SYMBOLCOMMON_NAMEaka. SYNONYMS
win.pittytiger_rat (Back to overview)

PittyTiger RAT


There is no description at this point.

References
2014-07-15McAfeeMcAfee
@online{mcafee:20140715:targeted:06d811a, author = {McAfee}, title = {{Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities}}, date = {2014-07-15}, organization = {McAfee}, url = {https://securingtomorrow.mcafee.com/mcafee-labs/targeted-attacks-on-french-company-exploit-multiple-word-vulnerabilities/}, language = {English}, urldate = {2019-11-22} } Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
PittyTiger RAT
2014Airbus Defence & SpaceIvan Fontarensky, Fabien Perigaud, Ronan Mouchoux, Cedric Pernet, David Bizeul
@techreport{fontarensky:2014:eye:a4c3c1b, author = {Ivan Fontarensky and Fabien Perigaud and Ronan Mouchoux and Cedric Pernet and David Bizeul}, title = {{The Eye of the Tiger}}, date = {2014}, institution = {Airbus Defence & Space}, url = {https://bitbucket.org/cybertools/whitepapers/downloads/Pitty%20Tiger%20Final%20Report.pdf}, language = {English}, urldate = {2020-01-08} } The Eye of the Tiger
paladin PittyTiger RAT
Yara Rules
[TLP:WHITE] win_pittytiger_rat_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_pittytiger_rat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.pittytiger_rat"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { e8???????? 85c0 59 7407 68???????? ebd3 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   59                   | pop                 ecx
            //   7407                 | je                  9
            //   68????????           |                     
            //   ebd3                 | jmp                 0xffffffd5

        $sequence_1 = { 8d85ecfbffff 50 e8???????? 80bc05ebfbffff2c }
            // n = 4, score = 100
            //   8d85ecfbffff         | lea                 eax, [ebp - 0x414]
            //   50                   | push                eax
            //   e8????????           |                     
            //   80bc05ebfbffff2c     | cmp                 byte ptr [ebp + eax - 0x415], 0x2c

        $sequence_2 = { 3b4510 720d 895dfc 6a08 ff15???????? eb48 53 }
            // n = 7, score = 100
            //   3b4510               | cmp                 eax, dword ptr [ebp + 0x10]
            //   720d                 | jb                  0xf
            //   895dfc               | mov                 dword ptr [ebp - 4], ebx
            //   6a08                 | push                8
            //   ff15????????         |                     
            //   eb48                 | jmp                 0x4a
            //   53                   | push                ebx

        $sequence_3 = { c745c474546950 c745c811111111 33c0 807405b811 40 83f810 72f5 }
            // n = 7, score = 100
            //   c745c474546950       | mov                 dword ptr [ebp - 0x3c], 0x50695474
            //   c745c811111111       | mov                 dword ptr [ebp - 0x38], 0x11111111
            //   33c0                 | xor                 eax, eax
            //   807405b811           | xor                 byte ptr [ebp + eax - 0x48], 0x11
            //   40                   | inc                 eax
            //   83f810               | cmp                 eax, 0x10
            //   72f5                 | jb                  0xfffffff7

        $sequence_4 = { ff15???????? 6a01 58 eb5d }
            // n = 4, score = 100
            //   ff15????????         |                     
            //   6a01                 | push                1
            //   58                   | pop                 eax
            //   eb5d                 | jmp                 0x5f

        $sequence_5 = { 0f8425feffff 8d45b8 c745c441000000 50 }
            // n = 4, score = 100
            //   0f8425feffff         | je                  0xfffffe2b
            //   8d45b8               | lea                 eax, [ebp - 0x48]
            //   c745c441000000       | mov                 dword ptr [ebp - 0x3c], 0x41
            //   50                   | push                eax

        $sequence_6 = { 8d7dac f3ab 8d45a8 c745a844000000 50 ff15???????? }
            // n = 6, score = 100
            //   8d7dac               | lea                 edi, [ebp - 0x54]
            //   f3ab                 | rep stosd           dword ptr es:[edi], eax
            //   8d45a8               | lea                 eax, [ebp - 0x58]
            //   c745a844000000       | mov                 dword ptr [ebp - 0x58], 0x44
            //   50                   | push                eax
            //   ff15????????         |                     

        $sequence_7 = { 50 8d45f8 50 8d45fc 6aff }
            // n = 5, score = 100
            //   50                   | push                eax
            //   8d45f8               | lea                 eax, [ebp - 8]
            //   50                   | push                eax
            //   8d45fc               | lea                 eax, [ebp - 4]
            //   6aff                 | push                -1

        $sequence_8 = { 66a5 a4 8d7dbf be???????? ab ab aa }
            // n = 7, score = 100
            //   66a5                 | movsw               word ptr es:[edi], word ptr [esi]
            //   a4                   | movsb               byte ptr es:[edi], byte ptr [esi]
            //   8d7dbf               | lea                 edi, [ebp - 0x41]
            //   be????????           |                     
            //   ab                   | stosd               dword ptr es:[edi], eax
            //   ab                   | stosd               dword ptr es:[edi], eax
            //   aa                   | stosb               byte ptr es:[edi], al

        $sequence_9 = { 53 ff7508 e8???????? 83c448 8d85f8fbffff 68???????? 50 }
            // n = 7, score = 100
            //   53                   | push                ebx
            //   ff7508               | push                dword ptr [ebp + 8]
            //   e8????????           |                     
            //   83c448               | add                 esp, 0x48
            //   8d85f8fbffff         | lea                 eax, [ebp - 0x408]
            //   68????????           |                     
            //   50                   | push                eax

    condition:
        7 of them and filesize < 2162688
}
Download all Yara Rules