win.plead (Back to overview)

PLEAD

aka: TSCookie

Actor(s): BlackTech


There is no description at this point.

References
2019-11-22 ⋅ SANS Cyber Security SummitSveva Vittoria Scenarelli, Rachel Mullan
@techreport{scenarelli:20191122:need:00f7cef, author = {Sveva Vittoria Scenarelli and Rachel Mullan}, title = {{Need for PLEAD: BlackTech Pursuit}}, date = {2019-11-22}, institution = {SANS Cyber Security Summit}, url = {https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1574947724.pdf}, language = {English}, urldate = {2020-01-20} } Need for PLEAD: BlackTech Pursuit
BLUETHER PLEAD
2019-09-18 ⋅ JPCERT/CCShusei Tomonaga
@online{tomonaga:20190918:malware:67390e7, author = {Shusei Tomonaga}, title = {{Malware Used by BlackTech after Network Intrusion}}, date = {2019-09-18}, organization = {JPCERT/CC}, url = {https://blogs.jpcert.or.jp/en/2019/09/tscookie-loader.html}, language = {English}, urldate = {2019-11-16} } Malware Used by BlackTech after Network Intrusion
PLEAD
2019-05-30 ⋅ JPCERT/CCShusei Tomonaga
@online{tomonaga:20190530:bug:cf70c8d, author = {Shusei Tomonaga}, title = {{Bug in Malware “TSCookie” - Fails to Read Configuration - (Update)}}, date = {2019-05-30}, organization = {JPCERT/CC}, url = {https://blogs.jpcert.or.jp/en/2019/05/tscookie3.html}, language = {English}, urldate = {2020-01-13} } Bug in Malware “TSCookie” - Fails to Read Configuration - (Update)
PLEAD
2019-05-14 ⋅ ESET ResearchAnton Cherepanov
@online{cherepanov:20190514:plead:3140588, author = {Anton Cherepanov}, title = {{Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage}}, date = {2019-05-14}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2019/05/14/plead-malware-mitm-asus-webstorage/}, language = {English}, urldate = {2019-11-14} } Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage
PLEAD BlackTech
2018-11-12 ⋅ JPCERT/CCShusei Tomonaga
@online{tomonaga:20181112:bug:fe13af3, author = {Shusei Tomonaga}, title = {{Bug in Malware “TSCookie” - Fails to Read Configuration}}, date = {2018-11-12}, organization = {JPCERT/CC}, url = {https://blogs.jpcert.or.jp/en/2018/11/tscookie2.html}, language = {English}, urldate = {2019-10-28} } Bug in Malware “TSCookie” - Fails to Read Configuration
PLEAD
2018-07-09 ⋅ ESET ResearchAnton Cherepanov
@online{cherepanov:20180709:certificates:ae214b6, author = {Anton Cherepanov}, title = {{Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign}}, date = {2018-07-09}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2018/07/09/certificates-stolen-taiwanese-tech-companies-plead-malware-campaign/}, language = {English}, urldate = {2019-11-14} } Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign
PLEAD BlackTech
2018-06-08 ⋅ JPCERT/CCShusei Tomonaga
@online{tomonaga:20180608:plead:046d5bc, author = {Shusei Tomonaga}, title = {{PLEAD Downloader Used by BlackTech}}, date = {2018-06-08}, organization = {JPCERT/CC}, url = {https://blog.jpcert.or.jp/2018/06/plead-downloader-used-by-blacktech.html}, language = {English}, urldate = {2020-01-06} } PLEAD Downloader Used by BlackTech
PLEAD
2018-03-06 ⋅ Shusei Tomonaga
@online{tomonaga:20180306:malware:f5fea73, author = {Shusei Tomonaga}, title = {{Malware “TSCookie”}}, date = {2018-03-06}, url = {http://blog.jpcert.or.jp/2018/03/malware-tscooki-7aa0.html}, language = {English}, urldate = {2020-01-07} } Malware “TSCookie”
PLEAD
2018-01-10 ⋅ FreebufTencent Computer Manager
@online{manager:20180110:analysis:3a5fe83, author = {Tencent Computer Manager}, title = {{Analysis of BlackTech's latest APT attack}}, date = {2018-01-10}, organization = {Freebuf}, url = {http://www.freebuf.com/column/159865.html}, language = {English}, urldate = {2020-01-08} } Analysis of BlackTech's latest APT attack
PLEAD
2017-06-22 ⋅ Trend MicroLenart Bermejo, Razor Huang, CH Lei
@online{bermejo:20170622:following:7126b3b, author = {Lenart Bermejo and Razor Huang and CH Lei}, title = {{Following the Trail of BlackTech’s Cyber Espionage Campaigns}}, date = {2017-06-22}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/following-trail-blacktech-cyber-espionage-campaigns/}, language = {English}, urldate = {2019-12-24} } Following the Trail of BlackTech’s Cyber Espionage Campaigns
PLEAD BlackTech
2017-06 ⋅ Trend MicroLenart Bermejo, Razor Huang, CH Lei
@techreport{bermejo:201706:following:61e6dae, author = {Lenart Bermejo and Razor Huang and CH Lei}, title = {{Following the Trail of BlackTech’s Cyber Espionage Campaigns}}, date = {2017-06}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/appendix-following-the-trail-of-blacktechs-cyber-espionage-campaigns.pdf}, language = {English}, urldate = {2020-01-07} } Following the Trail of BlackTech’s Cyber Espionage Campaigns
PLEAD
Yara Rules
[TLP:WHITE] win_plead_auto (20190204 | autogenerated rule brought to you by yara-signator)
rule win_plead_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2019-11-26"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator 0.1a"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.plead"
        malpedia_version = "20190204"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach will be published in the near future here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */

