SYMBOLCOMMON_NAMEaka. SYNONYMS
win.plead (Back to overview)

PLEAD

aka: DRAWDOWN, GOODTIMES, Linopid

Actor(s): BlackTech


PLEAD is a RAT used by the actor BlackTech. FireEye uses the synonyms GOODTIMES for the RAT module and DRAWDOWN for the respective downloader.

References
2020-12-24IronNetAdam Hlavek
@online{hlavek:20201224:china:723bed3, author = {Adam Hlavek}, title = {{China cyber attacks: the current threat landscape}}, date = {2020-12-24}, organization = {IronNet}, url = {https://www.ironnet.com/blog/china-cyber-attacks-the-current-threat-landscape}, language = {English}, urldate = {2021-01-01} } China cyber attacks: the current threat landscape
PLEAD TSCookie FlowCloud Lookback PLEAD PlugX Quasar RAT Winnti
2020-12-19Cyber And Ramen blogMike R
@online{r:20201219:persistence:b9043d9, author = {Mike R}, title = {{Persistence Pays Off: A Brief Look at BlackTech’s 2020}}, date = {2020-12-19}, organization = {Cyber And Ramen blog}, url = {https://www.cyberandramen.net/home/blacktech-doesnt-miss-a-step-a-quick-analysis-of-a-busy-2020}, language = {English}, urldate = {2021-01-01} } Persistence Pays Off: A Brief Look at BlackTech’s 2020
PLEAD TSCookie PLEAD
2020-09-29SymantecThreat Hunter Team
@online{team:20200929:palmerworm:4a96e3b, author = {Threat Hunter Team}, title = {{Palmerworm: Espionage Gang Targets the Media, Finance, and Other Sectors}}, date = {2020-09-29}, organization = {Symantec}, url = {https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/palmerworm-blacktech-espionage-apt}, language = {English}, urldate = {2020-10-04} } Palmerworm: Espionage Gang Targets the Media, Finance, and Other Sectors
KIVARS PLEAD BlackTech
2019-12-12FireEyeChi-en Shen, Oleg Bondarenko
@online{shen:20191212:cyber:e01baca, author = {Chi-en Shen and Oleg Bondarenko}, title = {{Cyber Threat Landscape in Japan – Revealing Threat in the Shadow}}, date = {2019-12-12}, organization = {FireEye}, url = {https://www.slideshare.net/codeblue_jp/cb19-cyber-threat-landscape-in-japan-revealing-threat-in-the-shadow-by-chi-en-shen-ashley-oleg-bondarenko}, language = {English}, urldate = {2020-04-16} } Cyber Threat Landscape in Japan – Revealing Threat in the Shadow
Cerberus TSCookie Cobalt Strike Dtrack Emotet Formbook IcedID Icefog IRONHALO Loki Password Stealer (PWS) PandaBanker PLEAD poisonplug TrickBot BlackTech
2019-11-22SANS Cyber Security SummitSveva Vittoria Scenarelli, Rachel Mullan
@techreport{scenarelli:20191122:need:00f7cef, author = {Sveva Vittoria Scenarelli and Rachel Mullan}, title = {{Need for PLEAD: BlackTech Pursuit}}, date = {2019-11-22}, institution = {SANS Cyber Security Summit}, url = {https://web.archive.org/web/20200229012206/https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1574947724.pdf}, language = {English}, urldate = {2021-01-25} } Need for PLEAD: BlackTech Pursuit
BLUETHER PLEAD
2019-10-01Macnica NetworksMacnica Networks
@techreport{networks:20191001:trends:30fb713, author = {Macnica Networks}, title = {{Trends in Cyber ​​Espionage Targeting Japan 1st Half of 2019}}, date = {2019-10-01}, institution = {Macnica Networks}, url = {https://www.macnica.net/file/mpressioncss_ta_report_2019_2_nopw.pdf}, language = {Japanese}, urldate = {2021-03-02} } Trends in Cyber ​​Espionage Targeting Japan 1st Half of 2019
PLEAD TSCookie Datper PLEAD
2019-09-18JPCERT/CCShusei Tomonaga
@online{tomonaga:20190918:malware:67390e7, author = {Shusei Tomonaga}, title = {{Malware Used by BlackTech after Network Intrusion}}, date = {2019-09-18}, organization = {JPCERT/CC}, url = {https://blogs.jpcert.or.jp/en/2019/09/tscookie-loader.html}, language = {English}, urldate = {2019-11-16} } Malware Used by BlackTech after Network Intrusion
