   a3????????           |                     
            //   74d1                 | je                  0xffffffd3

        $sequence_8 = { be00010000 aa 56 8d85d0fdffff }
            // n = 4, score = 100
            //   be00010000           | mov                 esi, 0x100
            //   aa                   | stosb               byte ptr es:[edi], al
            //   56                   | push                esi
            //   8d85d0fdffff         | lea                 eax, [ebp - 0x230]

        $sequence_9 = { 744f 8d4304 50 8d85f8fbffff 68???????? 50 }
            // n = 6, score = 100
            //   744f                 | je                  0x51
            //   8d4304               | lea                 eax, [ebx + 4]
            //   50                   | push                eax
            //   8d85f8fbffff         | lea                 eax, [ebp - 0x408]
            //   68????????           |                     
            //   50                   | push                eax

    condition:
        7 of them and filesize < 2162688
}
Download all Yara Rules