    strings:
        $sequence_0 = { 897d14 e8???????? 83c40c 8d4514 }
            // n = 4, score = 500
            //   897d14               | mov                 dword ptr [ebp + 0x14], edi
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   8d4514               | lea                 eax, [ebp + 0x14]

        $sequence_1 = { 53 50 56 53 6a13 }
            // n = 5, score = 500
            //   53                   | push                ebx
            //   50                   | push                eax
            //   56                   | push                esi
            //   53                   | push                ebx
            //   6a13                 | push                0x13

        $sequence_2 = { 56 8b35???????? 57 8b7d08 89450c }
            // n = 5, score = 500
            //   56                   | push                esi
            //   8b35????????         |                     
            //   57                   | push                edi
            //   8b7d08               | mov                 edi, dword ptr [ebp + 8]
            //   89450c               | mov                 dword ptr [ebp + 0xc], eax

        $sequence_3 = { 5e 0f94c1 5d 8bc1 5b }
            // n = 5, score = 500
            //   5e                   | pop                 esi
            //   0f94c1               | sete                cl
            //   5d                   | pop                 ebp
            //   8bc1                 | mov                 eax, ecx
            //   5b                   | pop                 ebx

        $sequence_4 = { 81e1ff000080 7908 49 81c900ffffff 41 85c9 7e1c }
            // n = 7, score = 500
            //   81e1ff000080         | and                 ecx, 0x800000ff
            //   7908                 | jns                 0xa
            //   49                   | dec                 ecx
            //   81c900ffffff         | or                  ecx, 0xffffff00
            //   41                   | inc                 ecx
            //   85c9                 | test                ecx, ecx
            //   7e1c                 | jle                 0x1e

        $sequence_5 = { 7504 33c0 eb09 56 50 e8???????? 59 }
            // n = 7, score = 500
            //   7504                 | jne                 6
            //   33c0                 | xor                 eax, eax
            //   eb09                 | jmp                 0xb
            //   56                   | push                esi
            //   50                   | push                eax
            //   e8????????           |                     
            //   59                   | pop                 ecx

        $sequence_6 = { 6a00 6a00 6801020000 6a01 50 ff15???????? }
            // n = 6, score = 500
            //   6a00                 | push                0
            //   6a00                 | push                0
            //   6801020000           | push                0x201
            //   6a01                 | push                1
            //   50                   | push                eax
            //   ff15????????         |                     

        $sequence_7 = { 6a00 ff15???????? 6a02 a3???????? 8b8c242c020000 }
            // n = 5, score = 500
            //   6a00                 | push                0
            //   ff15????????         |                     
            //   6a02                 | push                2
            //   a3????????           |                     
            //   8b8c242c020000       | mov                 ecx, dword ptr [esp + 0x22c]

        $sequence_8 = { 90 0f31 0145fc ff75fc }
            // n = 4, score = 500
            //   90                   | nop                 
            //   0f31                 | rdtsc               
            //   0145fc               | add                 dword ptr [ebp - 4], eax
            //   ff75fc               | push                dword ptr [ebp - 4]

        $sequence_9 = { 6a01 ff15???????? 83c40c 85c0 7504 }
            // n = 5, score = 500
            //   6a01                 | push                1
            //   ff15????????         |                     
            //   83c40c               | add                 esp, 0xc
            //   85c0                 | test                eax, eax
            //   7504                 | jne                 6

        $sequence_10 = { 81c418020000 c21000 8b942428020000 8b842424020000 52 50 }
            // n = 6, score = 500
            //   81c418020000         | add                 esp, 0x218
            //   c21000               | ret                 0x10
            //   8b942428020000       | mov                 edx, dword ptr [esp + 0x228]
            //   8b842424020000       | mov                 eax, dword ptr [esp + 0x224]
            //   52                   | push                edx
            //   50                   | push                eax

        $sequence_11 = { 8d942420010000 52 ffd6 5f }
            // n = 4, score = 500
            //   8d942420010000       | lea                 edx, [esp + 0x120]
            //   52                   | push                edx
            //   ffd6                 | call                esi
            //   5f                   | pop                 edi