PLEAD
2019-08-01Kaspersky LabsGReAT
@online{great:20190801:trends:5e25d5b, author = {GReAT}, title = {{APT trends report Q2 2019}}, date = {2019-08-01}, organization = {Kaspersky Labs}, url = {https://securelist.com/apt-trends-report-q2-2019/91897/}, language = {English}, urldate = {2020-08-13} } APT trends report Q2 2019
ZooPark magecart POWERSTATS Chaperone COMpfun EternalPetya FinFisher RAT HawkEye Keylogger HOPLIGHT Microcin NjRAT Olympic Destroyer PLEAD RokRAT Triton Zebrocy
2019-05-30JPCERT/CCShusei Tomonaga
@online{tomonaga:20190530:bug:cf70c8d, author = {Shusei Tomonaga}, title = {{Bug in Malware “TSCookie” - Fails to Read Configuration - (Update)}}, date = {2019-05-30}, organization = {JPCERT/CC}, url = {https://blogs.jpcert.or.jp/en/2019/05/tscookie3.html}, language = {English}, urldate = {2020-01-13} } Bug in Malware “TSCookie” - Fails to Read Configuration - (Update)
PLEAD
2019-05-14ESET ResearchAnton Cherepanov
@online{cherepanov:20190514:plead:3140588, author = {Anton Cherepanov}, title = {{Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage}}, date = {2019-05-14}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2019/05/14/plead-malware-mitm-asus-webstorage/}, language = {English}, urldate = {2019-11-14} } Plead malware distributed via MitM attacks at router level, misusing ASUS WebStorage
PLEAD BlackTech
2019-04-01Macnica NetworksMacnica Networks
@techreport{networks:20190401:trends:cf738dc, author = {Macnica Networks}, title = {{Trends in Cyber ​​Espionage Targeting Japan 2nd Half of 2018}}, date = {2019-04-01}, institution = {Macnica Networks}, url = {https://www.macnica.net/file/mpressioncss_ta_report_2019.pdf}, language = {Japanese}, urldate = {2021-03-02} } Trends in Cyber ​​Espionage Targeting Japan 2nd Half of 2018
Anel Cobalt Strike Datper PLEAD Quasar RAT RedLeaves taidoor Zebrocy
2018-11-12JPCERT/CCShusei Tomonaga
@online{tomonaga:20181112:bug:fe13af3, author = {Shusei Tomonaga}, title = {{Bug in Malware “TSCookie” - Fails to Read Configuration}}, date = {2018-11-12}, organization = {JPCERT/CC}, url = {https://blogs.jpcert.or.jp/en/2018/11/tscookie2.html}, language = {English}, urldate = {2019-10-28} } Bug in Malware “TSCookie” - Fails to Read Configuration
PLEAD
2018-07-09ESET ResearchAnton Cherepanov
@online{cherepanov:20180709:certificates:ae214b6, author = {Anton Cherepanov}, title = {{Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign}}, date = {2018-07-09}, organization = {ESET Research}, url = {https://www.welivesecurity.com/2018/07/09/certificates-stolen-taiwanese-tech-companies-plead-malware-campaign/}, language = {English}, urldate = {2019-11-14} } Certificates stolen from Taiwanese tech‑companies misused in Plead malware campaign
PLEAD BlackTech
2018-06-08JPCERT/CCShusei Tomonaga
@online{tomonaga:20180608:plead:046d5bc, author = {Shusei Tomonaga}, title = {{PLEAD Downloader Used by BlackTech}}, date = {2018-06-08}, organization = {JPCERT/CC}, url = {https://blog.jpcert.or.jp/2018/06/plead-downloader-used-by-blacktech.html}, language = {English}, urldate = {2020-01-06} } PLEAD Downloader Used by BlackTech
PLEAD
2018-03-06Shusei Tomonaga
@online{tomonaga:20180306:malware:f5fea73, author = {Shusei Tomonaga}, title = {{Malware “TSCookie”}}, date = {2018-03-06}, url = {http://blog.jpcert.or.jp/2018/03/malware-tscooki-7aa0.html}, language = {English}, urldate = {2020-01-07} } Malware “TSCookie”
PLEAD
2018-01-10FreebufTencent Computer Manager
@online{manager:20180110:analysis:3a5fe83, author = {Tencent Computer Manager}, title = {{Analysis of BlackTech's latest APT attack}}, date = {2018-01-10}, organization = {Freebuf}, url = {http://www.freebuf.com/column/159865.html}, language = {English}, urldate = {2020-01-08} } Analysis of BlackTech's latest APT attack
PLEAD
2017-06-22Trend MicroLenart Bermejo, Razor Huang, CH Lei
@online{bermejo:20170622:trail:ba78447, author = {Lenart Bermejo and Razor Huang and CH Lei}, title = {{The Trail of BlackTech’s Cyber Espionage Campaigns}}, date = {2017-06-22}, organization = {Trend Micro}, url = {https://www.trendmicro.com/en_us/research/17/f/following-trail-blacktech-cyber-espionage-campaigns.html}, language = {English}, urldate = {2021-01-29} } The Trail of BlackTech’s Cyber Espionage Campaigns
bifrose KIVARS PLEAD
2017-06-22Trend MicroLenart Bermejo, Razor Huang, CH Lei
@online{bermejo:20170622:following:7126b3b, author = {Lenart Bermejo and Razor Huang and CH Lei}, title = {{Following the Trail of BlackTech’s Cyber Espionage Campaigns}}, date = {2017-06-22}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/following-trail-blacktech-cyber-espionage-campaigns/}, language = {English}, urldate = {2019-12-24} } Following the Trail of BlackTech’s Cyber Espionage Campaigns
PLEAD BlackTech
2017-06Trend MicroLenart Bermejo, Razor Huang, CH Lei
@techreport{bermejo:201706:following:61e6dae, author = {Lenart Bermejo and Razor Huang and CH Lei}, title = {{Following the Trail of BlackTech’s Cyber Espionage Campaigns}}, date = {2017-06}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/appendix-following-the-trail-of-blacktechs-cyber-espionage-campaigns.pdf}, language = {English}, urldate = {2020-01-07} } Following the Trail of BlackTech’s Cyber Espionage Campaigns
PLEAD
2016-04-13FireEyeDaniel Regalado, Taha Karim, Varun Jian, Erye Hernandez
@online{regalado:20160413:ghosts:5d2944f, author = {Daniel Regalado and Taha Karim and Varun Jian and Erye Hernandez}, title = {{Ghosts in the Endpoint}}, date = {2016-04-13}, organization = {FireEye}, url = {https://www.fireeye.com/blog/threat-research/2016/04/ghosts_in_the_endpoi.html}, language = {English}, urldate = {2020-04-20} } Ghosts in the Endpoint
PLEAD
2014-07-02Trend MicroKervin Alintanahin, Ronnie Giagone
@online{alintanahin:20140702:kivars:4fe6877, author = {Kervin Alintanahin and Ronnie Giagone}, title = {{KIVARS With Venom: Targeted Attacks Upgrade with 64-bit “Support”}}, date = {2014-07-02}, organization = {Trend Micro}, url = {https://blog.trendmicro.com/trendlabs-security-intelligence/kivars-with-venom-targeted-attacks-upgrade-with-64-bit-support/}, language = {English}, urldate = {2020-06-19} } KIVARS With Venom: Targeted Attacks Upgrade with 64-bit “Support”
FakeWord KIVARS PLEAD Poison RAT Zeus
Yara Rules
[TLP:WHITE] win_plead_auto (20230407 | Detects win.plead.)
rule win_plead_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-03-28"
        version = "1"
        description = "Detects win.plead."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.plead"
        malpedia_rule_date = "20230328"
        malpedia_hash = "9d2d75cef573c1c2d861f5197df8f563b05a305d"
        malpedia_version = "20230407"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b4514 56 881c30 ff15???????? 3bc3 59 }
            // n = 6, score = 900
            //   8b4514               | mov                 eax, dword ptr [ebp + 0x14]
            //   56                   | push                esi
            //   881c30               | mov                 byte ptr [eax + esi], bl
            //   ff15????????         |                     
            //   3bc3                 | cmp                 eax, ebx
            //   59                   | pop                 ecx