        $sequence_12 = { 8b4514 56 881c30 ff15???????? 3bc3 }
            // n = 5, score = 500
            //   8b4514               | mov                 eax, dword ptr [ebp + 0x14]
            //   56                   | push                esi
            //   881c30               | mov                 byte ptr [eax + esi], bl
            //   ff15????????         |                     
            //   3bc3                 | cmp                 eax, ebx

        $sequence_13 = { 50 ff15???????? 6a3f 33c0 59 }
            // n = 5, score = 500
            //   50                   | push                eax
            //   ff15????????         |                     
            //   6a3f                 | push                0x3f
            //   33c0                 | xor                 eax, eax
            //   59                   | pop                 ecx

        $sequence_14 = { 8975dc 85f6 0f84d2000000 8bcf }
            // n = 4, score = 500
            //   8975dc               | mov                 dword ptr [ebp - 0x24], esi
            //   85f6                 | test                esi, esi
            //   0f84d2000000         | je                  0xd8
            //   8bcf                 | mov                 ecx, edi

        $sequence_15 = { 8d54241c b941000000 33c0 8d7c241c 6804010000 52 50 }
            // n = 7, score = 500
            //   8d54241c             | lea                 edx, [esp + 0x1c]
            //   b941000000           | mov                 ecx, 0x41
            //   33c0                 | xor                 eax, eax
            //   8d7c241c             | lea                 edi, [esp + 0x1c]
            //   6804010000           | push                0x104
            //   52                   | push                edx
            //   50                   | push                eax

        $sequence_16 = { 8b733c 8b741e78 03f3 56 8b7620 03f3 }
            // n = 6, score = 200
            //   8b733c               | mov                 esi, dword ptr [ebx + 0x3c]
            //   8b741e78             | mov                 esi, dword ptr [esi + ebx + 0x78]
            //   03f3                 | add                 esi, ebx
            //   56                   | push                esi
            //   8b7620               | mov                 esi, dword ptr [esi + 0x20]
            //   03f3                 | add                 esi, ebx

        $sequence_17 = { 648b1530000000 8b520c 8b521c 8b5a08 }
            // n = 4, score = 200
            //   648b1530000000       | mov                 edx, dword ptr fs:[0x30]
            //   8b520c               | mov                 edx, dword ptr [edx + 0xc]
            //   8b521c               | mov                 edx, dword ptr [edx + 0x1c]
            //   8b5a08               | mov                 ebx, dword ptr [edx + 8]

        $sequence_18 = { ff5668 8a45ec 84c0 7517 }
            // n = 4, score = 100
            //   ff5668               | call                dword ptr [esi + 0x68]
            //   8a45ec               | mov                 al, byte ptr [ebp - 0x14]
            //   84c0                 | test                al, al
            //   7517                 | jne                 0x19

        $sequence_19 = { 8bec 33c0 8dbd00ffffff 50 3be7 75fb }
            // n = 6, score = 100
            //   8bec                 | mov                 ebp, esp
            //   33c0                 | xor                 eax, eax
            //   8dbd00ffffff         | lea                 edi, [ebp - 0x100]
            //   50                   | push                eax
            //   3be7                 | cmp                 esp, edi
            //   75fb                 | jne                 0xfffffffd

        $sequence_20 = { ebbb c9 c20c00 51 8b430c 034510 }
            // n = 6, score = 100
            //   ebbb                 | jmp                 0xffffffbd
            //   c9                   | leave               
            //   c20c00               | ret                 0xc
            //   51                   | push                ecx
            //   8b430c               | mov                 eax, dword ptr [ebx + 0xc]
            //   034510               | add                 eax, dword ptr [ebp + 0x10]

        $sequence_21 = { c3 e8???????? 56 8bf0 f3a4 }
            // n = 5, score = 100
            //   c3                   | ret                 
            //   e8????????           |                     
            //   56                   | push                esi
            //   8bf0                 | mov                 esi, eax
            //   f3a4                 | rep movsb           byte ptr es:[edi], byte ptr [esi]

        $sequence_22 = { 66c742020100 eb8e 6800800000 6a00 52 ff5648 }
            // n = 6, score = 100
            //   66c742020100         | mov                 word ptr [edx + 2], 1
            //   eb8e                 | jmp                 0xffffff90
            //   6800800000           | push                0x8000
            //   6a00                 | push                0
            //   52                   | push                edx
            //   ff5648               | call                dword ptr [esi + 0x48]

        $sequence_23 = { 0345f8 c6002e 40 8d55f4 52 50 }
            // n = 6, score = 100
            //   0345f8               | add                 eax, dword ptr [ebp - 8]
            //   c6002e               | mov                 byte ptr [eax], 0x2e
            //   40                   | inc                 eax
            //   8d55f4               | lea                 edx, [ebp - 0xc]
            //   52                   | push                edx
            //   50                   | push                eax

    condition:
        7 of them
}
Download all Yara Rules