        $sequence_1 = { 85f6 7417 56 e8???????? 40 50 6a01 }
            // n = 7, score = 900
            //   85f6                 | test                esi, esi
            //   7417                 | je                  0x19
            //   56                   | push                esi
            //   e8????????           |                     
            //   40                   | inc                 eax
            //   50                   | push                eax
            //   6a01                 | push                1

        $sequence_2 = { e8???????? 817d14e8030000 53 56 57 }
            // n = 5, score = 900
            //   e8????????           |                     
            //   817d14e8030000       | cmp                 dword ptr [ebp + 0x14], 0x3e8
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi

        $sequence_3 = { bf00800000 57 53 56 897d14 }
            // n = 5, score = 900
            //   bf00800000           | mov                 edi, 0x8000
            //   57                   | push                edi
            //   53                   | push                ebx
            //   56                   | push                esi
            //   897d14               | mov                 dword ptr [ebp + 0x14], edi

        $sequence_4 = { 897d14 e8???????? 83c40c 8d4514 53 50 56 }
            // n = 7, score = 900
            //   897d14               | mov                 dword ptr [ebp + 0x14], edi
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   8d4514               | lea                 eax, [ebp + 0x14]
            //   53                   | push                ebx
            //   50                   | push                eax
            //   56                   | push                esi

        $sequence_5 = { 50 6a01 ff15???????? 83c40c 85c0 7504 }
            // n = 6, score = 900
            //   50                   | push                eax
            //   6a01                 | push                1
            //   ff15????????         |                     
            //   83c40c               | add                 esp, 0xc
            //   85c0                 | test                eax, eax
            //   7504                 | jne                 6

        $sequence_6 = { 59 754c 8b451c 8b7d10 }
            // n = 4, score = 900
            //   59                   | pop                 ecx
            //   754c                 | jne                 0x4e
            //   8b451c               | mov                 eax, dword ptr [ebp + 0x1c]
            //   8b7d10               | mov                 edi, dword ptr [ebp + 0x10]

        $sequence_7 = { c745fc01000000 90 0f31 90 }
            // n = 4, score = 900
            //   c745fc01000000       | mov                 dword ptr [ebp - 4], 1
            //   90                   | nop                 
            //   0f31                 | rdtsc               
            //   90                   | nop                 

        $sequence_8 = { 50 f3ab c705????????01000000 ff15???????? 8b1d???????? ffd3 }
            // n = 6, score = 600
            //   50                   | push                eax
            //   f3ab                 | rep stosd           dword ptr es:[edi], eax
            //   c705????????01000000     |     
            //   ff15????????         |                     
            //   8b1d????????         |                     
            //   ffd3                 | call                ebx

        $sequence_9 = { 51 8b4d0c 33c0 8bd1 49 }
            // n = 5, score = 600
            //   51                   | push                ecx
            //   8b4d0c               | mov                 ecx, dword ptr [ebp + 0xc]
            //   33c0                 | xor                 eax, eax
            //   8bd1                 | mov                 edx, ecx
            //   49                   | dec                 ecx

        $sequence_10 = { 40 49 8975fc 75ec 8bc6 5e 8be5 }
            // n = 7, score = 600
            //   40                   | inc                 eax
            //   49                   | dec                 ecx
            //   8975fc               | mov                 dword ptr [ebp - 4], esi
            //   75ec                 | jne                 0xffffffee
            //   8bc6                 | mov                 eax, esi
            //   5e                   | pop                 esi
            //   8be5                 | mov                 esp, ebp

        $sequence_11 = { 0f8464010000 85db 0f845c010000 8bcf }
            // n = 4, score = 600
            //   0f8464010000         | je                  0x16a
            //   85db                 | test                ebx, ebx
            //   0f845c010000         | je                  0x162
            //   8bcf                 | mov                 ecx, edi

        $sequence_12 = { 85f6 0f84d2000000 8bcf 33c0 }
            // n = 4, score = 600
            //   85f6                 | test                esi, esi
            //   0f84d2000000         | je                  0xd8
            //   8bcf                 | mov                 ecx, edi
            //   33c0                 | xor                 eax, eax

        $sequence_13 = { 53 50 8b1d???????? ffd3 85c0 743b }
            // n = 6, score = 600
            //   53                   | push                ebx
            //   50                   | push                eax
            //   8b1d????????         |                     
            //   ffd3                 | call                ebx
            //   85c0                 | test                eax, eax
            //   743b                 | je                  0x3d

        $sequence_14 = { 49 85d2 8945fc 741c 8b4508 56 }
            // n = 6, score = 600
            //   49                   | dec                 ecx
            //   85d2                 | test                edx, edx
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   741c                 | je                  0x1e
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   56                   | push                esi

        $sequence_15 = { 8b44240c 81e1ffff0000 81e2ffff0000 51 25ffff0000 52 50 }
            // n = 7, score = 600
            //   8b44240c             | mov                 eax, dword ptr [esp + 0xc]
            //   81e1ffff0000         | and                 ecx, 0xffff
            //   81e2ffff0000         | and                 edx, 0xffff
            //   51                   | push                ecx
            //   25ffff0000           | and                 eax, 0xffff
            //   52                   | push                edx
            //   50                   | push                eax

        $sequence_16 = { 648b1530000000 8b520c 8b521c 8b5a08 }
            // n = 4, score = 200
            //   648b1530000000       | mov                 edx, dword ptr fs:[0x30]
            //   8b520c               | mov                 edx, dword ptr [edx + 0xc]
            //   8b521c               | mov                 edx, dword ptr [edx + 0x1c]
            //   8b5a08               | mov                 ebx, dword ptr [edx + 8]

        $sequence_17 = { 85c0 7407 8b400c 8b00 8b00 }
            // n = 5, score = 100
            //   85c0                 | test                eax, eax
            //   7407                 | je                  9
            //   8b400c               | mov                 eax, dword ptr [eax + 0xc]
            //   8b00                 | mov                 eax, dword ptr [eax]
            //   8b00                 | mov                 eax, dword ptr [eax]

        $sequence_18 = { e8???????? 8b442404 0fb708 83c002 6a00 51 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   8b442404             | mov                 eax, dword ptr [esp + 4]
            //   0fb708               | movzx               ecx, word ptr [eax]
            //   83c002               | add                 eax, 2
            //   6a00                 | push                0
            //   51                   | push                ecx

        $sequence_19 = { 7329 0fb702 2500f0ffff 3d00300000 }
            // n = 4, score = 100
            //   7329                 | jae                 0x2b
            //   0fb702               | movzx               eax, word ptr [edx]
            //   2500f0ffff           | and                 eax, 0xfffff000
            //   3d00300000           | cmp                 eax, 0x3000

        $sequence_20 = { 7f04 e2e9 eb03 8945fc 8b45f4 e8???????? }
            // n = 6, score = 100
            //   7f04                 | jg                  6
            //   e2e9                 | loop                0xffffffeb
            //   eb03                 | jmp                 5
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8b45f4               | mov                 eax, dword ptr [ebp - 0xc]
            //   e8????????           |                     

        $sequence_21 = { 3bef 77f7 ff750c ff7508 6a20 8d45e0 }
            // n = 6, score = 100
            //   3bef                 | cmp                 ebp, edi
            //   77f7                 | ja                  0xfffffff9
            //   ff750c               | push                dword ptr [ebp + 0xc]
            //   ff7508               | push                dword ptr [ebp + 8]
            //   6a20                 | push                0x20
            //   8d45e0               | lea                 eax, [ebp - 0x20]

        $sequence_22 = { 8b07 85c0 75f2 ab }
            // n = 4, score = 100
            //   8b07                 | mov                 eax, dword ptr [edi]
            //   85c0                 | test                eax, eax
            //   75f2                 | jne                 0xfffffff4
            //   ab                   | stosd               dword ptr es:[edi], eax

        $sequence_23 = { 8d5308 33c9 8b4304 83e808 d1e8 3bc8 7329 }
            // n = 7, score = 100
            //   8d5308               | lea                 edx, [ebx + 8]
            //   33c9                 | xor                 ecx, ecx
            //   8b4304               | mov                 eax, dword ptr [ebx + 4]
            //   83e808               | sub                 eax, 8
            //   d1e8                 | shr                 eax, 1
            //   3bc8                 | cmp                 ecx, eax
            //   7329                 | jae                 0x2b

    condition:
        7 of them and filesize < 8224768
}
Download all Yara Rules